CFLs, mercury and you

A coworker of mine recently posted an article warning of the eminent dangers posed by CFLs or Compact Fluorescent Lightbulbs. (those power sipping twisty-twirly replacements for regular light bulbs) Having recently purchased a number of them in my never ending quest to reduce my energy consumption, I was initially quite alarmed. Were these supposedly environment saving devices actually ticking time-bombs waiting to go off? I knew that just like regular fluorescent lights, CFLs contain mercury, and I’d read about the problems of mercury and fish in the news. It seemed pretty clear that this was a problem until I read a page on the U.S. EPA’s website about mercury exposure. As it turns out, it’s not the pure elemental mercury (ie: the mercury you see in thermostats and don’t see in fluorescent bulbs) that’s really dangerous to humans, but rather another form of mercury called methylmercury that is very harmful to us. So, that’s great right? Unfortunately it’s not that simple. The way we humans generally come into contact with methylmercury is that we release elemental mercury into the environment. (mostly from the emissions of coal-fired power plants) The heavy metal element, with the help of rainwater gets deposited into soil and sediments where it gets converted by bacteria into methylmercury. Those bacteria get eaten by larger and larger organisms and eventually end up on our dinner table. So, back to the bulbs. They aren’t a direct threat, but we need to make sure we treat them properly. The problem is, for the most part, we probably aren’t doing that. So, if you’re using CFLs or regular fluorescent bulbs (and most of you probably at least use the latter) please make sure you aren’t just throwing the bulbs in the trash. Check with your local authorities to find out about recycling options and proper disposal practices. Maybe, just maybe we can save energy and the environment at the same time.

WEP, 0 to hacked in 60 sec.

WEP key wireless cracking made easy | The Register

If you’re one of the many people still using older wireless gear that doesn’t support WPA, it may be time to toss it. A group of German cryptography researchers has modified a tool called aircrack, greatly reducing the amount of time it takes to recover the WEP key. While the weakness of the WEP encryption scheme has been widely known for years, there hasn’t been a tool that could break the encryption so quickly until now. This could give would be wireless leeches easy access to your encrypted wireless network, no matter how clever your password is. While the intrusion is bad enough, it also exposes you to the legal consequences of anything someone might do while connected. If you’ve got wireless, but no WPA, now is the time to get it. If you don’t know how, get help or turn it off.

Researcher details Apple flaw

Maynor reveals missing Apple flaw

At last year’s Black Hat convention security researcher David Maynor gave a short video presentation in lieu of an actual exploit demo. The video is deceptive because Maynor claims to be using a 3rd party card, but the Macbook he claimed to be using it on had no place to plug it in. Many took this to mean that the entire presentation was a fraud, without reading between the lines. Maynor has now revealed details he was previously under legal pressure to keep to himself. These details now reveal that even though the flaw was in a 3rd party driver, Apple still pressured Maynor to keep it quiet. Apple later fixed the flaw, but did not give Maynor or his colleague Jon Ellch credit. Apple even went so far as to craft a blog entry intended to be posted by Maynor disclaiming any possible threat to Apple laptops. Maynor is now at a new company and has vowed not to inform Apple of any new flaws he finds. Apple needs to learn an important lesson here. Pushing researchers away only ends up hurting you as your source of information dries up.