Tuesday, July 31, 2012

NSA Releases Disputed Email from Drake Case | Secrecy News

NSA Releases Disputed Email from Drake Case | Secrecy News

“If the system continues to be one-sided, where individuals are routinely held to account for supposedly improperly disclosing protected information but no one is ever held accountable for improperly classifying information in the first place, it sends a very clear message to the millions of individuals with security clearances to continue to overclassify with impunity. That does not bode well for either the security of our nation or our democratic form of government.”

ClevX DriveSecurity powered by ESET

ClevX DriveSecurity powered by ESET

ClevX DriveSecurity™ powered by ESET is a powerful antivirus utility that prevents malware from spreading via portable drives.

Monday, July 30, 2012

Daily Kos: The Gentleperson's Guide to Forum Spies

What follows is a lengthy dissertation on how to subvert/co-opt Internet discussion groups. A veritable how-to manual for Forum Trolls and Hijackers

Daily Kos: The Gentleperson's Guide to Forum Spies

10 Scariest Hacks CIO.com

10 Scariest Hacks CIO.com: Researchers from Black Hat and Defcon showed all manner of serious attacks on everything from browsers to automobiles.

Black Hat USA 2012 | Briefings

Black Hat USA 2012 | Briefings: This talk demonstrates how modern day financial applications, password and credit card managers, and other applications handling sensitive data are attacked on the iOS platform, and sometimes all too easily breached in as little as seconds. Attendees will learn how iOS applications are infected, how low-level classes and objects are manipulated and abused, logic checks bypassed, and other dark techniques used to steal data.

Saturday, July 28, 2012

Defcon 20: Skillz, thrills for the whole hacker family | Security & Privacy - CNET News

Defcon 20: Skillz, thrills for the whole hacker family | Security & Privacy - CNET News: This year's hacker show has something for everyone, from hardware hacking and zero-day contests to con games and nerd-core rappers.

NSA Chief: Agency Wants to Provide Malware Signatures, Not Enter Private Networks | Threat Level | Wired.com

NSA Chief: Agency Wants to Provide Malware Signatures, Not Enter Private Networks | Threat Level | Wired.com: the proposal the NSA had unsuccessfully pushed for at the White House would have required critical infrastructure companies – such as utilities, telecoms, ISPs, transportation and financial services companies – to allow their e-mail and other internet traffic to be scanned using threat signatures provided by the NSA and to turn over any evidence of a suspected attack to the government for analysis. The NSA felt the government needed an expanded role because private firms had failed to demonstrate that they were capable of defending themselves against cyber threats.

Sunday, July 22, 2012

Carney: Seek balance in a new pain-pill law

Carney: Seek balance in a new pain-pill law: Last week, a grand jury in Suffolk County released a report showing a dramatic increase in arrests and overdose deaths related to prescription painkillers there.

Demise of American Pain Foundation Can Help End the Opioid Lunacy | American News Report

Who sponsored this...

Demise of American Pain Foundation Can Help End the Opioid Lunacy | American News Report:

In the lunacy of the over-prescribing of opioids for all levels of pain in the U.S. and Canada, there is now a large dose of sanity. That sanity is an organization called Physicians for Responsible Opioid Prescribing (PROP). Their mission is to reduce morbidity and mortality from opioids and to promote cautious, safe, and responsible opioid prescribing practices

A severe and growing shortage of physicians willing to prescribe morphine and related opioid analgesics

There is a Pain Crisis in America. Its primary manifestation is the routine and widespread under-treatment of pain, especially chronic, non-cancer pain. Other manifestations include a severe and growing shortage of physicians willing to prescribe morphine and related opioid analgesics, the widespread use of more toxic and less efficacious classes of medications in an effort to avoid opioids, and the profound distortion of medical education and of the doctor-patient relationship.

Oldest Civilization may be in Antarctica

Oldest Civilization may be in Antarctica

"In 1949 the joint British-Swedish expedition conducted a thorough seismic exploration of the southernmost continent through the thick ice. The results coincided with the map of Reis. However, it was a mystery how the map data were to agree with the level of science of 1513."

'via Blog this'

Friday, July 20, 2012

CSA 1987

"COMPUTER SECURITY ACT OF 1987
Public Law 100-235 (H.R. 145)
January 8, 1988"

'via Blog this'

http://www.youtube.com/watch?v=2TaMepzJPP0&feature=youtu.be

Bank Sues Customer Over ACH/Wire Fraud

Bank Sues Customer Over ACH/Wire Fraud

Last week, a federal appellate court reversed a lower court's ruling in the ACH/wire fraud dispute between PATCO Construction Inc. and the former Ocean Bank, which is now part of People's United.

Sunday, July 15, 2012

Vizio Demo — Just another WordPress site

Vizio Demo — Just another WordPress site:

Another Post with Everything In It

Lorem ipsum dolor sit amet, consectetuer adipiscing elit. Curabitur quam augue, vehicula quis, tincidunt vel, varius vitae, nulla. Sed convallis orci.

Saturday, July 14, 2012

Problem loading page

https://d33ds.co/archive/yahoo-disclosure.txt

Apparently not there. Trying pastebin.

Friday, July 13, 2012

Govts should focus on cybersecurity education, not militarization | ZDNet

Govts should focus on cybersecurity education, not militarization | ZDNet:

Governments should spend more time and effort educating citizens and other countries on existing online threats and forge partnerships with private sector organizations rather than militarize the cyber arena.

According to Yaacob Ibrahim, Singapore's minister for information

DarkComet shut-down shows law enforcement works - CSO Online - Security and Risk

DarkComet shut-down shows law enforcement works - CSO Online - Security and Risk

"DarkComet made headlines in February, when it was used in siphoning information from the computers of Syrian activists opposed to dictator Bashar al-Assad,"

'via Blog this'

Trojan Downloader Determines OS, Infects Systems With Custom Malware | threatpost

Trojan Downloader Determines OS, Infects Systems With Custom Malware | threatpost

"A new downloader uncovered by researchers at the Finnish security firm F-Secure is capable of sniffing out which operating system a user is running and infecting them with a custom malicious payload."

'via Blog this'

Dark Comet RAT Tailored For Attacks On Gamers, Governments | threatpost

Dark Comet RAT Tailored For Attacks On Gamers, Governments | threatpost

"Researchers analyzing the Dark Comet remote access Trojan (RAT) program say that data from more than 400 campaigns suggests the malicious program is being used for a wide range of jobs, from attacks on online gamers, to potential hacks of air force bases and government Web sites."

'via Blog this'

Wednesday, July 11, 2012

Audio to Text - Speechpad

Audio to Text - Speechpad

Speechpad specializes in converting audio to text to create a high value document that can be read, searched and archived.

NSA: Cybercrime is 'the greatest transfer of wealth in history' | ZDNet

NSA: Cybercrime is 'the greatest transfer of wealth in history' | ZDNet

The director of the National Security Agency (NSA) has called cybercrime "the greatest transfer of wealth in history." As such, he urged politicians and the American population in general to support cybersecurity legislation being pushed through Congress.

Online Text to Speech Synthesizer

Online Text to Speech Synthesizer:

"You can quickly share the sound and text you entered by copying the generated link and pasting it somewhere."

'via Blog this'

The NSA Is Building the Country's Biggest Spy Center (Watch What You Say) | Threat Level | Wired.com

The NSA Is Building the Country's Biggest Spy Center (Watch What You Say) | Threat Level | Wired.com:

"In the process—and for the first time since Watergate and the other scandals of the Nixon administration—the NSA has turned its surveillance apparatus on the US and its citizens"

'via Blog this'

NSA Chief Denies Wired's Domestic Spying Story (Fourteen Times) In Congressional Hearing - Forbes

NSA Chief Denies Wired's Domestic Spying Story (Fourteen Times) In Congressional Hearing - Forbes:

"if Dick Cheney were elected president and wanted to detain and incessantly waterboard every American who sent an email making fun of his well-known hunting mishaps, what I’d like to know is, does the NSA have the technological capacity to identify those Cheney bashers based upon the content of their emails?"

'via Blog this'

NSA Chief: Cybercrime constitutes the “greatest transfer of wealth in history” | The Cable

NSA Chief: Cybercrime constitutes the “greatest transfer of wealth in history” | The Cable: But the real threat on the Internet will come when cyber attacksbecome militarized, a threat the U.S. must deal with now, he said.

Google May Pay $22.5 Million in FTC Privacy Settlement - Security - News & Reviews - eWeek.com

Google May Pay $22.5 Million in FTC Privacy Settlement - Security - News & Reviews - eWeek.com: "Google and the Federal Trade Commission are reportedly close to a settlement regarding charges Google circumvented privacy settings  in the Apple Safari Web browser."

'via Blog this'

Download Blue Cat's Phaser by Blue Cat Audio

Download Blue Cat's Phaser by Blue Cat Audio

"Modeled after vintage analog phaser circuits, Blue Cat's Phaser reproduces this old vintage phasing effect that you can find on so many recording"

'via Blog this'

Over 90 Free VST Effects Plugins

Over 90 Free VST Effects Plugins

"VST plugins can add power and flexibility to your digital audio workstation."

'via Blog this'

Monday, July 9, 2012

Free text to speech software with naturally sounding voices -- Free NaturalReader

Free text to speech software with naturally sounding voices -- Free NaturalReader:

"NaturalReader is a Text to Speech software with natural sounding voices. This easy to use software can convert any written text such as MS Word, Webpage, PDF files, and Emails into spoken words."

'via Blog this'

vozMe - From text to speech (speech synthesis)

vozMe - From text to speech (speech synthesis):

"Enter text in English"

'via Blog this'

Acapela Text to Speech Demo

Acapela Text to Speech Demo: "For demo and evaluation purpose only, for commercial use of generated sound files please go to www.acapela-box.com "

'via Blog this'

Online Text to Speech Synthesizer

Online Text to Speech Synthesizer

"This online application converts text into speech.
You may write anything into the text field and press the blue speak button at the bottom left. "

'via Blog this'

Saturday, July 7, 2012

Pena Nieto Bets on Pablo Escobar Nemesis to Win Mexico Drug War - Businessweek

Pena Nieto Bets on Pablo Escobar Nemesis to Win Mexico Drug War - Businessweek:

Drug War ‘Disaster’ -- “It’s a disaster,” said Suarez-Mier, who representedMexico’s attorney general when the Merida Initiative, a three-year, $1.6 billion anti-narcotics program funded by the U.S.,was signed in 2008. “When you decapitate a cartel, they tend tofracture and now we have more cartels that are more violent.”

U.S. pressures companies to report cybercrime – USATODAY.com

U.S. pressures companies to report cybercrime – USATODAY.com

Wyndham did not report the break-in in corporate filings even though the U.S. Securities and Exchange Commission wants companies to inform investors of cybercrimes.

Friday, July 6, 2012

Novel observations in hereditary hemochromatosis: potential implications for clinical strategies

Novel observations in hereditary hemochromatosis: potential implications for clinical strategies

raises the possibility that compensatory mechanisms exist to partially offset the hepcidin-mediated effects on dietary iron absorption in hereditary hemochromatosis patients with elevated transferrin saturation.

Thursday, July 5, 2012

Cybercriminals Sniff Out Vulnerability - WSJ.com

Cybercriminals Sniff Out Vulnerability - WSJ.com

With cybercriminals a greater threat to small businesses than ever before, more entrepreneurs like Lloyd Keilson are left asking themselves who is to blame for hacking attacks that drain their business accounts.

Find and Call: Leak and Spam - Securelist

Find and Call: Leak and Spam - Securelist:

The application is called ‘Find and Call’ and can be found in both the iOS Apple App Store and Android’s Google Play.

Wednesday, July 4, 2012

Vegas Pro 11 Overview

Vegas Pro 11 Overview

"an efficient, intuitive and integrated content creation environment for video and broadcast professionals."

'via Blog this'

Tuesday, July 3, 2012

Glyde – Your Online Garage Sale | Culture Milk

Glyde – Your Online Garage Sale | Culture Milk:

Of course, Glyde sells the actual product for a higher price, but the money you actually make through them is higher than any other service.

Make an Old Computer Your Home Security System | SecurityNewsDaily.com

Make an Old Computer Your Home Security System | SecurityNewsDaily.com:

Setting up a home camera security system on an old computer is easier than it seems, said Robert Siciliano, a security and ID theft expert based in Boston.

BBB teaches best back-to-school lesson: How students can avoid identity theft - DailyFinance

BBB teaches best back-to-school lesson: How students can avoid identity theft - DailyFinance:

College students have enough to worry about without falling prey to scammers looking to steal their identities and good credit.

Sunday, July 1, 2012

Group makes final push to rid DNSChanger infections - SC Magazine

Group makes final push to rid DNSChanger infections - SC Magazine

Despite months of warnings, 303,867 machines worldwide remain infected with DNSChanger malware

Stuxnet Will Come Back to Haunt Us - NYTimes.com

Stuxnet Will Come Back to Haunt Us - NYTimes.com

The decision by the United States and Israel to develop and then deploy the Stuxnet computer worm against an Iranian nuclear facility late in George W. Bush’s presidency marked a significant and dangerous turning point in the gradual militarization of the Internet.

Back-to-School Shopping? Avoid ATM Scams

Many shoppers are opting to use a debit card to pay for those purchases, increasing the potential of becoming a victim of various high tech scams.

Back-to-School Shopping? Avoid ATM Scams - MetroFamily Magazine - August 2011 - Oklahoma City, OK:

Credit, ATM and Debit Cards: What to do if They're Lost or Stolen

Credit, ATM and Debit Cards: What to do if They're Lost or Stolen

Your liability under federal law for unauthorized use of your ATM or debit card depends on how quickly you report the loss.

Information Technology: Edu phishing example

Information Technology: A scam first reported on May 14th of this year has returned. This time, an e-mail allegedly from Sarah Williams at the HelpDesk, includes a request for personal information (Username, Password, Address, and Department).

Amid Back-To-School Season, Feds Warn About ID Theft Scams Targeting Kids

Amid Back-To-School Season, Feds Warn About ID Theft Scams Targeting Kids

But federal authorities are warning parents that back-to-school season is actually a risky time of year when it comes to the potential for young people to become targeted by identity thieves.

How Amazon Saved My Life - IndieReader

How Amazon Saved My Life - IndieReader:

Did I cry over some of these rejections? Absolutely. Did I feel inadequate, untalented, hurt? Yes. Did I doubt my ability to craft a story that readers could fall in love with? You bet.