Wednesday, July 24, 2019

The Threat to Digital Democracy

Two significant changes are taking place the advent of Intelligent Malware would be bad enough, but in combination with the Virtualization of Democracy, it spells doom.
The Church-Turing Thesis solves the threats of Artificially Intelligent Malware and errors by privileged users as a future-safe Trusted Commercial Computer, fit for the 21st Century.
A new book by Kenneth J. Hamer-Hodges explores this hiatus in the development of cyber society in the 21st Century by reviewing the engineering of secure systems that pass the test of time.
Visit http://sipantic.net

Saturday, June 29, 2019

CNBC: Boeing 737 Max likely grounded until the end of the year after new problem emerges

CNBC: Boeing 737 Max likely grounded until the end of the year after new problem emerges.
https://www.cnbc.com/2019/06/28/boeing-737-max-likely-grounded-until-the-end-of-the-year.html

Bloomberg: Boeing's 737 Max Software Outsourced to $9-an-Hour Engineers

Bloomberg: Boeing's 737 Max Software Outsourced to $9-an-Hour Engineers.
https://www.bloomberg.com/news/articles/2019-06-28/boeing-s-737-max-software-outsourced-to-9-an-hour-engineers

Friday, June 28, 2019

Bloomberg: Pilots Flagged Software Problems on Boeing Jets Besides the Max

Bloomberg: Pilots Flagged Software Problems on Boeing Jets Besides the Max.
https://www.bloomberg.com/news/articles/2019-06-27/boeing-pilots-flagged-software-problems-on-jets-besides-the-max?utm_source=google&utm_medium=bd&utm_campaign=Tech&cmpId=GP.Tech

Thursday, June 27, 2019

NBC News: FAA finds potential flaw in Boeing 737 Max software updates

NBC News: FAA finds potential flaw in Boeing 737 Max software updates.
https://www.nbcnews.com/news/us-news/faa-finds-potential-flaw-boeing-737-max-software-updates-n1022516

Saturday, June 22, 2019

WIRED: Hackers Used Two Firefox Zero Days to Hit a Crypto Exchange

WIRED: Hackers Used Two Firefox Zero Days to Hit a Crypto Exchange.
https://www.wired.com/story/firefox-vulnerability-coinbase-ransomware-border-hack

Wednesday, June 5, 2019

ZDNet: Malboard: Hackers can now pose as victims through their keyboards

ZDNet: Malboard: Hackers can now pose as victims through their keyboards.
https://www.zdnet.com/article/malboard-hackers-can-now-pose-as-you-through-your-keyboard/

Thursday, May 16, 2019

WIRED: Microsoft’s First Windows XP Patch in Years Is a Very Bad Sign

WIRED: Microsoft's First Windows XP Patch in Years Is a Very Bad Sign.
https://www.wired.com/story/microsoft-windows-xp-patch-very-bad-sign

Wednesday, May 15, 2019

Fox News: Florida governor confirms 2 counties were hacked in 2016 election

Fox News: Florida governor confirms 2 counties were hacked in 2016 election.
https://www.foxnews.com/us/florida-governor-confirms-two-counties-were-hacked-in-2016-election

Mirror Online: WhatsApp hack: How to find out if you are affected and what to do next

Mirror Online: WhatsApp hack: How to find out if you are affected and what to do next.
https://www.mirror.co.uk/tech/whatsapp-hack-am-affected-what-15973112

Saturday, May 11, 2019

PC Gamer: Hackers claim to have infiltrated three US antivirus firms

PC Gamer: Hackers claim to have infiltrated three US antivirus firms.
https://www.pcgamer.com/hackers-claim-to-have-infiltrated-three-us-antivirus-firms/

Wednesday, May 1, 2019

TechCrunch: Hackers went undetected in Citrix’s internal network for six months

TechCrunch: Hackers went undetected in Citrix's internal network for six months.
https://techcrunch.com/2019/04/30/citrix-internal-network-breach/

Monday, April 15, 2019

WIRED: The Worst Cybersecurity Breaches of 2018 So Far

WIRED: The Worst Cybersecurity Breaches of 2018 So Far.
https://www.wired.com/story/2018-worst-hacks-so-far

Sunday, April 14, 2019

New York Post : Hackers are stealing millions in Bitcoin — and living like big shots

New York Post : Hackers are stealing millions in Bitcoin — and living like big shots.
https://nypost.com/2019/04/13/hackers-are-stealing-millions-in-bitcoin-and-living-like-big-shots/

Thursday, April 11, 2019

Kenneth Hamer-Hodges shared 'Changes to Flight Software on 737 Max Escaped F.A.A. Scrutiny' with you

Google News
Kenneth Hamer-Hodges shared 'Changes to Flight Software on 737 Max Escaped F.A.A. Scrutiny' with you
 
The New York Times
Changes to Flight Software on 737 Max Escaped F.A.A. Scrutiny
While it was designing its newest jet, Boeing decided to quadruple the power of an automated system that could push down the plane's nose...
 
Get the Google News app
Google News on Google Play Google News on App Store
 
You received this email because Kenneth Hamer-Hodges shared this with you. If you no longer want to receive email notifications of shared content from Google News, unsubscribe here.
 
© 2019 Google LLC
1600 Amphitheatre Parkway, Mountain View, CA 94043

Saturday, March 23, 2019

Kenneth Hamer-Hodges shared 'Sacked IT guy annihilates 23 of his ex-employer’s AWS servers' with you

Google News
Kenneth Hamer-Hodges shared 'Sacked IT guy annihilates 23 of his ex-employer's AWS servers' with you
 
Naked Security
Sacked IT guy annihilates 23 of his ex-employer's AWS servers
 
Get the Google News app
Google News on Google Play Google News on App Store
 
You received this email because Kenneth Hamer-Hodges shared this with you. If you no longer want to receive email notifications of shared content from Google News, unsubscribe here.
 
© 2019 Google LLC
1600 Amphitheatre Parkway, Mountain View, CA 94043

Monday, March 18, 2019

Flawed analysis, failed oversight: How Boeing, FAA certified the suspect 737 MAX flight control system – The Seattle Times

https://www.seattletimes.com/business/boeing-aerospace/failed-certification-faa-missed-safety-issues-in-the-737-max-system-implicated-in-the-lion-air-crash/

Friday, March 15, 2019

Monday, March 11, 2019

Kenneth Hamer-Hodges shared 'Ukraine Says Russian Hackers Preparing Massive Strike' with you

Google News
Kenneth Hamer-Hodges shared 'Ukraine Says Russian Hackers Preparing Massive Strike' with you
 
VOA News
Ukraine Says Russian Hackers Preparing Massive Strike
Hackers from Russia are infecting Ukrainian companies with malicious software to create "back doors" for a large, coordinated attack...
 
Get the Google News app
Google News on Google Play Google News on App Store
 
You received this email because Kenneth Hamer-Hodges shared this with you. If you no longer want to receive email notifications of shared content from Google News, unsubscribe here.
 
© 2019 Google LLC
1600 Amphitheatre Parkway, Mountain View, CA 94043

Kenneth Hamer-Hodges shared 'How to keep yourself safe from cyber hacking' with you

Google News
Kenneth Hamer-Hodges shared 'How to keep yourself safe from cyber hacking' with you
 
ABC News
How to keep yourself safe from cyber hacking
By Hannah Walmsley with Dan Bourchier If you've been caught up in an online scam you'd know what a headache they can cause. And while...
 
Get the Google News app
Google News on Google Play Google News on App Store
 
You received this email because Kenneth Hamer-Hodges shared this with you. If you no longer want to receive email notifications of shared content from Google News, unsubscribe here.
 
© 2019 Google LLC
1600 Amphitheatre Parkway, Mountain View, CA 94043

Kenneth Hamer-Hodges shared 'The Biggest Phishing Scams of 2018: Free World Cup Tickets and Summer Vacation Rentals' with you

Google News
Kenneth Hamer-Hodges shared 'The Biggest Phishing Scams of 2018: Free World Cup Tickets and Summer Vacation Rentals' with you
 
Inc.
The Biggest Phishing Scams of 2018: Free World Cup Tickets and Summer Vacation Rentals
Hackers are using the World Cup to dupe people into clicking links in emails. Hackers continue to rely on a tried-and-true method to steal...
 
Get the Google News app
Google News on Google Play Google News on App Store
 
You received this email because Kenneth Hamer-Hodges shared this with you. If you no longer want to receive email notifications of shared content from Google News, unsubscribe here.
 
© 2019 Google LLC
1600 Amphitheatre Parkway, Mountain View, CA 94043

Saturday, March 9, 2019

Friday, February 22, 2019

ZDNet: How one hacked laptop led to an entire network being compromised

ZDNet: How one hacked laptop led to an entire network being compromised.
https://www.zdnet.com/article/how-one-hacked-laptop-led-to-an-entire-network-being-compromised/

The Verge: Why the Ethereum Classic hack is a bad omen for the blockchain

The Verge: Why the Ethereum Classic hack is a bad omen for the blockchain.
https://www.theverge.com/2019/1/9/18174407/ethereum-classic-hack-51-percent-attack-double-spend-crypto

Forbes: After Ethereum Classic Suffers 51% Hack, Experts Consider - Will Bitcoin Be Next?

Forbes: After Ethereum Classic Suffers 51% Hack, Experts Consider - Will Bitcoin Be Next?.
https://www.forbes.com/sites/ginaclarke/2019/01/09/after-ethereum-classic-suffers-51-hack-experts-consider-will-bitcoin-be-next/

PCMag: Evil USB Cable Can Remotely Accept Commands From Hacker

PCMag: Evil USB Cable Can Remotely Accept Commands From Hacker.
https://www.pcmag.com/news/366478/evil-usb-cable-can-remotely-accept-commands-from-hacker

WIRED: The Xiaomi M365 Scooter Can Be Hacked to Speed Up or Stop

WIRED: The Xiaomi M365 Scooter Can Be Hacked to Speed Up or Stop.
https://www.wired.com/story/xiaomi-scooter-hack

MIT Technology Review: Once hailed as unhackable, blockchains are now getting hacked

MIT Technology Review: Once hailed as unhackable, blockchains are now getting hacked.
https://www.technologyreview.com/s/612974/once-hailed-as-unhackable-blockchains-are-now-getting-hacked/

Thursday, February 7, 2019

My Publications

Fault Resistance and Recovery within System 250. ICCC USA 10.1972 Fault Tolerant Multiprocessor Design for Real Time Control. Computer Design 12.1973 Multiprocessor Controlled Switching Systems. CNET/CNRS France 7.1975 A System for the Implementation of Privacy and Security. ICCC 9.1976 Capability Based Systems. Symposium on Operating Systems 11.1977 Lead paper on System 12 Integration and Field Experience. ISS Italy 5.1984 Field Experience of Computer Controlled Switching Systems. FTCS16 Austria 7.1986 A Perspective on Object Oriented Programming. ACM Washington D.C. 4.1988 Chairman WCF on "Broadband Evolution and Campus Drivers" Phoenix, AZ 2.1993 "The Carrier Network Perspective" 7th Broadband Networks, Washington D.C. 11.1993 "SALT and Web-IVR" DeVry University, Florida.NET May 2004 Architecture review of Composite UI Application Block (CAB) for rapid development of Smart Clients - South Florida Code Camp Feb 2007 Architecture Choices for Security - Functionality with Security - Florida .Net Aug 2007

Tuesday, February 5, 2019

Millions of Google, Roku, and Sonos Devices Are Vulnerable to a Web Attack

https://www.wired.com/story/chromecast-roku-sonos-dns-rebinding-vulnerability/

Software Security from Transparent Capabilities

Software security policies, monitor subjects accessing objects, applying access rules. Sadly the rules only apply to a small subset of interactions because the mechanism is identity limited. Calls made by programs within an application like a browser, and the individual machine instructions within programs, go unchecked. Compilers, code reviews and run-time analysis attempt to fill the void with best programming practices. It helps, but security is also threatened by anonymous scripts and downloads that introduce evil lines of code, that spy, steal or cause harm. Moreover, the time of checking and the context of execution differ, while errors from imported scripts are ignored. The internet is hostile and software is vulnerable, so using the web is unavoidably dangerous.
Best practices, operating system calls, and security monitors are unavailable, ignored or bypassed. Logic demands an assured policy check everything. This includes the program calls within a browser or when dealing with email. To realize, comprehensive software security requires digital integrity assured of trusted computers executing trusted instructions. Nothing else covers the full spectrum of threats. The PP250 computer used capability-based addressing to achieve a trusted, comprehensive solution. A stored algebra of capability keys regulates the actions of programs. Every instruction is validated and thus all programs to programs calls are checked. This encapsulation mechanism allows best practices, compilers, languages and code analysis to work. Software survives, succeeds and thrives, even in a browser. Given the concerns over cyber crime, this paper reviews a generic, transparent capability based security system to rekindle interest in this most effective, software security mechanism. View here