It’s years since I’ve had a tourist trip to Rome. I visit the Eternal City on business from time to time, but as a tourist … it’s been five, maybe eight years since I last had the chance. That’s why, having got a free day today, I decided to embark on a whistle-stop tour to stimulate my mind and stir my emotions, without wiping myself out in the process. I’d recommend it to anyone who doesn’t mind spending six or eight hours on the go, always on their feet apart from a quick bite for lunch …
I’ll never forget Oktoberfest 2010 for as long as I live. Yes, I like beer, especially the German stuff, and especially at Oktoberfest. But I don’t even remember the beer, and that’s not because I had too much of it :) It was at that time we received the first news of a very unpleasant trend, which I had feared for a number of years. That’s right, it was the first time Stuxnet reared its ugly head – the first malware created with state backing and designed to fulfill a specific military mission. This is exactly what we had talked about at our Oktoberfest press conference: “Welcome to the age of cyber warfare!” It was already obvious then that Stuxnet was just the beginning.
Indeed, little has changed since that September right up to the present day. Everybody had a pretty good idea where Stuxnet came from and who was behind it, although not a single state took responsibility; in fact, they distanced themselves from authorship as much as possible. The “breakthrough” came at the end of May when we discovered new malware which also left little doubt as to its military origins and aims.
Yes, I’m talking about Flame.
Rides come in all sorts of different shapes and sizes. On water skis, under sail, on horses, bikes, motorbikes, rollerblades… But for some reason what really gets my heart pumping are rides of the very fast kind in motor cars. And here I am – at the stage of the season of the Ferrari Challenge. Italy, Tuscany, the Mugello Circuit.
There are hardly active volcanoes in Europe; well, not including those unpronounceable ones in Iceland, that is. Mainland European volcanoes are to be found only in Santorini in Greece and in Italy. And it’s of course Mount Etna that’s the champion in terms of height (but not necessarily on other attributes – Santorini is much more colorful and generally far more impressive to look at).
So, Mount Etna. It’s only a few hours from any point in Europe, so if any Europeans reading this still haven’t been to a real smoking volcano, Mount Etna’s for you for your first volcano visit. It’s always advisable to wait for the next eruption to ensure the experience is a maximally intense Magical Mystery Tour, but here eruptions are real frequent – so you shouldn’t have too long to wait. So off you pop – to Sicily!
The one con: they don’t let you get to the very top! Eh, what’s that all about? What a let-down! The wide area around the peak’s surrounded by a white rope barrier and you’re not allowed to cross it, so taking in the breathtaking fantastical landscapes here is possible only from a cordoned-off tourist viewing area well below the summit.
There’s an attendant pro though: it’s possible to step over or go around the “barrier”, and no one seems to keep watch so you can get away with it! Naughty!
Oh how I love long haul flights – you can get through all your work you’ve been putting off for days or weeks, finally get through your latest book, watch a film you’ve had your eye on, study some geography through the window (I prefer to book a window seat), and intermittently in-between all that – simply catch some ZZZs – that is, if the plane isn’t being rocked around by turbulence, no one’s pestering with their phone calls or e-mails, and the stewardesses are only very infrequently offering meals or another Manhattan (for those who read my last post – you’ll notice I like to rotate my classic cocktails:).
I recently completed one such avia-marathon, from Australia to Italy, 35 hours door (of hotel) to door (of hotel), almost 22 hours in the air, and the rest of the time spent on connections and waiting in airports (with the usual war with Wi-Fi) plus road journeys between hotels and airports and vice versa. It all adds up to an absurdly long time spent on a journey – so long it looks like a record: I’ve never had a day and a half traveling before; that is, besides a couple of force majeure instances.
The second leg of the journey was the most interesting: we flew over India, Pakistan, Afghanistan, Iran, Azerbaijan, Georgia, the Crimea, and then on to Romania and the rest of southern Eastern Europe to Italy. By the way, this completes my first time round-the-globe this year; my second one’s coming up soon. It’s a pity we only flew at night, since all I could see out of the windows were stars (Let There Be More Light!), then come the morning all that could be seen were the snow-covered Austrian Alps. Still, there was plenty going on in my booth inside the plane to make up for the lack of visible external scenery down below…
The Great Ocean Road, Australia. I can now say I’ve been there, traveled that, got the… confirmation: it’s another must-see place in the world. And +1 to my list…
So just what is the Great Ocean Road? Surprisingly, it’s a road. It’s also great, as in both great – super, and great – long; and it mostly hugs the ocean shore. It was built in the early part of the last century along a stretch of the craggy coast of the southeastern Australian state of Victoria. It’s rich in heritage, incredibly curvy, and offers breathtaking views from the road itself and also just off it a little inland – you just need to leave the road a hundred meters or so to get extra special views at the right, marked places.
My recent mention of Apple in a speech at CeBIT Australia initiated the usual flurry of chatter and publications regarding the company’s approach to security. As Apple’s security seems to be a hot topic of late (since Flashfake), I think this is an opportune time to talk some sense about this issue. As you’ll know, today we see a widening rift between, on the one hand, Apple’s long-term alleged ‘Macs are malware-invincible’ campaign, and on the other – reality, i.e., that this campaign is… losing credibility, to put it mildly. So, will users have the nous to get to understand the real state of affairs, despite what Apple keeps telling them? What’s wrong with Apple’s security approach? Is there anything Apple can learn from Microsoft and other vendors in terms of security? …
Australia. A huge territory, practically completely covered with desert, with thin inhabited zones along the coast. There are some populated areas inland, but not all that many.
The population of Australia is around 22 million (the 54th largest in the world); GDP is almost a trillion US$ (18th in the world – between Iran and Taiwan); and per capita income is US$40K (19th – between Austria and Kuwait) (source: CIA World Factbook).
You don’t need to hear it from me that the Internet is a really interesting phenomenon, and mega-useful for all those who use it. But at the same time its openness and uncontrollability mean that a ton of unpleasantness can also await users – not only on dubious porno/warez sites, but also completely legitimate, goody-two-shoes, butter- wouldn’t-melt-in-mouth sites. And for several years already the Internet has been a firm fixture on the list of the main sources of cyber-infections: according to our figures, in 2012 33% of users have at least once been attacked via the web.
If you dig deeper into the structure of net-based unpleasantness, you always come across three principle categories of threats: Trojans, exploits, and malicious tools. According to data from our cloud-based KSN (video, details), the break-down is as follows:
The ten-percenter in the above pie chart as you can see belongs to so-called exploits (their share will actually be greater in reality, since a lot of Trojans have a weakness for exploiting… exploits). Exploits are mostly exotic peculiarities to non-professionals – while a real headache for security specialists. Those of you more in the latter category than the former can go straight here. For the rest of you – a micro-lesson in exploits…