Wednesday, May 28, 2014

Only 51% of anti-virus scanners detect zero-day malware | Myce.com

Only 51% of anti-virus scanners detect zero-day malware | Myce.com



VirusTotal uses dozens of virus scanners which scan uploaded files. The
website is mainly intended to be a second opinion and is according to
the developers not usable for testing and rating anti-virus software.
VirusTotal uses the command line version of virus scanners which can
differ from the desktop version used by most consumers.

What To Do If Your iPhone Is Hacked And Remotely Locked

What To Do If Your iPhone Is Hacked And Remotely Locked : The incidents seemed isolated to Australia, but in a troubling development iPhone users in the U.S., writing on Apple’s discussion forum, are starting to report the same strange alert.

Microsoft Identifies New Malware Dropping Sefnit Botnet | Threatpost | The first stop for security news

Microsoft Identifies New Malware Dropping Sefnit Botnet | Threatpost | The first stop for security news: In its latest Security Intelligence Report (SIR), Microsoft puts the blame on Sefnit et al for a 3x increase in worldwide infection rates at the end of last year.

Researchers find large global botnet of infected PoS systems - PC World Magazine New Zealand

Researchers find large global botnet of infected PoS systems - PC World Magazine New Zealand: According to IntelCrawler, the Nemanja botnet included 1,478 infected systems in countries on most continents including the U.S., the U.K., Canada, Australia, China, Russia, Brazil and Mexico.

NTLM security flaws show attackers don't need latest malware to thrive

NTLM security flaws show attackers don't need latest malware to thrive: "Poisoning the well allows an attacker to quickly achieve an access level to the file server that is equivalent to the sum total of privileges granted to all users together."

Tuesday, May 27, 2014

Appeals Court Rules California Hospital Not Liable for Data Breach - California Healthline

Appeals Court Rules California Hospital Not Liable for Data Breach - California Healthline: the judges ruled that "a prohibited release by a health care provider must include more than individually identifiable information but must also include information relating to medical history, mental or physician condition, or treatment of the individual" (Kenealy, Business Insurance, 5/23).

AVAST Shuts Down Forum Following Data Breach | SecurityWeek.Com

AVAST Shuts Down Forum Following Data Breach | SecurityWeek.Com: According to Vince Steckler, CEO of AVAST Software, the forum was hacked over the past weekend and attackers gained access to names, usernames, email addresses and password hashes.

Monday, May 26, 2014

CDCA - Centro di Documentazione sui Conflitti Ambientali

Citizens exposed to fumigation reported the following complaints: nausea, vomiting, fever, skin rushes, respiratory problems, abdominal pains, headaches, eye infections, genital irritation, birth defects, a higher number of miscarriages, etc.;

http://www.cdca.it/spip.php?article1666&lang=it

Thursday, May 22, 2014

Nevada Massachusetts and Beyond Complying with Personal ID Encryption Mandates

Nevada Massachusetts and Beyond Complying with Personal ID Encryption Mandates: "In 2010, Nevada and Massachusetts up the ante by requiring encryption of personal information when that information is transmitted over public networks or stored on portable media. "



'via Blog this'

Guard your Grindr: the best antivirus software you need | Gay Star News

ESET can put all your Internet security fears to rest. They provide the very best antivirus software at a range of packages to suit everyone.

- See more at: http://www.gaystarnews.com/article/guard-your-grindr-best-antivirus-software-you-need200514#sthash.GYvdziYi.dpuf


From My iPhone

Everyone should know just how much the government lied to defend the NSA | Trevor Timm | Commentisfree | The Guardian

two Senatorsaccused the Justice Department of lying about NSA warrantless surveillance to the US supreme court last year, and those falsehoods all but ensured that mass spying on Americans would continue. 


From My iPhone

Giving NSA the boot – California bids to end spying on its citizens — RT USA

The state of California is looking to pass a law stating the federal government would need a warrant from a judge if it wants to search residents' cellphones and computer records. The bill passed the state senate with just one person voting against.

http://rt.com/usa/160104-nsa-spying-california-snowden/


From My iPhone

Wednesday, May 21, 2014

backup - Does an equivalent of Time Machine exist for Windows? - Super User

backup - Does an equivalent of Time Machine exist for Windows? - Super User: If using Vista and/or Windows 7: Go to Control Panel -> Backup and Restore (or just start typing "Backup and Restore" into the Start menu search box). Select "Backup Files" (for simple file backups) or "Backup Computer" (for whole system backup). It will ask you where to back up to, and you can set schedules, etc. The interfaces differ slightly between Vista/Win7, but the process is similar.

SoHo Routers Hacked by ISE

SoHo Routers Hacked by ISE: ISE researchers discovered critical security vulnerabilities in numerous small office/home office (SOHO) routers and wireless access points.

Huge demand for NSA-proof email: ProtonMail uses a month's server capacity in 3 days

As predicted.

http://m.networkworld.com/community/blog/huge-demand-nsa-proof-email-protonmail-uses-months-server-capacity-3-days?source=NWWNLE_nlt_security_2014-05-20


From My iPhone

OIL AND GAS: Spills up 17 percent in U.S. in 2013 -- Monday, May 12, 2014 -- www.eenews.net

http://www.eenews.net/stories/1059999364

Some of the biggest jumps were in the booming Bakken Shale. North Dakota,

From My iPhone

Tuesday, May 20, 2014

US Homes Surpass 500 Million Internet-Connected Devices, 5.7 Each

US Homes Surpass 500 Million Internet-Connected Devices, 5.7 Each: "There are now more than 500 million devices in US homes connected to the Internet."



'via Blog this'

New Malware Targeting Syrian Activists Uses Blackshades Commercial Trojan | Electronic Frontier Foundation

New Malware Targeting Syrian Activists Uses Blackshades Commercial Trojan | Electronic Frontier Foundation: Pro-Syrian government hackers appear to have moved on to another remote access tool: Blackshades Remote Controller, whose capabilities include keystroke logging and remote screenshots.

What To Do If Your MacBook Battery Won't Charge | PCMag.com

What To Do If Your MacBook Battery Won't Charge | PCMag.com: For newer Macs with batteries sealed into the chassis, shut down the computer, but leave the power adapter connected. With the power off, press and hold the power button while pressing the Shift-Control-Option keys on the left-hand side of the keyboard. Release the keys and power button simultaneously, then attempt to power on the laptop.

Friday, May 16, 2014

Tallinn Hotel - Luxury Hotel Tallinn - Swissotel Tallinn

Tallinn Hotel - Luxury Hotel Tallinn - Swissotel Tallinn: Step into a world of ease, luxury and Swiss hospitality at the five-star luxury Swissotel Tallinn, the tallest building in the city, boasting impressive views of the old town and the Baltic Sea.

Use Google Forms to create a survey - TechRepublic

Use Google Forms to create a survey - TechRepublic: You can create a Google Form quickly: Google released a "one click" Chrome Web Store app to create a Google Form on October 23, 2013. The release coincided with the launch of several one click Chrome Web Store apps to create Docs, Sheets and Slides. Chrome browser users can install these apps from their respective links in the Web Store.

Thursday, May 15, 2014

Psychology of Intelligence Analysis

  • Once an experienced analyst has the minimum information necessary to make an informed judgment, obtaining additional information generally does not improve the accuracy of his or her estimates. Additional information does, however, lead the analyst to become more confident in the judgment, to the point of overconfidence.
http://www.au.af.mil/au/awc/awcgate/psych-intel/art8.html

From My iPhone

Monday, May 12, 2014

Tim Danahey and Chris Mitchell Talk Muni's | community broadband networks

Tim Danahey recently brought Chris Mitchell on his show to talk about municipal networks and their role in preserving network neutrality. Tim is a fan of the Institute for Local Self-Reliance and our work.

http://muninetworks.org/content/tim-danahey-and-chris-mitchell-talk-munis


From My iPhone

Saturday, May 10, 2014

Bible in high-school studies is part of Hobby Lobby president's evangelization push - Dallas News, Sports, Weather and Traffic from The Dallas Morning News

The goal is to place the Bible course in thousands of schools by 2017.

http://www.dallasnews.com/news/local-news/20140507-bible-in-high-school-studies-is-part-of-hobby-lobby-president-s-evangelization-push.ece


From My iPhone

NSA's Prism Could Cost U.S. Cloud Companies $45 Billion - InformationWeek

NSA's Prism Could Cost U.S. Cloud Companies $45 Billion - InformationWeek: "The revelations about the monitoring of phone calls, emails and Internet traffic by the National Security Agency's Prism program will cost U.S. cloud suppliers either $35 billion, $45 billion, or maybe not so much, depending on how you interpret recent data on the continued use of hosting services, according to analysts looking at the aftermath of the Edward Snowden leaks."



'via Blog this'

Friday, May 9, 2014

NSA and British counterpart GCHQ seek ways of monitoring airplane passenger communication: Greenwald - NY Daily News

NSA and British counterpart GCHQ seek ways of monitoring airplane passenger communication: Greenwald - NY Daily News: GCHQ’s airplane surveillance program is called Thieving Magpie. The NSA’s version is called Homing Pigeon.

Entrevista a Stephen Cobb de ESET Norte América - YouTube

Entrevista a Stephen Cobb de ESET Norte América - YouTube: "Stephen Cobb, Senior Security Researcher de ESET Norte América, estuvo en nuestras oficinas de Buenos Aires, Argentina, especialmente para brindar una charla plenaria en Segurinfo Argentina 2014, uno de los eventos más importantes y concurridos en materia de Seguridad Informática de la región.

De modo que aprovechamos la ocasión y lo entrevistamos, especialmente para hablar sobre algunas cuestiones vinculadas a la privacidad en Internet y las tendencias mundiales en malware.
"



'via Blog this'

Nevada Massachusetts and Beyond Complying with Personal ID Encryption Mandates

Nevada Massachusetts and Beyond Complying with Personal ID Encryption Mandates: "In 2010, Nevada and Massachusetts up the ante by requiring encryption of personal information when that information is transmitted over public networks or stored on portable media. "



'via Blog this'

Thursday, May 8, 2014

Other Agencies Clamor for Data N.S.A. Compiles - NYTimes.com

Other Agencies Clamor for Data N.S.A. Compiles - NYTimes.com: “It’s a very common complaint about N.S.A.,” said Timothy H. Edgar, a former senior intelligence official at the White House and at the office of the director of national intelligence. “They collect all this information, but it’s difficult for the other agencies to get access to what they want.”

The NSA is giving your phone records to the DEA. And the DEA is covering it up.

The NSA is giving your phone records to the DEA. And the DEA is covering it up.: Tips from the NSA are added to a DEA database that includes "intelligence intercepts, wiretaps, informants and a massive database of telephone records."

Snowden confirms NSA created Stuxnet with Israeli aid — RT News

Snowden confirms NSA created Stuxnet with Israeli aid — RT News: The Stuxnet virus that decimated Iranian nuclear facilities was created by the NSA and co-written by Israel, Edward Snowden has confirmed.

NSA malware turns your iPhone into a spy device, obliterating your privacy | Privacy SOS

NSA malware turns your iPhone into a spy device, obliterating your privacy | Privacy SOS: NSA has a fool-proof and covert method of remotely installing malware onto iPhones.

BBC News - NSA 'infected' 50,000 networks with malware

BBC News - NSA 'infected' 50,000 networks with malware: The US National Security Agency (NSA) infected 50,000 networks with malware, Dutch newspaper NRC has reported.

The NSA Reportedly Infected 50,000 Computer Networks With Malware -- Are You Affected?

The NSA Reportedly Infected 50,000 Computer Networks With Malware -- Are You Affected?: A new report claims that the NSA has installed malicious cybersnooping software onto tens of thousands of computer networks worldwide.

NSA's TURBINE robot can pump 'malware into MILLIONS of PCs' • The Register

NSA's TURBINE robot can pump 'malware into MILLIONS of PCs' • The Register: a system dubbed TURBINE that can spam out millions of pieces of sophisticated malware at a time.

NSA posed as Facebook to infect computers with malware - Los Angeles Times

NSA posed as Facebook to infect computers with malware - Los Angeles Times: The National Security Agency has reportedly used automated systems to infect user computers with malware since 2010, according to a Wednesday report. And at times the agency pretended to be Facebook to install its malware.

NSA reportedly intercepting laptops purchased online to install spy malware | The Verge

NSA reportedly intercepting laptops purchased online to install spy malware | The Verge: The report indicates that the NSA, in collaboration with the CIA and FBI, routinely and secretly intercepts shipping deliveries for laptops or other computer accessories in order to implant bugs before they reach their destinations.

How the NSA Plans to Infect 'Millions' of Computers with Malware - The Intercept

How the NSA Plans to Infect 'Millions' of Computers with Malware - The Intercept: the National Security Agency is dramatically expanding its ability to covertly hack into computers on a mass scale by using automated systems that reduce the level of human oversight in the process.

IDC Forecasts Worldwide Public IT Cloud Services Spending to Reach Nearly $108 Billion by 2017 as Focus Shifts from Savings to Innovation - prUS24298013

IDC Forecasts Worldwide Public IT Cloud Services Spending to Reach Nearly $108 Billion by 2017 as Focus Shifts from Savings to Innovation - prUS24298013: Worldwide spending on public IT cloud services will reach $47.4 billion in 2013 and is expected to be more than $107 billion in 2017,

Thales and Ponemon Institute study shows increased use of encryption and further key management challenges | Thales Group

Thales and Ponemon Institute study shows increased use of encryption and further key management challenges | Thales Group: For the first time the primary driver for deploying encryption in most organizations is to lessen the impact of data breaches whereas in previous years the primary concern was protecting the organizations brand or reputation.

NSA denies report it exploited Heartbleed for years

NSA denies report it exploited Heartbleed for years: "According to Bloomberg, citing "two people familiar with the matter," the National Security Agency knew about Heartbleed for at least two years and used the hole in encryption technology to gather intelligence."



'via Blog this'

Has the NSA Been Using the Heartbleed Bug as an Internet Peephole? | Threat Level | WIRED

Has the NSA Been Using the Heartbleed Bug as an Internet Peephole? | Threat Level | WIRED: "When ex-government contractor Edward Snowden exposed the NSA’s widespread efforts to eavesdrop on the internet, encryption was the one thing that gave us comfort. "



'via Blog this'

The NSA's Heartbleed problem is the problem with the NSA | Julian Sanchez | Technology | theguardian.com

The NSA's Heartbleed problem is the problem with the NSA | Julian Sanchez | Technology | theguardian.com: "What the agency's denial isn't telling you: it didn't even need know about the bug to vacuum your privacy and store it indefinitely"



'via Blog this'

Wednesday, May 7, 2014

sysdig | Home

sysdig | Home: Sysdig is open source, system-level exploration: capture system state and activity from a running Linux instance, then save, filter and analyze.
Think of it as strace tcpdump lsof awesome sauce.

Saturday, May 3, 2014

How I Learned to Stop Being a Literary Snob and Love Romance | Book Reviews & Recommendations | Bookish.com

How I Learned to Stop Being a Literary Snob and Love Romance | Book Reviews & Recommendations | Bookish.com: I don't even have time to unpack everything that's problematic about the sheikh books, but thankfully the Los Angeles Review of Books has taken care of that for us.

Northrop CEO urges Congress to pass cybersecurity legislation - The West Australian

...more decisive action to protect their computer networks.

https://au.news.yahoo.com/thewest/news/a/22724341/northrop-ceo-urges-congress-to-pass-cybersecurity-legislation/


From My iPhone

New antivirus for smartphones and tablets introduced to Azerbaijani market - ABC.AZ

ESET mobile in AZ!

http://abc.az/eng/news/81048.html

From My iPhone

BMW 120d - Mini Test Road Test - Car Reviews - Car and Driver

"We were unaware that the diminutive diesel had a respectable 161 horsepower and an astonishing 251 pound-feet of torque...It took about 30 seconds of driving time to realize that the 2.0-liter diesel in the 1-series is actually a performance option."

http://www.caranddriver.com/reviews/bmw-120d-mini-test-road-test


From My iPhone

Tax fraud and identity theft reported among employees of Portland Archdiocese | Local & Regional | KATU.com - Portland News, Sports, Traffic Weather and Breaking News - Portland, Oregon

Tax fraud update:

http://www.katu.com/news/local/members-of-the-archdiocese-of-portland-possibly-targeted-by-tax-fraud-scheme.html?mobile=y


From My iPhone

Seattle Archdiocese trying to figure which databases hacked | Local News | The Seattle Times

Tax refund fraud victims

http://seattletimes.com/html/localnews/2023105964_archdiocesebreach1xml.html


From My iPhone

Thursday, May 1, 2014

University guide 2014: league table for social policy and administration | Education | theguardian.com

University guide 2014: league table for social policy and administration | Education | theguardian.com:

University of Leicester #13 among UK universities. And in UK top 3 for social policy and administration (criminology).

The University of Leicester was awarded the prestigous title of University of the Year 2008/09 by the Times Higher Education magazine.

Leicester is ranked top after Oxbridge in the 2011 National Student Survey amongst 120 mainstream public universities in the UK. Leicester's levels of student satisfaction have been consistently in the top-10 since the annual survey commenced in 2005. 

'via Blog this'

Marijuana Bill to Change Schedule Class is Introduced - Video - TheStreet

Bravo!

http://www.thestreet.com/_yahoo/video/12690042/marijuana-bill-to-change-schedule-class-is-introduced.html?cm_ven=YAHOOV&cm_cat=FREE&cm_ite=NA&s=1


From My iPhone