Da Vincos: “Facebook in Italia: 22 milioni utenti, 14 ogni giorno, 10 da mobile al mese (dati ufficiali) #sotn12”
At a conference in Oxford on Saturday, Turing expert Prof Jack Copeland will argue that the evidence presented at the 1954 inquest would not be accepted nowadays as sufficient to establish that Turing had taken his own life deliberately. […] the police never tested the apple for the presence of cyanide […] nothing in the accounts of Turing’s last days suggest he was in anything but a cheerful mood. He had left a note on his office desk, as was his practice, the previous Friday to remind himself of the tasks to be done on his return after the Bank Holiday weekend.
[…] It is often repeated that the chemicals caused him to grow breasts, though Turing is only known to have mentioned this once. […] Turing had tolerated the year-long hormone treatment and the terms of his probation (“my shining virtue was terrific”) with amused fortitude, and another year had since passed seemingly without incident.
[…] Prof Copeland believes the alternative explanation made at the time by Turing’s mother is equally likely. Turing had cyanide in his house for chemical experiments he conducted in his tiny spare room […] Perhaps he had accidentally put his apple into a puddle of cyanide. Or perhaps, more likely, he had accidentally inhaled cyanide vapours from the bubbling liquid. Prof Copeland notes that the nightmare room had a “strong smell” of cyanide after Turing’s death; that inhalation leads to a slower death than ingestion; and that the distribution of the poison in Turing’s organs was more consistent with inhalation than with ingestion.
So how does malware evade detection when starting new rogue processes? Easy—it directly attacks the operating system’s kernel […] The Windows OS internally maintains an array of callback objects with the starting address of PspCreateProcessNotifyRoutine. […] Unsurprisingly, we have discovered malware that uses this implementation by accessing the PspCreateProcessNotifyRoutine (internal pointer) in order to remove all registered callbacks. Once the malware has removed the AV security suite callbacks, it is free to create and terminate processes at will without any pesky security software interference […] And that’s it. The rest of this exploit is trivial. Just walk the PspCreateProcessNotifyRoutine pointer and NULL out all callback objects… Any enterprise or consumer security suite that uses this technique for monitoring process activity can be easily circumvented—a big win for the malware authors.
– da How Advanced Malware Bypasses Process Monitoring, Fireeye.com.
Bruce Schneier segnala questo post e questo libro (La Place de la Concorde Suisse di John McPhee) che parlano di ponti, tunnel, gole, autostrade e colline già minate per farle saltare in aria in caso d’invasione. Vero in buona parte, ma attenzione: il libro risale al 1994. Oggi le cose sono un po’ diverse. Per esempio, il bunker in ogni casa/palazzo non è più obbligatorio. Ma le postazioni militari camuffate e la predisposizione delle strutture alla loro demolizione restano. Lo so; ci abito. Nei commenti all’articolo di Schneier ci sono parecchie info interessanti.
Sono la prossima – anzi no, l’attuale – frontiera del malware: pubblicità pop-up che compaiono su tablet e smartphone quando si naviga in Rete e si spacciano per avvisi d’infezione, con invito a cliccarvi sopra per comperare l’antivirus che magicamente risolverà il problema (che in realtà non esiste).
Brian Krebs: Beware Scare Tactics for Mobile Security Apps