Sunday, June 17, 2018

Exit scammers run off with $660 million in ICO earnings | TechCrunch

Exit scammers run off with $660 million in ICO earnings | TechCrunch: This so-called exit scam could be that largest in recent memory and is also indicative of what’s to come in the ICO space.

Cybersecurity Tech Accord

Cybersecurity Tech Accord: The Cybersecurity Tech Accord is a public commitment among more than 30 global companies to protect and empower civilians online and to improve the security, stability and resilience of cyberspace.

What does the GDPR and the "right to explanation" mean for AI? | CSO Online

What does the GDPR and the "right to explanation" mean for AI? | CSO Online: Security teams increasingly rely on machine learning and artificial intelligence to protect assets. Will a requirement to explain how they make decisions make them less effective?

Who's Afraid of Kaspersky? - Motherboard

Who's Afraid of Kaspersky? - Motherboard: We went to Kaspersky Lab's SAS conference, where the controversial Russian anti-virus firm showcases its best research, wines and dines competitors and journalists, and burns American espionage operations.

TEISS in San Fran: Where does cyber warfare begin and end in the fifth domain? -TEISS� : Cracking Cyber Security

TEISS in San Fran: Where does cyber warfare begin and end in the fifth domain? -TEISS� : Cracking Cyber Security: In this video TEISS speaks with Stephen on the topic of cyber warfare – asking where cyber warfare begins and ends in cyber space and how prepared are governments for nation state attacks.

Blockchain technology is on a collision course with EU privacy law

Blockchain technology is on a collision course with EU privacy law: For blockchain projects that involve the storage of personal data, these two facts do not mix well.

GDPR Subject Access Requests - GDPR.Report

GDPR Subject Access Requests - GDPR.Report: Handling subject access requests (“SAR”) effectively and within the legal timeframe remains a challenge for many employers especially where SARs are becoming increasingly onerous.

Rufus - Create bootable USB drives the easy way

Rufus - Create bootable USB drives the easy way: Rufus is a utility that helps format and create bootable USB flash drives, such as USB keys/pendrives, memory sticks, etc.

Saturday, June 16, 2018

How Facebook Figures Out Everyone You've Ever Met

How Facebook Figures Out Everyone You've Ever Met: "But Facebook’s machinery operates on a scale far beyond normal human interactions. And the results of its People You May Know algorithm are anything but obvious. "



'via Blog this'

Thursday, June 14, 2018

Restore Your USB Key to its original state | USB Pen Drive Linux

Restore Your USB Key to its original state | USB Pen Drive Linux: Restoring your USB key to its original state using Windows/Mac OS:

– Manual Method via Diskpart –



Windows:

Open a command Prompt as administrator (cmd.exe)

Type Diskpart and press Enter

Type List Disk and press Enter

Type Select Disk X (where X is the disk number of your USB drive)and press Enter

Type Clean and press Enter

Type Create Partition Primary and press Enter

Type Active and press Enter

Type Format fs=Fat32Quick and press

Enter
Type Exit and press Enter

Wednesday, June 13, 2018

Design Stunning Podcast Cover Art That Stands Out in iTunes

Design Stunning Podcast Cover Art That Stands Out in iTunes: When you download a podcast onto your personal computer iTunes will use a miniature version of the podcast artwork. Typically displays at 55 x 55 pixels.

(30) Ransomware Today: What's New, What's Coming Next - YouTube

(30) Ransomware Today: What's New, What's Coming Next - YouTube



In the year since the massive WannaCry ransomware attack struck more than 200,000 computers worldwide, the rate of ransomware attacks has doubled. In fact, it’s now the most common variety of malware.

Tuesday, June 12, 2018

Business E-Mail Compromise — FBI

Business E-Mail Compromise — FBI
Public domain graphic:

https://www.fbi.gov/news/stories/business-e-mail-compromise-on-the-rise

International BEC Takedown — FBI

International BEC Takedown — FBI: announced a major coordinated law enforcement effort to disrupt international business e-mail compromise (BEC) schemes that are designed to intercept and hijack wire transfers from businesses and individuals

EDR Research Commencing: Call To Action! - Anton Chuvakin

EDR Research Commencing: Call To Action! - Anton Chuvakin: So…what should poor analysts do to provide some much needed clarity to their enterprise clients?

The D in EDR - Augusto Barros

The D in EDR - Augusto Barros: The research on EDR tools and practices renders some very interesting discussions on tools capabilities

Automated Threat Hunting Playbook

Automated Threat Hunting Playbook: Once the automation platform retrieves and attaches the suspicious files and packet captures (step #6), the incident is ready to be verified by an incident analyst.

Monday, June 11, 2018

Amazon.com: The Cybersecurity Due Diligence Handbook: A Plain English Guide for Corporations Contemplating Mergers etc

Amazon.com: The Cybersecurity Due Diligence Handbook: A Plain English Guide for Corporations Contemplating Mergers, Acquisitions, Partnerships, Vendors or Other Strategic Alliances: "Show me a company with weak cybersecurity and I will show you a company with lackluster corporate governance, anemic C-suite leadership and head-in-the-sand operations. That is why there is a new, specialized and complex business demand in the corporate world: cybersecurity due diligence."

Blockchain error?

EDR Evaluation Guide: 13 Questions You Need to Answer

EDR Evaluation Guide: 13 Questions You Need to Answer: "Buckle up. It’s long, but you will level up at least 17 points if you read the entire list."

VPNFilter: New Exploit Feature and Affected Devices Revealed - Infosecurity Magazine

VPNFilter: New Exploit Feature and Affected Devices Revealed - Infosecurity Magazine

https://www.infosecurity-magazine.com/news/vpnfilter-new-exploit-feature/

Sunday, June 10, 2018

UEFI firmware image viewer and editor: UEFITool

RSA President's Tips On Managing Digital Risk - Page: 1 | CRN

RSA President's Tips On Managing Digital Risk - Page: 1 | CRN: “I think companies have to think about data as the currency or the fuel of the digital economy,” said Ghai.�“You have to think about data and the supply chain of data and how data lives not just within your own organization, but where it comes from and where it goes to.”

#RSAC: RSA President Urges Cybersecurity Industry to Concentrate on Security Not Threats - Infosecurity Magazine

#RSAC: RSA President Urges Cybersecurity Industry to Concentrate on Security Not Threats - Infosecurity Magazine: Our collective risk as an industry is that we fail to avoid a breach of trust in technology itself.

How the FAIR Framework Impacts Your Business

How the FAIR Framework Impacts Your Business: the Factor Analysis of Information Risk (FAIR) framework. He writes about that system in his book Measuring and Managing Information Risk: A FAIR Approach, which was inducted into the Cyber Security Canon in 2016, as a must-read in the profession.

Friday, June 8, 2018

‘It Can’t Be True.’ Inside the Semiconductor Industry’s Meltdown - Bloomberg

‘It Can’t Be True.’ Inside the Semiconductor Industry’s Meltdown - Bloomberg: Fogh and Gruss stayed up late at night discussing the theoretical basis for what would later become Spectre and Meltdown. But, like Prescher more than a year later, the Graz team was skeptical this was a real flaw. Gruss recalls telling Fogh that the chipmakers would have uncovered such a glaring security hole during testing and would never have shipped chips with a vulnerability like that.

Cyber Insurance is the Last, not First Step in Risk Mitigation | AlienVault

Cyber Insurance is the Last, not First Step in Risk Mitigation | AlienVault: "Cyber insurance underwriters typically ask for copies of current risk assessments or proof of cybersecurity policies and practices. "



'via Blog this'

ESET and Gryphon bring enterprise network protection to homes and small businesses | ESET

ESET and Gryphon bring enterprise network protection to homes and small businesses | ESET: “We continue to see cybercriminals evolve their techniques to attack devices on the network,” said Richard Marko, CEO of ESET. “With Gryphon, we found a technology partner that adds additional protection to network-connected devices while also leveraging ESET’s best in class security technologies.”

DEF CON Media Server 4

Thursday, June 7, 2018

ACX Audio Submission Requirements

"Audiobooks uploaded to ACX must adhere to the following requirements. The ACX Quality Assurance team may reject titles that do not meet these standards, and their retail release may be delayed. "

http://www.acx.com/help/acx-audio-submission-requirements/201456300#Head-Tail-Spacing



'via Blog this'

KDP Jumpstart Topic 1 - Set up Your Account (U.S. Publishers) | Amazon Kindle Direct Publishing

KDP Jumpstart Topic 1 - Set up Your Account (U.S. Publishers) | Amazon Kindle Direct Publishing: "You've just started Milestone 1. After you're done setting up your account, you'll enter your book details (Milestone 2), format your manuscript and cover (Milestone 3), and set rights and pricing (Milestone 4"



'via Blog this'

Paperback Manuscript Templates | Amazon Kindle Direct Publishing

Paperback Manuscript Templates | Amazon Kindle Direct Publishing: "Interested in a tool that can help you format your manuscript quickly and effectively? Try Kindle Create Add-In (Beta).
Want to know the basics so you can format your manuscript yourself in Word? Check out our basic guide."



'via Blog this'

Tuesday, June 5, 2018

Suncast Vertical Storage Shed 71-1/2 in. H x 53 in. W x 32-1/2 in. D(BMS5700) - Storage Sheds & Deck Boxes - Ace Hardware

Suncast Vertical Storage Shed 71-1/2 in. H x 53 in. W x 32-1/2 in. D(BMS5700) - Storage Sheds & Deck Boxes - Ace Hardware: "I kept waiting for the hard part of the assembly process but it never came. VERY easy, especially of you have a helper. Fairly sturdy and well designed"



'via Blog this'

Shop Rubbermaid Roughneck Storage Shed (Common: 5-ft x 2-ft; Actual Interior Dimensions: 4.33-ft x 2-ft) at Lowes.com

Shop Rubbermaid Roughneck Storage Shed (Common: 5-ft x 2-ft; Actual Interior Dimensions: 4.33-ft x 2-ft) at Lowes.com: "Tough, double-walled construction and an impact-resistant floor protects items from inclement weather, moisture, and sun-damage"



'via Blog this'

Are Ransomware Attacks Rising or Falling?

Are Ransomware Attacks Rising or Falling?: Be sure to vet your backup policies and procedures and use protective measures to detect and repel these sorts of attacks.

Untangling a robocaller web | Consumer Information

Untangling a robocaller web | Consumer Information: a case against a group of defendants that it alleges are responsible for billions of illegal robocalls.

FTC Sues to Stop Two Operations Responsible for Making Billions of Illegal Robocalls | Federal Trade Commission

FTC Sues to Stop Two Operations Responsible for Making Billions of Illegal Robocalls | Federal Trade Commission: The Federal Trade Commission has filed a complaint in federal district court seeking to stop two related operations and their principals who allegedly facilitated billions of illegal robocalls to consumers nationwide, pitching everything from auto warranties to home security systems and supposed debt-relief services.

Monday, June 4, 2018

Major Depression: The Impact on Overall Health | Blue Cross Blue Shield

Major Depression: The Impact on Overall Health | Blue Cross Blue Shield: "Americans diagnosed with major depression often suffer from a number of additional chronic, behavioral health and pain-related health conditions"



'via Blog this'

Friday, June 1, 2018

Amazon.com: MANGROOMER - ULTIMATE PRO Self-Haircut Kit with LITHIUM MAX Power, Hair Clippers, Hair Trimmers and Waterproof to save you money!: Beauty

Amazon.com: MANGROOMER - ULTIMATE PRO Self-Haircut Kit with LITHIUM MAX Power, Hair Clippers, Hair Trimmers and Waterproof to save you money!: Beauty:



'via Blog this'

Self Hair Cutting Tool | DIY Hair Clipper Kit | Remington | Remington®

Self Hair Cutting Tool | DIY Hair Clipper Kit | Remington | Remington®: "Turn your haircut into a DIY project!"



'via Blog this'

Target breach 12 months on: a year of lessons learned

Target breach 12 months on: a year of lessons learned: "On the domestic front, now is a good time to check your network technology. Are you still using the basic Internet router that your ISP supplied? Have you Googled its model number to see if there are any recalls, firmware updates, or other issues? "



'via Blog this'

The selfish 'Net and the Big One | Network World

The selfish 'Net and the Big One | Network World: "I know a lot of people find this hard to swallow, but [my wife and I] were absolutely serious a few years ago when we said that the Internet continues to function at the whim of those who know how to bring it down."



'via Blog this'

Huawei? The how, what, and why of Telecom supply chain threats

Huawei? The how, what, and why of Telecom supply chain threats: "There is no cheap or easy fix for an attack carried out at the switch and router level. "



'via Blog this'

Thursday, May 31, 2018

We Live Security on routers

You searched for router -: "The router is the first device that you must consider, since it not only controls the perimeter of your network, but all your traffic and information pass through it."



'via Blog this'

Cisco's Talos Intelligence Group Blog: New VPNFilter malware targets at least 500K networking devices worldwide

Cisco's Talos Intelligence Group Blog: New VPNFilter malware targets at least 500K networking devices worldwide: "Defending against this threat is extremely difficult due to the nature of the affected devices. The majority of them are connected directly to the internet, with no security devices or services between them and the potential attackers. "



'via Blog this'

Cisco's Talos Intelligence Group Blog: New VPNFilter malware targets at least 500K networking devices worldwide

Cisco's Talos Intelligence Group Blog: New VPNFilter malware targets at least 500K networking devices worldwide: "The behavior of this malware on networking equipment is particularly concerning, as components of the VPNFilter malware allows for theft of website credentials and monitoring of Modbus SCADA protocols. Lastly, the malware has a destructive capability that can render an infected device unusable, which can be triggered on individual victim machines or en masse, and has the potential of cutting off internet access for hundreds of thousands of victims worldwide."



'via Blog this'