rePost:Who Makes The Rules Win:Annals of Innovation: How David Beats Goliath: Reporting & Essays: The New Yorker

Great Read from the ever reliable Malcolm Gladwell

It isn’t surprising that the tournament directors found Eurisko’s strategies beyond the pale. It’s wrong to sink your own ships, they believed. And they were right. But let’s remember who made that rule: Goliath. And let’s remember why Goliath made that rule: when the world has to play on Goliath’s terms, Goliath wins.
via Annals of Innovation: How David Beats Goliath: Reporting & Essays: The New Yorker.

Reblog this post [with Zemanta]

Why I Don't Use Safari::iTWire – Mac hacked in under 10 seconds at PWN2OWN

Safari
Image via Wikipedia

from here:
Mac hacked in under 10 seconds at PWN2OWN E-mail
by by Davey Winder
So just how secure is your Apple computer now that Mac hacker supremo Charlie Miller has broken into a MacBook in less than 10 seconds?

The annual CanSecWest PWN2OWN competition is always guaranteed to grab a few headlines and spark off another OS Wars flame. Last year security researcher Charlie Miller managed to hack a Mac in a rather astonishing two minutes flat.
This year he pulled off the same feat to win the contest, the MacBook he hacked and a US $5000 prize. Well the same feat but a lot quicker: how does Mac hacked in under 10 seconds grab you as a headline?
Although full extent of what the hack entailed remain a little sketchy, with Miller refusing to reveal the vulnerability details at this time, it is known that both the MacBook and the version of
The reason for that lack of detail would appear to wrapped up in the fact that the cash prize also took the form of a payment from the competition sponsor,
Obviously the whole cracked in 10 seconds thing is worrying, but just how worried should you be if you are a Mac or Safari user? Truth be told, I am not convinced that this is as big a deal as it sounds.
Yes, any vulnerability needs investigating. But the under 10 seconds thing was only achieved because Miller simply provided a
Miller says that he provided the link, the judges clicked it and he then showed them he had full control of the MacBook concerned.
via

Reblog this post [with Zemanta]