Monday, January 15, 2018

The Problems with Seeking and Avoiding True Attribution to Cyber Attacks – Robert M. Lee

The Problems with Seeking and Avoiding True Attribution to Cyber Attacks – Robert M. Lee: Attribution to cyber attacks means different things to different audiences. In some cases analysts only care about grouping multiple intrusions together to identify an adversary group or their campaign. This helps analysts identify and search for patterns.

DROWN Attack

DROWN Attack: DROWN allows attackers to break the encryption and read or steal sensitive communications, including passwords, credit card numbers, trade secrets, or financial data. Our measurements indicate 33% of all HTTPS servers are vulnerable to the attack.

MIT And BU Researchers Uncover Critical Security Flaw In $2B Cryptocurrency IOTA

MIT And BU Researchers Uncover Critical Security Flaw In $2B Cryptocurrency IOTA: IOTA, a�$2 billion cryptocurrency that�supports Internet of things (IoT) transactions, was�shown to have “serious weaknesses” according to a report�recently released by researchers at MIT and Boston University

Juniper Firmware: New Crypto Flaw Found - BankInfoSecurity

Juniper Firmware: New Crypto Flaw Found - BankInfoSecurity: Eight years after a crypto backdoor was added to the ScreenOS firmware that runs Juniper Networks' NetScreen firewalls, among other devices, the U.S. networking giant has promised to eliminate the vulnerability and moved to reassure customers that its products are now safe to use (see Juniper Devices Are Under Attack).

50 Amazing Internet Security Blogs You Should Be Following [Updated]

50 Amazing Internet Security Blogs You Should Be Following [Updated]: If you are concerned about your online security (and you should), it’s essential to know which are the best cyber security blogs that could help you stay informed about the most recent trends in the threat landscape.



Now 69!

Thursday, January 11, 2018

Intel Unveils 'Breakthrough' Quantum Computer - ExtremeTech

Criminologists Are Asking Jeff Sessions To Release FBI Crime Data | FiveThirtyEight

Criminologists Are Asking Jeff Sessions To Release FBI Crime Data | FiveThirtyEight

https://fivethirtyeight.com/features/criminologists-are-asking-jeff-sessions-to-release-fbi-crime-data/

AFRL/RIK Division and Branch Offices > Wright-Patterson Air Force Base > Display

AFRL/RIK Division and Branch Offices > Wright-Patterson Air Force Base > Display:



"AFRL/RIKD - Information Grid and Systems Contracting Branch

Mission Statement
The R&D Contracts Branch reviews adequacy of assigned purchase request packages for contract action. Assists engineering personnel in finalizing Statements of Work, specification and data requirements. Publishes "Notices of Contract Action," and/or "Notice of Award" in the FEDBIZOPPS as required by regulation. Selects sources for solicitation and prepares Request for Proposals (RFPs), receives and evaluates proposals, negotiates, request final proposal revisions or makes awards without discussion if possible, performs source selection and awards appropriate contractual instruments. Negotiates and awards contracts resulting from Broad Agency Announcements (BAAs), the Small Business Innovation Research (SBIR) national solicitation, and the Small Business Minority 8A Program. Conducts Contract and Business Clearance Approval for all contractual actions within the approved thresholds. Distributes all contractual documents. Performs contract management of all contracts issued. Terminates assigned contracts as required. Performs final contract closeout and all contract retirement functions. Inputs appropriate acquisition data into the AFMC automated management system database."



'via Blog this'

Scientists Find New Clues About Mysterious Origins of Humans in Neanderthal Sex and Ape DNA

Scientists Find New Clues About Mysterious Origins of Humans in Neanderthal Sex and Ape DNA

http://www.newsweek.com/scientists-seek-clues-about-mysterious-origins-humans-neanderthal-sex-and-774893

Tuesday, January 9, 2018

ICS-CERT Advice on AV Updates Solid, But Impractical | SecurityWeek.Com

ICS-CERT Advice on AV Updates Solid, But Impractical | SecurityWeek.Com: "The U.S. Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) has offered some advice on how antivirus software should be updated in industrial environments"



'via Blog this'

Wednesday, January 3, 2018

Meltdown and Spectre

Meltdown and Spectre: These hardware bugs allow programs to steal data which is currently processed on the computer.

How to Benchmark Your Windows PC: 5 Free Benchmarking Tools

21st Century Oncology Faces $2.3M HIPAA Settlement ...

21st Century Oncology Faces $2.3M HIPAA Settlement ...: "21st Century Oncology and the US Department of Health and Human Services Office for Civil Rights reached a $2.3 million settlement agreement, following a breach of the company's network SQL database and theft of the medical data and Social Security numbers of millions of patients."



'via Blog this'

Saturday, December 30, 2017

Reddit - Ripple - Ripple Step by step purchase guide (Coinbase method)

Reddit - Ripple - Ripple Step by step purchase guide (Coinbase method)

https://www.reddit.com/r/Ripple/comments/7jqdjs/ripple_step_by_step_purchase_guide_coinbase_method/

Ad targeters are pulling data from your browser’s password manager - The Verge

Ad targeters are pulling data from your browser's password manager - The Verge

RollBack Rx Professional | PC Time Machine Windows System Restore Software

RollBack Rx Professional | PC Time Machine Windows System Restore Software: "A comprehensive Windows System Restore solution that empowers users and IT administrators to easily restore their PCs to any previous state within seconds."



'via Blog this'

Friday, December 29, 2017

How to Expand Fourth Amendment Protections Without Making A Mess

The Best Way to Rule for Carpenter (Or, How to Expand Fourth Amendment Protections Without Making A Mess) - Lawfare

https://lawfareblog.com/best-way-rule-carpenter-or-how-expand-fourth-amendment-protections-without-making-mess

Vietnam Deploys 10,000 Cyber Warriors to Fight ‘Wrongful Views’

Vietnam Deploys 10,000 Cyber Warriors to Fight ‘Wrongful Views’: The disclosure of the unit comes as the Communist government pressures YouTube Inc. and Facebook Inc. to remove videos and accounts seen damaging the reputations of leaders or promoting anti-party views.

Physician Compensation: Employed vs. Practice Owners | Physicians Practice

Physician Compensation: Employed vs. Practice Owners | Physicians Practice: According to the survey, taken by 618 physicians across multiple specialties and employment models, 69.5 percent of physicians who own their practice bring home more than $200,000 in annual compensation. This compares to 75.3 percent of physicians employed by a hospital or health system and 60.7 percent of employed physicians at an independent practice.

Lenovo Thinkpad T420 Laptop Upgrade - RAM, SSD, and Dual Hardrives - YouTube

Lenovo Thinkpad T420 Laptop Upgrade - RAM, SSD, and Dual Hardrives - YouTube: Here are the upgrades I made to my Lenovo Thinkpad T420. I'm sure this voids the warranty so check with Lenovo if you are concerned about that.

Convert GPT drive into MBR using Command Prompt (cmd).

Convert GPT drive into MBR using Command Prompt (cmd).: In this article i will describe a topic related to windows. Many of my visitors ask me about changing GPT drive into MBR drive. GPT stands for GUID Partition Table and MBR stand for Master Boot Record.