Friday, January 30, 2015

Thursday, January 29, 2015

U.S. spy program has financial, security impacts, says Snowden | Computerworld

"If the NSA is knocking on your door and it is not a compelled basis, like a court order, you should ask yourself why. Am I benefiting the country, the public, or a group of spies?" Snowden said.

http://www.computerworld.com/article/2874934/us-spy-program-has-financial-security-impacts-says-snowden.html


From My iPhone

Wednesday, January 28, 2015

Real estate ripoff

New York state alone, this year, is getting out of its bank settlements with Wall Street a windfall of $5 billion.

http://m.democracynow.org/stories/14769

Saturday, January 24, 2015

William Blake - The Marriage of Heaven and Hell

William Blake - The Marriage of Heaven and Hell: "looking east between the clouds & the waves, we saw a cataract of blood mixed with fire, and not many stones' throw from us appear'd and sunk again the scaly fold of a monstrous serpent; at last, to the east, distant about three degrees appear'd a fiery crest above the waves; slowly it reared like a ridge of golden rocks, till we discover'd two globes of crimson fire, from which the sea fled away in clouds of smoke; and now we saw, it was the head of Leviathan; his forehead was divided into streaks of green & purple like those on a tyger's forehead: soon we saw his mouth & red gills hang just above the raging foam tinging the black deep with beams of blood, advancing toward us with all the fury of a spiritual existence."

Thursday, January 22, 2015

Ubertooth One – HakShop

Ubertooth One – HakShop: The Ubertooth One is an opensource Bluetooth test tool from Michael Ossmann. It is the world's first affordable Bluetooth monitoring and development platform and is a fully open source product (both hardware and software).

Parents in danger of having six-year-old daughter taken away for letting her walk to their local post office on her own - Boing Boing

Parents in danger of having six-year-old daughter taken away for letting her walk to their local post office on her own - Boing Boing: Neighbors and cops freaked out, detained her, detained her parents, sent CPS after them, and has made their life into a nightmare -- one that's just getting worse and worse.

NSA Details Chinese Cyber Theft of F-35, Military Secrets | Washington Free Beacon

In "Byzantine Candor" cyber attacks, the Chinese used Facebook as a command and control point for planting malware. One NSA slide showed that victims who unwittingly accessed a Facebook page through an email would end up with their computers under the remote control of the Chinese.

http://freebeacon.com/national-security/nsa-details-chinese-cyber-theft-of-f-35-military-secrets/

Hackers create USB stick inspired by NSA's Cottonmouth-I surveillance kit | Daily Mail Online

The device was designed to also be able to control the malware, even on so-called 'airgapped' computers.

http://www.dailymail.co.uk/sciencetech/article-2920419/When-USBs-attack-Hackers-create-covert-spy-plug-inspired-NSA-s-Cottonmouth-surveillance-kit.html

Boutique New Orleans Hotel | International House Hotel

Boutique New Orleans Hotel | International House Hotel



Nice place for a meeting.

NSA secretly uses scapegoats, data mules and innocent victims' PCs for botnets | Computerworld

NSA secretly uses scapegoats, data mules and innocent victims' PCs for botnets | Computerworld: "After digging into top secret documents provided by Edward Snowden, Der Spiegel published another very enlightening report on the NSA’s digital arms race. Documents discuss how Five Eyes intelligence partners “steal their tools, tradecraft, targets, and take.”"



'via Blog this'

Mass surveillance doesn't stop terrorism: Snowden - Xinhua | English.news.cn

Mass surveillance doesn't stop terrorism: Snowden - Xinhua | English.news.cn: "The mass surveillance has not stopped a single attack in the United States, he said. "It didn't stop the attacks in London, didn't stop the attacks in Spain, didn't stop the attacks in Boston.""



'via Blog this'

How Apple Pay Affects Online Security - Lifelock

But how does this work? And will Apple be able to...

http://www.lifelock.com/education/smartphones/how-Apple-Pay-affects-online-security/?cid=con_contently_smartphones_taboola_-_-_004_-_auto&utm_source=taboola&utm_medium=referral


From My iPhone

‘Blackhat’ Review: Chris Hemsworth Makes an Implausible Hacker | Variety

‘Blackhat’ Review: Chris Hemsworth Makes an Implausible Hacker | Variety: To eyes that grew up on the rich texture of celluloid — or are accustomed to the relative sharpness of other digital formats — there’s a certain cheapness to the result.

Monday, January 19, 2015

Attack Surface Reduction – Chapter 4 - InfoSec Institute

Attack Surface Reduction – Chapter 4 - InfoSec Institute: "The foundation of acceptable risk is a minimized, monitored, and managed attack surface (AS). The process of achieving this state is attack surface reduction (ASR). ASR closes all but required doors leading to system assets and constrains others with access rights, monitoring, and response."



'via Blog this'

TEOS, the Trusted Email Open Standard

TEOS, the Trusted Email Open Standard: "On April 30, 2003, an organization known as ePrivacy Group, of which Stephen Cobb was a co-founder, announced the Trusted Email Open Standard (TEOS) as a way to fight spam, message spoofing, and email fraud"



https://books.google.com/books?id=Ykf6-nhW_CwC&pg=PA65&lpg=PA65&dq=teos+trusted+email+open+standard&source=bl&ots=ApQGsp604W&sig=gW6SJ7OyOJBag9oJGG7oPirqvas&hl=en&sa=X&ei=QuKqVK6wMse3oQSAq4L4Dg&ved=0CFAQ6AEwCg#v=onepage&q=teos%20trusted%20email%20open%20standard&f=false



'via Blog this'

Is Anybody HomeKit? Apple Wants To Make Your House Smarter | Fast Company | Business + Innovation

Is Anybody HomeKit? Apple Wants To Make Your House Smarter | Fast Company | Business + Innovation: "According to IDG, the Internet of Things will grow into an $8.9 trillion market by 2020. "



'via Blog this'

The Internet of Things Is Poised to Change Everything, Says IDC | Business Wire

The Internet of Things Is Poised to Change Everything, Says IDC | Business Wire: "The Internet of Things (IoT) represents a new construct in the information and communications technology (ICT) world that is occupying the minds of IT vendors, service providers, and systems integrators as it represents huge potential for new streams of revenue and new customers. "



'via Blog this'

The Rise of the Hyper Educated Poor | Julia Meszaros

The Rise of the Hyper Educated Poor | Julia Meszaros: "the growing horde of academics living in poverty points to the fact that Master's and PhD degrees are no savior from a lower class existence."



'via Blog this'

Smart Home Devices Will Need Smarter Security | MIT Technology Review

Smart Home Devices Will Need Smarter Security | MIT Technology Review: "A zombie network of home routers highlights the importance of prioritizing smart appliance security."



'via Blog this'

Charlie I am Not | Opinion | teleSUR

Interesting ...

http://www.telesurtv.net/english/opinion/Charlie-I-am-Not-20150114-0054.html


From My iPhone

2015 Formula One season - Wikipedia, the free encyclopedia

The following twenty Grands Prix are currently scheduled to take place in 2015.[1][58]


From My iPhone

New Atheism's Islam-obsessed rape and rescue fantasy | Middle East Eye

Wikipedia defines New Atheism as a "social and political movement" that advocates the view that religion should not be tolerated. The Internet Encyclopedia of Philosophy says it's specifically the anti-religious views ascribed by Richard Dawkins, Sam Harris and Christopher Hitchens.


http://www.middleeasteye.net/columns/new-atheisms-islam-obsessed-rape-and-rescue-fantasy-804596123


From My iPhone

Saturday, January 17, 2015

With crypto in UK crosshairs, secret US report says it’s vital | Ars Technica

The 2009 document, from the US National Intelligence Council, said encryption was the "best defense" for protecting private data, according to an article published Thursday by the newspaper. Airing of the five-year forecast came the same day Cameron embarked on a US trip to convince President Obama to place pressure on Apple, Google, and Facebook to curtail their rollout of stronger encryption technologies in e-mail and messaging communications. According to Thursday's report:

http://arstechnica.com/security/2015/01/with-crypto-in-uk-crosshairs-secret-us-report-says-its-vital/?utm_medium=twitter&utm_source=twitterfeed

Parents investigated for neglect after letting kids walk home alone

Maryland parents are under investigation by Children's Protective Services (CPS) for allowing their 10-year-old daughter and 6-year-old son to walk from a local park to their home through a suburban community.

http://www.washingtonpost.com/local/education/maryland-couple-want-free-range-kids-but-not-all-do/2015/01/14/d406c0be-9c0f-11e4-bcfb-059ec7a93ddc_story.html?tid=pm_local_pop

Thursday, January 15, 2015

How IoT big data will transform manufacturing automation - TechRepublic

How IoT big data will transform manufacturing automation - TechRepublic: To execute the smart manufacturing vision, enterprise systems must be modified so they can interface with and monitor IoT sensor-based technology, along with a host of disparate manufacturing, logistics, procurement, order, and other systems that must be integrated into a single back plane system.

Wednesday, January 14, 2015

Privacy and Data Protection by Design — ENISA

This report contributes to bridging the gap between the legal framework and the available technolog-ical implementation measures by providing an inventory of existing approaches, privacy design strat-egies, and technical building blocks of various degrees of maturity from research and development.

Http://www.enisa.europa.eu/activities/identity-and-trust/library/deliverables/privacy-and-data-protection-by-design

Tuesday, January 13, 2015

SECURING CYBERSPACE - President Obama Announces New Cybersecurity Legislative Proposal and Other Cybersecurity Efforts | The White House

SECURING CYBERSPACE - President Obama Announces New Cybersecurity Legislative Proposal and Other Cybersecurity Efforts | The White House: This is part of the reason why it’s going to be so important for Congress to work with us and get an actual bill passed that allows for the kind of information-sharing we need. Because if we don’t put in place the kind of architecture that can prevent these attacks from taking place, this is not just going to be affecting movies, this is going to be affecting our entire economy in ways that are extraordinarily significant.”

Insider Threats in the Cloud: 6 Harrowing Tales

Cloudy whether...

http://www.darkreading.com/cloud/insider-threats-in-the-cloud-6-harrowing-tales-/a/d-id/1318583?_mc=sm_dr

From My iPhone

Friday, January 9, 2015

FBI Sony statements could put government in a bind - SFGate

FBI Sony statements could put government in a bind - SFGate: “Once the government says it has good reason to believe North Korea did it, then that is good reason to believe that the defendant did not do it unless the defendant was an agent of North Korea,” said Jennifer Granick, director of civil liberties at the Stanford Center for Internet and Society.

Impossible Attribution, Aaron Swartz, and Deterring Cybercrime: An Interview with Peter Toren -HackSurfer

Read. ..

http://www.hacksurfer.com/posts/impossible-attribution-aaron-swartz-and-deterring-cybercrime-an-interview-with-peter-toren


From My iPhone

Lawsuits against Sony Pictures could test employer responsibility for data breaches - The Washington Post

"For decades, [Sony] failed, and continues to fail, to take the reasonably necessary actions to provide a sufficient level of IT security to reasonably secure its employees' [personal information]," according to the class action lawsuit filed in U.S. District Court in California by San Francisco-based Lieff Cabraser Heimann & Bernstein LLP.

http://www.washingtonpost.com/blogs/the-switch/wp/2014/12/19/lawsuits-against-sony-pictures-could-test-employer-responsibility-for-data-breaches/


From My iPhone

Thursday, January 8, 2015

Insider Threat | The CERT Division

Malicious insider threat to an organization is a current or former employee, contractor, or other business partner who has or had authorized access to an organization's network, system, or data and intentionally exceeded or misused that access in a manner that negatively affected the confidentiality, integrity, or availability of the organization's information or information systems.

http://www.cert.org/insider-threat/

Wednesday, January 7, 2015

Commenti: The future and present of work in ICT

Commenti: The future and present of work in ICT: This paper outlines a selection of technological and organisational developments in the information and communication technology (ICT) sector and analyses their likely challenges for workers and trade unions around the globe.

Tuesday, January 6, 2015

Learn to Play 20 Easy, Three Chord, Guitar Songs - Chainsaw Guitar Tuition

Try these...

http://chainsawguitartuition.net/learn-to-play-20-easy-three-chord-guitar-songs/

Guitar Lessons: Blog: 10 Famous Songs with Three Chords or Less

Try these...

https://www.guitartricks.com/blog/index.php?p=10-Famous-Songs-with-Three-Chords-or-Less

Guitar Chord Basics: How to Play G C D Chords | The Art of Manliness

Reverse the images...

http://www.artofmanliness.com/2010/03/19/3-guitar-chords-every-man-should-know/

Your medical record is worth more to hackers than your credit card | Reuters

Your medical record is worth more to hackers than your credit card | Reuters: Your medical information is worth 10 times more than your credit card number on the black market.

Cyberattacks are on the rise. And health-care data is the biggest target. - The Washington Post

Cyberattacks are on the rise. And health-care data is the biggest target. - The Washington Post: Despite its security flaws, the retail sector isn’t the one most vulnerable to breaches. That dubious honor goes to health care.

GCHQ's 'spook first' programme to train Britain's most talented tech entrepreneurs - News - Gadgets and Tech - The Independent

GCHQ's 'spook first' programme to train Britain's most talented tech entrepreneurs - News - Gadgets and Tech - The Independent: Whitehall officials are now examining whether recruitment to the secretive listening agency could be opened up to graduates who would ultimately like to set up their own companies or work in the commercial IT sector.

US sanctions North Korea over Sony hack and classifies attack evidence | Ars Technica

US sanctions North Korea over Sony hack and classifies attack evidence | Ars Technica: The administration said that "independent experts don't have access to the same classified information as the FBI."

FBI Investigating Whether Companies Are Engaged in Revenge Hacking - Bloomberg

FBI Investigating Whether Companies Are Engaged in Revenge Hacking - Bloomberg: The hacked are itching to hack back.

Saturday, January 3, 2015

Unified Security – A Vision Of The Future | Symantec Connect

Unified Security – A Vision Of The Future | Symantec Connect: "Naturally, companies need to continue to deploy solutions like endpoint protection, host intrusion prevention, email and web filtering, database monitoring, firewalls etc. "



'via Blog this'

Analyzing Sony and Staples Breaches with Sentiment Analysis | Cyber Frontier Labs

Sentimental?

https://cyberfrontierlabs.com/2014/12/25/analyzing-sony-and-staples-breaches-with-sentiment-analysis/


From My iPhone

Why Educators Should Take the Digital Skills Gap Seriously - Hootsuite Social Media Management

Why Educators Should Take the Digital Skills Gap Seriously - Hootsuite Social Media Management: In reality, however, the digital skills gap is estimated to cost companies over $1 trillion in productivity annually, according to one poll.

A Theory of Cyber Deterrence | Georgetown Journal of International Affairs

A Theory of Cyber Deterrence | Georgetown Journal of International Affairs: Lacking from traditional deterrence theory is the problem of identifying the source of an attack.

A Hacker's Hit List of American Infrastructure - The Atlantic

A Hacker's Hit List of American Infrastructure - The Atlantic: Exploiting an Aurora attack is simply a matter of gaining access, remotely, possibly because equipment is still running on factory-installed passwords, and then turning off and on a switch.

Prime National - Frequently Asked Questions (FAQ)

Bbb ok

http://www.primenational.com/faq.html

Browse Files on iPhone & iPad from Mac or PC | iBrowse

Try it

http://www.ibrowseapp.com/

From My iPhone

Friday, January 2, 2015

Martin ranger Products

Lalala

http://www.martinrangertech.com/products.html

JPMorgan Chase hack due to missing 2-factor authentication on one server | Ars Technica

This shouldn't have been a problem. JPMorgan uses two-factor authentication, meaning that a password alone isn't sufficient to log in to a system. Unfortunately, for an unknown reason one of the bank's servers didn't have this enabled. It allowed logging in with username and password alone, and this weak point in the bank's defenses was sufficient for hackers to break in and access more than 90 other servers on the bank's network.

http://arstechnica.com/security/2014/12/jpmorgan-chase-hack-because-of-missing-2-factor-auth-on-one-server/


From My iPhone

JPMorgan Hackers Came In the Front Door -- in June. Two Months of Mayhem - Bloomberg

Really sophisticated...

http://mobile.bloomberg.com/news/2014-08-29/jpmorgan-hack-said-to-span-months-via-multiple-flaws.html


From My iPhone

Neglected Server Provided Entry for JPMorgan Hackers - NYTimes.com

Neglected Server Provided Entry for JPMorgan Hackers - NYTimes.com: Most big banks use a double authentication scheme, known as two-factor authentication, which requires a second one-time password to gain access to a protected system.

Ingredients for Architecting the Security of Things

But the storage of security data at scale isn't the most interesting aspect of the data problem.

http://www.tripwire.com/state-of-security/off-topic/ingredients-for-architecting-the-security-of-things/

Thursday, January 1, 2015

Stealth for Critical Infrastructure

Stealth for Critical Infrastructure: Industrial Control Systems (ICS) and Supervisory Control and Data Acquisition (SCADA) systems are particularly ripe targets for cyber threats across most industries that comprise the critical infrastructure community.