I thought the CIA’s “best practices” for coding malware were interesting. It’s basically a list of things you have to consider when dealing with a sophisticated attacker. Basic audit features aren’t enough if your data and systems present an attractive target.
The Des Moines Register reports that an information security officer used malicious code to manipulate lottery results in Wisconsin, Colorado and Oklahoma. Apparently Examiners found out-of-place programs known as dynamic link libraries, or DLLs, that had been written onto the Wisconsin computer. The programs were designed to “redirect” a drawing if certain conditions were met… […]
A 2012 study of National Health Service data in the UK found that there were over 17000 male inpatient admissions to obstetric services over 8000 male inpatient admissions to gynecology nearly 20000 male inpatient admissions to midwifery Before jumping to the conclusion that the UK is at the forefront of an exciting/disturbing evolutionary trend we […]
The Microsoft Data Science Virtual Machine (DSVM) now comes pre-configured with Microsoft R Server Developer Edition. As you can scale the DSVM according to your needs, this is an easy way to get going with some heavy duty R computations.
IBM just published an article describing what they claim to be the top three spreadsheet errors of this decade—so far. Spreadsheets errors caused the sale price of Tibco Software to be overstated by $100m fatal errors in an oft-quoted fiscal austerity research project 10,000 sports fans to miss a synchronised swimming event at the 2012 […]