text
stringlengths 13
81.7k
|
|---|
The growth prospects category measures job, income and gross state product growth forecasts over the next five years from Moody’s Analytics. This year we added a second component for employment growth (it was the only change to the 2014 methodology). EMSI’s “bottom-up” forecasting approach compliments Moody’s “top-down” forecasts. Other factors in the growth prospects category include business opening and closing statistics in each state based on data from the Small Business Administration. We also measured venture capital investments per the MoneyTree report from PricewaterhouseCoopers, the National Venture Capital Association and Thomson Reuters .
|
Quality of life takes into account poverty rates per the Bureau of Economic Analysis and crime rates from the FBI. Other factors include cost of living from Moody’s, school test performance via the Department of Education and the health of the people in the state per the United Health Foundation. We considered the culture and recreation opportunities in the state based on an index created by Bert Sperling, as part of our annual Best Places for Business. We factored in the mean temperature in the state as a proxy for the weather. Lastly, we included the number of top-ranked four-year colleges in the state from Forbes’ annual college rankings.
|
The ATT&CK framework allows security researchers and red teams to better understand hacker threats.
|
The goal of the Mitre researchers is to break down and classify attacks in a consistent and clear manner that can make it easier to compare and contrast them to find how the attacker exploited your networks and endpoints and penetrated your network. To get a general idea of what ATT&CK is all about, watch the short video below that was recorded at a recent BSides conference where one of the developers, Andy Applebaum, describes its origins and how it can be used in everyday operations.
|
Building a great red team in your IT operations staff can be useful on several levels. This team can help you figure out if your current collection of defensive tools is comprehensive enough to identify and stop potential attacks. A red team can be one way to find and fix the gaps in your firewalls and endpoint detection products. A great red team can be an early warning system to find common origins of attacks and to track an adversary’s techniques.
|
Each choice has advantages and disadvantages. Building your own tools is a great way to get what you need, but can be time consuming and expensive. Hiring a consultant is less time-intensive, but could still end up costing you a lot of dough in the long run. Numerous security consultants offer red team penetration-type testing and security monitoring tools and services, from IBM X-Force Red to smaller MSSPs like Network Technology Partners with their ARGISS managed monitoring service. Many consulting firms have their own frameworks or have developed their own tools as part of their practice areas too.
|
If neither of those paths is attractive, you probably will end up using the third method: a variety of open source tools. Here you will find almost too many choices. Some tools specialize in particular attack scenarios, such as PowerShell exploits or the BloodHound tool that is used for testing Active Directory-based exploits. These are great for what they offer, but aren’t very comprehensive. That is where using the ATT&CK classification framework comes into play.
|
As adversaries get more skilled, defenders have to up their game too. By classifying attacks into discreet units, it’s easier for researchers to see common patterns, figure out who authored different campaigns, and track how a piece of malware has evolved over the years as the author added new features and attack methods.
|
While other tools can identify malware hashes and behaviors, ATT&CK is one of the more comprehensive methods that can look at the actual malware components and lay them out in detail. Most modern malware uses a combination of techniques to hide its operation, stage its exploits, evade detection, and leverage network weaknesses. Finding these various building blocks is a key part of defending against their perfidy.
|
The first matrix is a “pre-attack” collection of 17 different categories that help to prevent an attack before the adversary has a chance to get inside your network — when an attacker is reconnoitering your domain, for example. Three matrices, each with a collection for Windows, Mac or Linux endpoints that cover a total of 169 different techniques. Finally, a fifth collection offers additional categories for mobile-based attacks.
|
Each cell of these matrices contains a single tactic, such as forced authentication using Server Message Block (SMB) protocols and how a malware author can use this to gain entry to your network. The framework also contains information on recent malware that uses this technique (in this case, Dragonfly), the way you can detect it (monitor SMB traffic on the appropriate ports), and how you can mitigate its abuse (using egress filters to block SMB traffic).
|
My short description really doesn’t do the Mitre effort justice: If you dive deep enough into ATT&CK, you will find it incredibly rich and detailed, and perhaps overwhelming. It can also be used to fill in gaps of your own knowledge about exploits and malware techniques.
|
Creating a governance committee to decide on future improvements, particularly as more private security vendors begin to offer ATT&CK-based enhancements and tools.
|
Finally, Mitre announced last week that it will develop a new business in using ATT&CK threat model to test various endpoint detection and prevention products. It will release results of these evaluations, the first round of which will be an adversary emulation of APT3/Gothic Panda.
|
Mitre has its own testing tool based on ATT&CK called Caldera.
|
Palo Alto Networks’ Unit42 researchers have developed an adversary playbook based on the Mitre ATT&CK and STIX threat schemas.
|
Endgame has developed a Red Team Automation tool that can create scripts for several dozen ATT&CK techniques for testing endpoint detection tools.
|
Red Canary has its Atomic Red project, which contains a series of automated scripts to test many of the ATT&CK techniques.
|
Uber’s Metta project works with Vagrant and Virtual Box to create a series of test scripts for assembling ATT&CK-based playbooks.
|
All the above tools are free and open source projects. Another tool that isn’t free called AttackIQ FireDrill can script out more complex interactions to evaluate your network risk and vulnerabilities.
|
Each tool has a somewhat different approach to interacting with ATT&CK, and we plan on doing a comparative review in the near future that will showcase their differences, how they are set up, and under what circumstances are they most useful. For example, the Palo Alto playbook is only relevant to exploring the OilRig malware, but it references more than 100 different indicators that cover 19 different ATT&CK techniques, showing exactly how complex a piece of malware it is. If you are interested in building out your red team capabilities, check out what Mitre has put together.
|
Liverpool will face their first serious test of the Premier League campaign when they visit Tottenham Hotspur on Saturday.
|
A perfect start from their opening four games has raised expectations over Liverpool's title credentials, but Jurgen Klopp's men face their first serious test of the Premier League campaign at Tottenham Hotspur on Saturday. After dismissing West Ham 4-0 on the opening weekend of the season, Liverpool have had to show a more resilient approach in narrow victories over Crystal Palace, Brighton and Leicester City, compared to the free-scoring side that romped to the Champions League final last season. Indeed, the only goal the Reds have conceded so far this term came from a howler by 65-million pounds (USD 84 million) goalkeeper Alisson Becker in trying to dribble his way out of trouble at Leicester.
|
Kane will be keen to get back among the goals with lingering questions over his early-season form and fitness in a FIFA World Cup 2018 hangover since picking up the Golden Boot in Russia.
|
And there will be even more responsibility on Kane's shoulders with captain Hugo Lloris and Dele Alli ruled out through injury.
|
But victory for Spurs will take them level with Liverpool at the top of the table for at least a few hours before other front-runners Chelsea, Watford and Manchester City are in action later on Saturday.
|
At the other end of the table, West Ham remain the only side without a point after four games despite a huge transfer spend of nearly 100 million over the summer.
|
Home » News » Bollywood » Is veteran actor and reality show judge Mithun Chakraborty unwell?
|
Is veteran actor and reality show judge Mithun Chakraborty unwell?
|
Although he has not been taking too many projects, we got to see a lot more of Mithun Chakraborty on TV. Thanks to his love for dancing and dance reality shows. But those appearances too became limited owing to his health constraints. Now reports have it that the actor has been unwell yet again.
|
It is a known fact that Mithun Chakraborty was the most loved ‘Grand Master’ in Dance India Dance, a popular dance reality show on Zee Network. The veteran actor, however, had to take a break from his commitments in between for almost a year after he fell ill last time.
|
Mithun Chakraborty earlier had complaints about suffering back problems. For the same, not only did he go on hibernation but also was taking a treatment in Ooty. After his recoupment, he joined his work schedule and also resumed his post as the Grand Master of DID. On the Hindi film front, he was last seen in the Ayushmann Khurrana, Pallavi Sharda film Hawaizaada.
|
But now we hear that same was short-lived. The actor has now expected to have taken off to Delhi for the treatment. Sources have apparently claimed in reports that Mithun is responding to these medications quite positively and will soon be on the road to recovery yet again.
|
We at Bollywood Hungama too wish a speedy recovery to the legendary actor.
|
How far away from the restaurant is your ever-tardy husband? New Google mobile phone software lets you find out, as long as he's sharing.
|
Just because the Internet has broken down geographic barriers, don't assume that Google doesn't care about geography.
|
The company plans to launch software called Latitude on Wednesday that lets mobile phone users share their location with close contacts. Google hopes it will help people find each other while out and about and to keep track of loved ones.
|
"What Google Latitude does is allow you to share that location with friends and family members, and likewise be able to see friends and family members' locations," said Steve Lee, product manager for Google Latitude. For example, a girlfriend could use it to see if her boyfriend has arrived at a restaurant and, if not, how far away he is.
|
To protect privacy, Google specifically requires people to sign up for the service. People can share their precise location, the city they're in, or nothing at all.
|
"What we found in testing is that the most common scenario is a symmetrical arrangement, where both people are sharing with each other," Lee said.
|
The software spotlights Google's fixation with mapping and location technology. Location is an important part of navigating the real world, and Google clearly sees its geographic services as a way to establish a more personal connection with customers who today use Google chiefly for the virtual realm of the Internet. And of course money is involved, too: Google hopes its mapping technology will lead to location-based advertising revenue.
|
Google's power is firmly lodged in search and search advertising, but the company is trying to expand to broader online services, too. That includes online documents and various aspects of social networking, which are much more personal services and ones that put Google into more direct competition with rivals such as Microsoft, Facebook, and Yahoo. Like using Google profiles to contact information with select contacts, using Google Latitude tells Google who's who in your social graph.
|
Latitude is part of Google Maps for Mobile, the company's mapping software for mobile phones, but also can be used through a gadget loaded onto its iGoogle customized home page. It'll work in 27 countries at launch, Google said.
|
Initially, it will work on most color-screen BlackBerry phones, most phones with Windows Mobile 5.0 or later, and most Symbian-based devices such as Nokia smartphones. An update to the Google Android operating system now being distributed to the T-Mobile G1 phone also enables it, and iPhone and iPod Touch users will get the option "very soon," Lee said.
|
Latitude uses Google's technology to judge a user's location not just by GPS satellite, but also by proximity to mobile phone towers and wireless networks.
|
That's a much more automated approach than the manual "check-in" process used by Dodgeball, a service that Google decided in January to shut down.
|
Other competitors exist, though. BrightKite and Loopt offer mechanisms for people to find each other by mobile phone, for example. Then there's MobiFriends, Tripit, and Dopplr.
|
And Google's clearest competitor, Yahoo, offers some competition with Fire Eagle. That service doesn't provide location information, but it does provide a mechanism to centralize people's geographic privacy choices, in effect taking care of some of the social graph management when it comes to location information.
|
To use the service, you need a Google account to record who has permission to see your location. For choosing who gets to see your location, you can use contacts stored with Gmail or Picasa, Google said.
|
With the service, you can hide from specific people or disappear altogether. And you can manually set a specific location if, for example, your phone can't show it with sufficient precision or if you wish to tell someone a white lie about whether you really aren't going to go to the candy store.
|
Google envisions two broad classes of people with whom you might want to share location information. First is a small, close-knit circle of friends and family with whom you're willing to share your exact spot. Second is a larger group with whom you're happy to share city-level detail, convenient for finding out when somebody's in town but not much more.
|
When somebody is close, the software lets you contact the person various ways--by calling or sending an e-mail or text message, for example. It also lets you hide from that specific person.
|
Privacy is of course a significant concern when it comes to sharing this sort of information. If you want to use Latitude, you must specifically enable the service.
|
Meeting your pals at a bar is an obvious example of the software's possibilities, but there are softer cases I see as useful, too.
|
Lee pointed to a case where a friend's girlfriend, though far away in Seattle, will "virtually place herself next to him." That sounds a little sappy for my tastes, but I can still relate. My wife is on the other side of the country right now, and it would be heart-warming to see just where. There are a lot of occasions where technology is better for maintaining relationships than it is for establishing them, and this looks like one to me.
|
Well this is interesting. On what has become known on social media as "Throwback Thursday" the Charlie Crist campaign for Florida governor has posted a February 2009 video of his infamous speech welcoming President Barack Obama to the Sunshine State.
|
At the time of Obama's visit to Fort Myers, the nation's economy had collapsed and Florida was one of the hardest hit states.
|
In his introduction of the President, the Crist, then a Republican, alks about how Florida balances its budget, the need to cut the state budget while not raising taxes, and the importance of the stimulus package "to help education, to help our infrastructure, and to have health care for those who need it the most, the most vulnerable among us."
|
Crist goes on to say: "We need to do it in a bipartisan way. This issue about helping our country is about helping our country. This is not about partisan politics. This is about rising about that, helping America and reigniting our economy."
|
At the end of his brief remarks, Crist reaches out to shake Obama's hand and Obama leans into Crist turning the shake into a sort of hug that would become the rallying cry for Tea Party voters who loathed Obama.
|
Crist's plans to become a U.S. senator went up in flames as Republican Marco Rubio deftly capitalized on Tea Party anger to throw Crist out of the Grand Old Party and get himself elected to the Senate.
|
One might think that this 1 minute and 42 seconds that helped stall Crist's political career would be something he would rather forget.
|
And the newly minted Democrat does not appear ready to abandon Obama.
|
Expect Governor Rick Scott's campaign to fire back at this video.
|
Will Charlie Crist find his voice and help Florida Democrats find one as well?
|
Dissecting the Republican theme in the governor's race "Crist crash, Scott surge"
|
Brendan Price joins UC Davis from the Massachusetts Institute of Technology, where his dissertation studied how workers and firms adjust to globalization, technological change, and labor market reforms. A Research Affiliate of the UC Davis Center for Poverty Research, Dr. Price has broad interests within labor economics, public finance, spatial economics, and international trade. He specializes in the study of US and European labor markets using applied microeconomic tools paired with large-scale administrative datasets. Current projects include a firm level analysis of how Chinese import competition has reshaped the US labor market; a study of how "cohort-crowding" impacts hiring and training in entry-level labor markets; and an evaluation of Germany's Hartz IV reform, which overhauled the provision of long-term unemployment benefits.
|
Dr. Price will teach Ph.D. Labor Economics in the winter quarter and Intermediate Microeconomic Theory in the spring. A native of the Northeast, he enjoys hiking, kayaking, running, and poetry.
|
A team of cryptography experts is confident they have the answer as to how the NSA and other intelligence agencies break individual encrypted connections.
|
The great mystery since the NSA and other intelligence agencies’ cyber-spying capabilities became watercooler fodder has not been the why of their actions, but the how?
|
For example, how are they breaking crypto to decode secure Internet communication?
|
A team of cryptographers and computer scientists from a handful of academic powerhouses is pretty confident they have the answer after having pieced together a number of clues from the Snowden documents that have been published so far, and giving the math around the Diffie-Hellman protocol a hard look.
|
The answer is an implementation weakness in Diffie-Hellman key exchanges, specifically in the massive and publicly available prime numbers used as input to compute the encryption key.
|
The team of 14 cryptographers presented their paper, “Imperfect Forward Secrecy: How Diffie-Hellman Fails in Practice,” this week at the ACM Conference on Computer and Communications Security, which explains that given the budgets at the disposal of the NSA, for example, such an agency could build enough custom hardware and invest the time required to derive an output that would give the attacker “intermediate” information that would eventually lead to the breaking of individual encrypted connections.
|
The prime numbers are the most likely target, he said, because they’re usually not generated from scratch, instead are plucked from previous work or taken from recommendations in established standards. Halderman told Threatpost that an intelligence agency of the NSA’s caliber would need to spend hundreds of millions of dollars to build the custom hardware required for such a large computation.
|
The paper explains that Diffie-Hellman picking a prime number from an available pool was an implementation choice that makes sense from a development standpoint, but is a disastrous choice in the context of security and privacy.
|
Most at risk if a common 1024-bit prime is broken, the paper says, are IPsec VPNs, 66 percent of which rely on Diffie-Hellman key exchanges. Such an attack would also break 26 percent of SSH connections and 18 percent of HTTPS connections on the top one million domains.
|
From the Snowden documents we already know the NSA had the capability and motivation to passively snag traffic from Internet backbones, collecting encrypted VPN traffic for example. Halderman said an attacker could then send that collected traffic back to the purpose-built supercomputer which hacks away at the math until the key is derived.
|
The NSA’s black budget, which was explained in a Snowden document, includes $1 billion annually for computer network exploitation, and other related programs afforded hundreds of millions for the same task, putting this type of attack within range of the agency.
|
In the meantime, it’s likely going to be years before this is properly addressed, Halderman said, because so many protocols are affected.
|
Fascinating article! The huge (and hugely expensive) upfront task of finding the DH weakness could be seen as a deterrent to every hacker or hacking community out there. Even most nation-state actors. But the NSA is not most actors, they certainly have shown the appetite and have the budget to pull it off. Unfortunately it may have pulled out the underpinnings of a huge swath of existing Internet security as well.
|
So RSA is susceptible to breaking with quantum computers, DH suffers from massive implementation mistakes. What does it leave us with?
|
Absolutely right. We also have further evidence to support this, from the evidence of tampering with the random functions to allow prediction of the next bit, & therefore the selected prime(s) then used in the maths. I've also thought about a system that would literally use prime numbers as a regular computer users integers. Stunningly computationally expensive to get started, but once the work is done the entire field is open, much as you suggest here. Consider a rainbow table of enormous primes. Yes, the number of primes is infinite, but only in the infinite set. We are bounded by 1024bits, so "only" 2^1024 ÷ log 2^1024 are prime from that set. Discard those that are too small and the set becomes far more manageable. Add in the fact that you record what the result of each bit of maths said in another enormous database from which you can pull the previous answer, & "small" systems that use only 1024 bits become easy targets. Bigger keys are clearly one answer, but moving to eliptic curves might be a better one.
|
This isn't a flaw in the protocol, but in the math? Somehow I doubt that anyone affected cares one iota about this subtle distinction, or even has any idea whatsoever as to its meaning.
|
Thanks for that annoying comment "Dr Haliard". I find the article easy to digest as a non crypto expert. Thanks for a great article.
|
Yah. Great. Now. 14 people figured that out on a relatively benign budget. NSA reportedly employs (tens of?)thousands of crypto experts.And they have an almost limitless budget. We should just realise we live in civil world, are permitted some privacy. Unlike high confidentiality environments requiring secret sauce.
|
Rep. Mark Meadows, R-N.C., chairman of the conservative House Freedom Caucus, with Rep. Chris Collins, R-N.Y., right, heads into a House Republican strategy meeting with Vice President Mike Pence ahead of President Donald Trump's speech on funding a wall on the US-Mexico border, at the Capitol in Washington, Tuesday, Jan. 8, 2019.
|
No retreat, no surrender is how President Donald Trump frames his decision to temporarily reopen the government while still pursuing a border wall deal.
|
Some of his conservative backers have a different take: "pathetic" and "wimp."
|
Other Trump supporters seem willing to give Trump the benefit of the doubt, yet they insist that any ultimate government funding deal the president signs must include money for a wall.
|
Trump defended himself Saturday from the conservative backlash to his decision to end the 35-day-old partial government shutdown — the longest in U.S. history — without money for his promised border wall. He said if he didn't get a fair deal from Congress, the government would shut down again on Feb. 15 or he would use his executive authority to address what he has termed "the humanitarian and security crisis" on the southern U.S. border.
|
After he announced his decision, a New York newspaper headline dubbed him "CAVE MAN."
|
Conservative commentator Ann Coulter, a big wall supporter, called Trump the "biggest wimp" ever to occupy the Oval Office. A conservative news outlet, Breitbart, dubbed Trump's announcement on Friday a "short-term surrender to Democrats."
|
Trump insists he didn't cave to anyone and said the standoff with Democrats was far from over.
|
"Negotiations with Democrats will start immediately," Trump tweeted on Saturday. "Will not be easy to make a deal, both parties very dug in. The case for National Security has been greatly enhanced by what has been happening at the Border & through dialogue. We will build the Wall!"
|
Earlier, Trump tweeted: "This was in no way a concession. It was taking care of millions of people who were getting badly hurt by the Shutdown with the understanding that in 21 days, if no deal is done, it's off to the races!"
|
While some of Trump's backers have lobbed insults at the president, others are willing to give him more time to negotiate.
|
"I'm a pragmatist. I understand when you're fighting a battle like this you have to do what's necessary to keep certain parts of the government moving," said Jerry Falwell Jr., president of Liberty University and a Trump confidant. "I think you have to do things like this to achieve a greater goal in the end. I believe that's what he's doing."
|
Falwell encouraged Trump to declare a national emergency if Democrats haven't agreed to wall funding by the time the current deal expires.
|
Another evangelical leader with Trump's ear, Family Research Council president Tony Perkins, said the president was smart to end the shutdown, even if some conservatives are angry.
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.