Highest Rated Comments


badp4nd4108 karma

Probably the scariest thing is that you don't know if you are compromised or how.

Zero day exploits leverage methods to compromise your computer, phone, car, etc. We know this is actively going on and put trust in vendors and security researchers to discover, report and patch.

But seriously, who do you think is better funded, criminal groups or corporate IT Security research?

I think this quote from a recent security report regarding "Project Sauron", a malware recently discovered, sums up why you should be afraid:

"A common organization hit by a serious actor such as Project Sauron can hardly cope with proper detection and mitigation of such a threat on its own. As attackers become seasoned and more mature, the defending side will have to build an identical mindset: developing the highest technical skills comparable to those of the attackers in order to resist their onslaught."

badp4nd455 karma

IF Mila Kunis drinks Jim Beam I would be very surprised, I've known homeless people who turn down Jim Beam.

Edit: Jim Beam Drinkers, I meant no offense and offer this popular Jim Beam sub for your consideration.

badp4nd41 karma

Is it true that most Chinese workers are happy to have a job and a wage? Or are they mostly discontent and worked to the bone?

There was a Ted Talk on this where they interviewed a few factory workers who by western standards were overworked and underpaid, but they seemed to be happy and content.

Here is the Talk.

Leslie T. Chang :The voices of China's workers

badp4nd41 karma

In total, how many (suspected) terrorists have you managed to catch so far?

badp4nd41 karma

  1. What are your feelings of vulnerability disclosure now becoming monetized?

  2. If a company like Target can get completely owned, with sensors blaring at them daily, for months, do you believe there will ever be a fix to the "people" problem of security?

  3. Do you believe there should ever be some sort of formal regulation of security controls on the internet, such as baseline requirements for securing services so they aren't abused for spam, DNS amplification attacks, etc?