Implementing Delegated Administration with the ForgeRock 5.5 Platform – ForgeRock Forum and Blog

Implementing Delegated Administration with the ForgeRock 5.5 Platform – ForgeRock Forum and Blog
— Read on


Watch: Kangaroo boxes flag at Australian golf course –

An Australian woman practicing her golf game at a local course came upon an unusual hazard on the fifth green — a kangaroo boxing with the flag.
— Read on

US food inventory… apparently pecans are more important than I realized.

Interesting, but not arranged by food groups. Unless you’re one of those people who consider pecans a food group. Lol. #ScratchingMyHead at how pecans get their own category and get listed in the first position.

Apple, IBM add machine learning to partnership with Watson-Core ML coupling | TechCrunch

Nice step in closing gaps between ML training, usage, feedback, and retraining. Hopefully it will also evolve into a service that independent app developers can use.

Apple, IBM add machine learning to partnership with Watson-Core ML coupling | TechCrunch
— Read on

How to Group Mac App Icons More Prominently in Your Dock – Mac Rumors

In macOS, the Dock provides convenient one-click access to your most frequently used Mac applications. The simplest way to organize docked apps is to…
— Read on

Machine Learning on local devices still is not real machine learning. The article refers to iPhoneX’s new chip and the “CoreML” SDK. Unfortunately, training the ML model still has to occur somewhere else.

ML requires training a model to recognize inputs. It’s impossible to create one ML Model to recognize all possible real world situations, so it’s necessary to continue collecting data, “retrain” the model, and redeploy the updated model.

For anyone who’d rather not ship all of their information to someone else’s cloud, we’re still years away from real ML capabilities for our own devices.

If anyone knows of an available ML solution that can perform continuous training/learning on a local device, I’d love to hear about it.

Overview of privacy concerns with iPhoneX FaceID (and other facial recognition utilities). The note that companies have been patenting abilities to recognize emotions (and health) should raise concerns.

ByTheWay… you don’t have to own one of these devices to have your privacy violated… simply being in range of someone else’s camera opens the door to abusive companies.

Apple MacOS High Sierra security/root bug

If you’ve updated to MacOS High Sierra (OSX 10.13), this is not good news.  Although Apple released a bug fix, it should really give security conscious users some pause.

There are some good overviews of how to harden MacOS/OSX, but I haven’t seen an updated guide that specifically addresses this latest problem (researchers just haven’t had time to investigate the underlying problems and the full extent of what Apple changed and what is affected.  Despite that gap, reviewing a hardening guide and applying relevant procedures is still a good practice.  Here’s a couple references to get you started.

Additionally, here’s a link to a good description of the root account security bug and a manual procedure which hardens the system against this problem.  Conversations in the SecKC community and other security community confirmed the vulnerability and confirmed this manual config appears to address the problem.

Unfortunately this manual approach probably isn’t for most home/casual consumer users.  It requires using the Terminal and some advanced features most users never interact with.  And it introduces a security configuration which would probably complicate future updates and changes for many people.

Bottom line. Apple really messed up.

So what should you do?  If you’re a security conscious person with system administrator skills, you should spend the time it takes to harden your system (and test that hardening).  If your not a sys admin, update update update.  And keep checking for more updates over the next days and weeks.

Search Engine Optimization (SEO) is like whack-a-mole.

For the tl:dr crowd…  Google’s algorithms are constantly changing; and no matter the topic work in a least one mention of cats.  LOL.

Brand Hijacking: doppelgänger domains, typo squatting, and counterfeit apps

Does your cyber security program address doppelgänger domains, typo squatting, and counterfeit apps?Organizational impersonation (brand hijacking) uses your reputation to dupe a victim. These attacks never hit your firewalls.  

Let that sink in. A brand impersonation/hijacking attack is unlikely to touch any of you apps, websites, networks, firewalls, or logs. It occurs completely outside of and independent of any resources under your organizational control.

Fortunately, basic defenses against these kind of risks can be implemented with rather simple tools; yet, this topic is overlooked by many organizations and security teams. Yet, it yields a two for one benefit… the same practices that reduce risks of brand hijacking are also applicable to verify the apps and services your organization consumes from others are legitimate and secure.