The Association for Computing Machinery] (ACM) , has awarded Michael Stonebraker, Ph.D., Adjunct Professor at Massachusetts Institute of Technology (MIT) the 2014 ACM A.M. Turing Award for architectural contributory efforts targeting database management systems (DBMS).
"The ACM Turing Award, widely considered the “Nobel Prize in Computing,” carries a $1 million prize with financial support provided by Google, Inc. It is named for Alan M. Turing, the British mathematician who articulated the mathematical foundation and limits of computing. “Michael Stonebraker’s work is an integral part of how business gets done today,” said ACM President Alexander L. Wolf. “Moreover, through practical application of his innovative database management technologies and numerous business start-ups, he has continually demonstrated the role of the research university in driving economic development.” - via Bruce Shriver at the Association for Computing Machinery
"The Combo Breaker can guess all three numbers on its own within a few minutes, but if you manually find the first number that makes the dial get stuck when you pull on the shackle, then Samy’s device can open the Master combination lock within 30 seconds, using a maximum of only eight attempts. To be more precise, Samy’s technique will give you the exact first and third numbers of the combination, plus eight possible second numbers." - via TechnoBob's Lambert Varias
The Eight Irari Rules:
The malware used should have been detected.
The attack exploited vulnerabilities where a patch was available.
Multifactor authentication was not in use on critical servers.
Static passwords were used in attacks on critical servers.
If phishing was involved, there was no awareness program in place that went beyond phishing simulations and computer-based training.
Detection mechanisms that could have stopped the attack in progress were not in place or were ignored.
There was poor network segmentation that allowed the attackers to jump from low-value networks to critical systems.
User accounts that were compromised had excessive privileges.