Sunday, December 10, 2017

[1712.02494] Adversarial Examples that Fool Detectors

[1712.02494] Adversarial Examples that Fool Detectors (like face ID?)

https://arxiv.org/abs/1712.02494

Friday, December 8, 2017

Gartner Says 8.4 Billion Connected "Things" Will Be in Use in 2017, Up 31 Percent From 2016

Gartner Says 8.4 Billion Connected "Things" Will Be in Use in 2017, Up 31 Percent From 2016: Gartner, Inc. forecasts that 8.4 billion connected things will be in use worldwide in 2017, up 31 percent from 2016, and will reach 20.4 billion by 2020. Total spending on endpoints and services will reach almost $2 trillion in 2017.

Suncast 4 ft. 10 in. W x 6 ft. 8 in. D Plastic Horizontal Tool Shed & Reviews | Wayfair

Suncast 4 ft. 10 in. W x 6 ft. 8 in. D Plastic Horizontal Tool Shed & Reviews | Wayfair: "Suncast Horizontal Shed are a just-the-right-size storage option because they fit in places other Shed can't. "



'via Blog this'

Search operators you can use with Gmail - Gmail Help

Search operators you can use with Gmail - Gmail Help: "older_than:"



'via Blog this'

Thursday, December 7, 2017

Google Surveys - Survey report

Google Surveys - Survey report: Do you think problems with technology, like computer hacking and network outages, pose a risk to your security and well-being?



https://surveys.google.com/reporting/survey?survey=l2s523nabpjiqi7ssui5mbyaya

The Economics of Cyber Attacks – Ponemon Research

The Economics of Cyber Attacks – Ponemon Research: In a new research report by the Ponemon Institute, “Flipping the Economics of Attacks,” adversaries share their own insights on when attacks become unprofitable.

Thursday, November 30, 2017

More Industrial Products at Risk of KRACK Attacks | SecurityWeek.Com

More Industrial Products at Risk of KRACK Attacks | SecurityWeek.Com: Siemens said the KRACK vulnerabilities affect some of its SCALANCE, SIMATIC, RUGGEDCOM, and SINAMICS products. The company is working on releasing updates that will address the security holes and, in the meantime, it has provided some mitigations.

Opioid Use for Osteoarthritis Is Prevalent | Rheumatology Network

Opioid Use for Osteoarthritis Is Prevalent | Rheumatology Network: The highest rate of opioid use, at 40%, was found in patients who had spine osteoarthritis.

Tuesday, November 28, 2017

Threat Predictions for Industrial Security in 2018 - Securelist

Threat Predictions for Industrial Security in 2018 - Securelist: 2017 was one of the most intense in terms of incidents affecting the information security of industrial systems.

Don’t get lost in translation, use SurveyMonkey Audience in 16 languages

Don’t get lost in translation, use SurveyMonkey Audience in 16 languages | Curiosity at Work: SurveyMonkey Audience, the easiest DIY market research solution, has just amplified your ability to make an authentic connection with consumers around the world.

Watch thieves clone a Mercedes key from outside the owner’s house, stealing his car in seconds

ROCA 'round the lock: Gemalto says IDPrime .NET access cards bitten by TPM RSA key gremlin • The Register

TPM update - Infineon Technologies

Information on TPM firmware update for Microsoft Windows systems as announced on Microsoft`s patchday on October 10th 2017

https://www.infineon.com/cms/en/product/promopages/tpm-update/?redirId=59160

Infineon Trusted Platform Module (TPM) Vulnerability (CVE-2017-15361) : Impact Status on Dell Products | Dell US

Monday, November 27, 2017

ROCA: BLAMING INFINEON IS THE EASY WAY OUT

timestamping a legally binding digital signature is not yet mandatory,

https://www.rsa.com/en-us/blog/2017-10/roca-blaming-infineon-is-the-easy-way-out

Vulnerability in TPM could allow Security Feature Bypass

"After the applicable Windows update is applied, the system will generate Event ID 1794 in the Event Viewer after each reboot under Windows Logs - System when vulnerable firmware is identified."



'via Blog this'

FSE 2018

FSE 2018: Fast Software Encryption 2018 will take place in Bruges, Belgium in March 5-7 2018. FSE 2018 is organized by COSIC at KU Leuven in collaboration with the International Association for Cryptologic Research (IACR).

The Official Cybersecurity Conferences 2018 Directory: USA, UK, India

The Official Cybersecurity Conferences 2018 Directory: USA, UK, India: Welcome to the InfoSec Community's favorite Cybersecurity Conference Directory! We list every major global IT Security Event taking place in 2018.

Observatory by Mozilla

Observatory by Mozilla: Observatory by Mozilla has helped over 80,000 websites by teaching developers, system administrators, and security professionals how configure their sites safely and securely.

Thursday, November 23, 2017

Convivio Society for Italian Humanities - Promoting Italian arts, culture, and heritage in San Diego

Convivio Society for Italian Humanities - Promoting Italian arts, culture, and heritage in San Diego:



'via Blog this'

Averting the Software Apocalypse

Averting the Software Apocalypse: "But risks tend to shift somewhere else, not go away. Everything as a service implies the risk of single points of failure of a magnitude that we might not fully comprehend until there is a sustained outage with significant loss of services and data."



'via Blog this'

The Coming Software Apocalypse - The Atlantic

The Coming Software Apocalypse - The Atlantic: "It’s been said that software is “eating the world.” More and more, critical systems that were once controlled mechanically, or by people, are coming to depend on code."



'via Blog this'

Wednesday, November 22, 2017

Oh $#! : Your website got hacked—now what!?

Oh $#! : Your website got hacked—now what!?: After the initial panic subsides, your mind starts racing and you find yourself asking the question, “What do I (or my IT folks), need to do to get our site back online?” Read on for more…

EU to Declare Cyber-Attacks “Act of War”. USA likely to follow

EU to Declare Cyber-Attacks “Act of War”. USA likely to follow: The framework on a joint EU diplomatic response to malicious cyber activities would seem to raise the stakes significantly on state-sponsored attacks, especially those focused on critical infrastructure.

Tuesday, November 21, 2017

ID card security: Spain is facing chaos over chip crypto flaws | ZDNet

ID card security: Spain is facing chaos over chip crypto flaws | ZDNet: At least the Basque certificate authority Izenpe, which has revoked 30,000 certificates, has given information about how to replace them, the blog added.

Sunday, November 19, 2017

Closing the Cybersecurity Skills Gap With a New Collar Approach

Closing the Cybersecurity Skills Gap With a New Collar Approach: "the well-documented skills shortage in cybersecurity, which is expected to reach 1.5 million unfilled positions by 2020. Closing that gap is daunting, and requires us to find and nurture different types of talent in new ways."



'via Blog this'

It’s time to think differently about cyber security. Here’s how | World Economic Forum

It’s time to think differently about cyber security. Here’s how | World Economic Forum: "The only effective response to this level of cyber attack is a major step up in cyber security to give us national-level insight and oversight that will work closely with industry and government. Those of us with national responsibilities, the leaders of nationally-important businesses, and major institutions, need to unite to fight. We need to lead a defence strategy against this cyber warfare at a national level, bringing the best minds and tools together to protect assets."



'via Blog this'

Resources Courtesy of Regina Lundgren, Writer, Consultant, and Trainer

Resources Courtesy of Regina Lundgren, Writer, Consultant, and Trainer: "For Risk Communication, Public Involvement, and Science and Strategic Communication"



'via Blog this'

Regina Lundgren, Why People Don't Respond

Regina Lundgren, Why People Don't Respond: "You've crafted the perfect message, designed to get people to take notice and take action, safeguarding lives and protecting the environment. Only, that's not what happens. Why?"



'via Blog this'

Art. 17 GDPR – Right to erasure (‘right to be forgotten’) | General Data Protection Regulation (GDPR)

Art. 17 GDPR – Right to erasure (‘right to be forgotten’) | General Data Protection Regulation (GDPR): "The data subject shall have the right to obtain from the controller the erasure of personal data concerning him or her without undue delay and the controller shall have the obligation to erase personal data without undue delay where one of the following grounds applies:"



'via Blog this'

A Board Member's Top Five Recommendations For Cybersecurity And Risk Management

A Board Member's Top Five Recommendations For Cybersecurity And Risk Management: "top five recommendations for boards to consider in their oversight roles are (1) Double down, or triple down, on the basics; (2) establish a cybersecurity risk policy with clear risk appetite statements; (3) ask for an effective risk report with qualitative assessments and quantitative analytics; (4) provide credible challenge and oversight of the cybersecurity program; and (5) focus on people and culture. "



'via Blog this'

Facts Don't Win Fights: Here’s How to Cut Through Confirmation Bias | Big Think

Facts Don't Win Fights: Here’s How to Cut Through Confirmation Bias | Big Think: "brain imaging and psychological studies are showing that, society wide, we may be on the wrong path by holding evidence up as an Ace card"



'via Blog this'

TP-LINK Archer VR400 Wireless Modem Router - AC 1200, Dual-band | Free Delivery | Currys

Tuesday, November 14, 2017

Research Shows ‘White Male Effect’ Can Impact Risk Communications - ISACA Now

Research Shows ‘White Male Effect’ Can Impact Risk Communications - ISACA Now: I encourage you to read Dan Kahan’s articles on this at CulturalCognition.net, and hope to see more people studying why the advice of information security experts is not universally embraced.