Chinese components in American military uses: should we trust them?

Electronics are complicated. Software, even more so. So when you’re buying electronic components from your biggest trade competitor, one with overt military agendas, should you worry about what might be “tagging along” with that hardware or software? How about when sensitive data is moved to the cloud as a cost-cutting measure? “Our clouds are running …

Windows Automated Installation Kit (AIK) for Windows 7 and Server 2008

Installing and deploying workstations or servers at enterprise scale has never really been all that fun, despite plenty of tools to create system images, perform unattended installations, and so forth. Windows Vista and 7 made the game harder, with hoops to jump through if you want to Ghost a golden image. Which makes me very …

Sophos’ Security Threat Report 2012

What do you think our greatest threats are? Phishers, crackers, Nigerian princes? How about hacktivism, a rising force with LulzSec and Anonymous donning Guy Fawkes masks and going to it. Sophos puts out a great series of technical reports. You can read this one at http://www.sophos.com/en-us/security-news-trends/reports/security-threat-report/html-01.aspx

Department of State condemns Iran for doing to Iranians what NSA does to Americans

Department of State, meet the National Security Agency. Left hand, meet the right. Because, dear Department, you want to investigate Chinese firm Huawei for providing technology to Iran that allows the government to monitor and track Iranians through their cell phones. The Department of State “shares the concern of any potential export of technology to …