Friday, July 31, 2015

So how do we identify phishing emails? - ITsecurityITsecurity

So how do we identify phishing emails? - ITsecurityITsecurity

http://itsecurity.co.uk/2015/07/so-how-do-we-identify-phishing-emails/

network security Articles : United Airlines hacked by same group that breached Anthem and OPM

network security Articles : United Airlines hacked by same group that
breached Anthem and OPM


http://www.rightrelevance.com/search/articles/hero?article=9c56b03b9fc031076bc273d6c75b2a50083bc700&query=network%20security&taccount=networksecurr

CISA: the dirty deal between Google and the NSA that no one is talking about | TheHill

CISA: the dirty deal between Google and the NSA that no one is talking
about | TheHill

The reality is that both types of abuse are dangerous, and they work
hand in hand.

http://thehill.com/blogs/congress-blog/technology/249521-cisa-the-dirty-deal-between-google-and-the-nsa-that-no-one-is

PCI June 30 compliance deadline looms; big fines possible for retailers - FierceRetailIT

PCI June 30 compliance deadline looms; big fines possible for retailers - FierceRetailIT: "While many retailers are under the gun for the EMV liability shift deadline in October, there's an earlier cutoff on June 30 that may be just as important to meet: five mandatory changes in compliance for the Payment Card Industry Data Security Standard version 3.0."



'via Blog this'

Chris Valasek on Car Hacking | Threatpost | The first stop for security news

Chris Valasek on Car Hacking | Threatpost | The first stop for security news

https://threatpost.com/chris-valasek-on-car-hacking/113917

Researcher says can hack GM's OnStar app, open vehicle, start engine | Reuters

Researcher says can hack GM's OnStar app, open vehicle, start engine | Reuters: "A researcher is advising drivers not to use a mobile app for General Motors Co's (GM.N) OnStar vehicle communications system, saying hackers can exploit a security flaw in the product to unlock cars and start engines remotely."



'via Blog this'

Tuesday, July 28, 2015

Beyond Malware: Detecting the Undetectable - DR - CrowdStrike

Beyond Malware: Detecting the Undetectable - DR - CrowdStrike: In an environment where 60 percent of attacks do not involve malware, it is clear that conventional malware-based protection is no longer sufficient for stopping the advanced techniques employed by today’s most sophisticated adversaries.

SecurityWatch NZ - ESET: How your business can recover from a hack

SecurityWatch NZ - ESET: How your business can recover from a hack

Here's what you can do to recover as fast as possible from a hack– and
with your dignity still intact.

http://securitywatch.co.nz/story/eset-how-your-business-can-recover-hack/

Monday, July 27, 2015

Chrysler Fiat vulnerability handling

ITEM # 1417 - RMISC-15V461-1264.pdf: A communications port was
unintentionally
left in an open condition allowing it to listen
to
and accept
commands from unauthenticated sources.

The Neanderthal Parallax - Robert J. Sawyer

The Neanderthal Parallax - Wikipedia, the free encyclopedia: "Barasts are dedicated hunter-gatherers, and have no developed concept of agriculture. Despite this, they are still technologically advanced, possessing quantum computers, helicopters, communications and biological recording instruments. They live in harmony with their environment, using clean energy, living homes, and keeping a constant population."



'via Blog this'

About the iPad Side Switch - Apple Support

About the iPad Side Switch - Apple Support:



'via Blog this'

Take a look at the future of IT Security - YouTube

Take a look at the future of IT Security - YouTube

Small Business and PCI Cost vs. Benefit | PCI Compliance Guide

Small Business and PCI Cost vs. Benefit | PCI Compliance Guide: "Many small business owners wonder why they would ever need to comply with a security standard like the PCI DSS."



'via Blog this'

PCI DSS Self-Assessment Questionnaire (SAQ)

PCI DSS Self-Assessment Questionnaire (SAQ): "The PCI DSS SAQ is a validation tool for merchants and service providers that are not required to undergo an on-site data security assessment per the PCI DSS Security Assessment Procedures."



'via Blog this'

PCI June 30 compliance deadline looms; big fines possible for retailers - FierceRetailIT

PCI June 30 compliance deadline looms; big fines possible for retailers - FierceRetailIT: "Retailers who don't meet the compliance requirements and experience a data breach may be subject to heavy fines from $100,000 to $500,000 or more, according to information security company Trustwave."



'via Blog this'

Saturday, July 18, 2015

Automakers again at odds with cyber-security researchers

Arguments over whether cyber-security researchers should have the right to experiment on cars may not end when the US Copyright Office issues a key ruling expected later this month.

Http://www.autoblog.com/2015/07/15/automakers-isac-car-hack-cyber-security-congress/

As cars rely more heavily on computers, risk of hackers grows - The Washington Post

As cars rely more heavily on computers, risk of hackers grows - The Washington Post: The future of driving has been cast in terms of cars that talk to one another and eventually drive themselves, but all of that computer camaraderie on the roadways could fall prey to hackers unless the auto industry and regulators come up with stout defenses.

Finland enlists convicted Lizard Squad hacker to fight cyber crime

Finland enlists convicted Lizard Squad hacker to fight cyber crime: The extent of Kivimaki's punishment will be a two-year suspended sentence, the confiscation of his computer, and being made to return some €6,500 in profits earned from cyber crime

Vietnamese cops nab Chinese credit card hacker wanted for stealing nearly $4.9mln | Society | Thanh Nien Daily

Vietnamese cops nab Chinese credit card hacker wanted for stealing nearly $4.9mln | Society | Thanh Nien Daily: Zhu and his gang allegedly stole credit card details of many people, including South Koreans, to steal money. He then changed the money into digital money used in online games, before selling the digital one for real money, according to the Chinese police.

Vietnamese hacker sentenced to 13 years in prison for stealing 200m US identities | Daily Mail Online

Vietnamese hacker sentenced to 13 years in prison for stealing 200m US identities | Daily Mail Online:



13 years for stealing identities of 200 million Americans in mass hacking theft scheme

'Silk Road' Founder Is Given Life Prison Sentence

'Silk Road' Founder Is Given Life Prison Sentence: The mastermind behind the Silk Road, an underground online drug market, has been sentenced to life in prison.

How the feds brought down a notorious Russian hacker

How the feds brought down a notorious Russian hacker: Sasha Panin called himself "Gribodemon," and his evil works in the world of cybercrime have bedeviled millions.

Friday, July 17, 2015

Tannhäuser | Mesmerize Records

Tannhäuser | Mesmerize Records: ""Tannhäuser" is the debut album by experimental alt. rock band Electric Yakuza. Produced from the first note to the last detail by Tallulah MarsCat"



'via Blog this'

Thursday, July 16, 2015

Call Forwarding - AT&T Wireless

Call Forwarding - AT&T Wireless: All AT&T wireless and GoPhone voice plans include Call Forwarding.

iPhone 5 Sleep/Wake Button Replacement Program - Apple Support

iPhone 5 Sleep/Wake Button Replacement Program - Apple Support


https://www.apple.com/support/iphone5-sleepwakebutton/

Mass Loaded Vinyl Barrier, Noise Barriers, Acoustic Barriers

Mass Loaded Vinyl Barrier, Noise Barriers, Acoustic Barriers


http://www.acousticalsurfaces.com/noise_barrier/vinylbar.htm

Ovum research shows privileged users are highest risk to data for 54 percent of IT decision makers (ITDMs) in European organisations - IT SECURITY GURU

Ovum research shows privileged users are highest risk to data for 54
percent of IT decision makers (ITDMs) in European organisations - IT
SECURITY GURU


http://www.itsecurityguru.org/2015/06/17/ovum-research-shows-privileged-users-are-highest-risk-to-data-for-54-percent-of-it-decision-makers-itdms-in-european-organisations/

Malware And Hacking Forum Darkode Is Shut Down; Dozens Arrested : The Two-Way : NPR

http://www.npr.org/sections/thetwo-way/2015/07/15/423196810/malware-and-hacking-forum-darkode-is-shut-down-dozens-arrested

Monday, July 6, 2015

How to Reset a Dell BIOS Password

How to Reset a Dell BIOS Password: Christophe Grenier wrote a program that calculates the master BIOS password for Dell Latitudes from the Service Tag number. That program is available here.

Hacking Team sold spy software to blacklisted Sudan and 'stonewalled UN investigation'

Hacking Team sold spy software to blacklisted Sudan and 'stonewalled UN investigation': "a subsequent invoice for €480,000 dated July 2012 seems to prove that the Italian company was involved in selling surveillance software to Sudan."



'via Blog this'

OM-D E-M5 Mark II Digital Camera, Wi-Fi, Weatherproof System | Olympus

OM-D E-M5 Mark II Digital Camera, Wi-Fi, Weatherproof System | Olympus: "With a keen focus on an authentic feel, functional beauty and refinement, this is a very special OM-D – and just a small quantity is available worldwide."



'via Blog this'

Hacking Team hacked: firm sold spying tools to repressive regimes, documents claim | Technology | The Guardian

One invoice apparentlyreveals the company dealing with a private Brazilian firm, YasNiTech, to whom it sold three months access to its remote access tool, allowing the firm to hack in to Android and Blackberry phones, and Windows devices...

http://www.theguardian.com/technology/2015/jul/06/hacking-team-hacked-firm-sold-spying-tools-to-repressive-regimes-documents-claim

Sunday, July 5, 2015

SoylentNews Comments | Major Cyber Attack Will Cause Significant Loss of Life by 2025, Experts Predict

A major cyber attack will happen between now and 2025 and it will be large enough to cause "significant loss of life or property losses/damage/theft at the levels of tens of billions of dollars," according to more than 60 percent of technology experts interviewed by the Pew Internet and American Life Project.

https://soylentnews.org/comments.pl?sid=4632&cid=111929

Pre-Installed ‘Bloatware’ Proves to be the Achilles’ heel for Samsung and Oppo | Uncover California

Pre-Installed 'Bloatware' Proves to be the Achilles' heel for Samsung
and Oppo | Uncover California


http://uncovercalifornia.com/content/25144-pre-installed-bloatware-proves-be-achilles-heel-samsung-and-oppo

The Dark Side of Computing: SRI International and the Study of Computer Crime

The Dark Side of Computing: SRI International and the Study of Computer Crime


http://www.computer.org/csdl/mags/an/2007/01/man2007010003-abs.html

Saturday, July 4, 2015

cultural theory and perceived risk of crime - Google Scholar

cultural theory and perceived risk of crime - Google Scholar

https://scholar.google.com/scholar?q=cultural+theory+and+perceived+risk+of+crime&hl=en&as_sdt=0&as_vis=1&oi=scholart&sa=X&ei=L1uYVbGXB82YyAT0ooHQBw&ved=0CBkQgQMwAA

The Purge (2013) - IMDb

The Purge (2013) - IMDb: In an America wracked by crime and overcrowded prisons, the government has sanctioned an annual 12-hour period in which any and all criminal activity-including murder-becomes legal. The police can't be called. Hospitals suspend help. It's one night when the citizenry regulates itself without thought of punishment.

Studies — CyberGreen Project

What is this...

http://www.cybergreen.net/studies/

How much does cybercrime cost? | University of Cambridge

How much does cybercrime cost? | University of Cambridge

AV $$ 😃

http://www.cam.ac.uk/research/news/how-much-does-cybercrime-cost

Crooks Use Hacked Routers to Aid Cyberheists — Krebs on Security

Crooks Use Hacked Routers to Aid Cyberheists — Krebs on Security


http://krebsonsecurity.com/2015/06/crooks-use-hacked-routers-to-aid-cyberheists/?utm_source=dlvr.it&utm_medium=twitter

Friday, July 3, 2015

Endnotes with square brackets

Endnotes with square brackets: "With your insertion point in the text box beside Find What:, choose the Format button and choose Style then choose Endnote Reference from the list and click OK.
Click in the text box beside Replace With: and type [^&]. Now click on the Replace All button. A message will pop up to tell you how many replacements were made. Click OK. All of your Endnote Reference numbers should now have square brackets around them."



'via Blog this'

The One Attitude Every Successful Person Has | Jeff Haden | LinkedIn

The One Attitude Every Successful Person Has | Jeff Haden | LinkedIn


https://www.linkedin.com/pulse/one-attitude-every-successful-person-has-jeff-haden

Samsung S5 Heating issue

Thank you for your email. Your customer reference number is 211******3.

I apologise for the issues you are facing with your Samsung device after performing software update, In regard to your query I recommend performing a factory data reset.

A factory reset will erase all of the information stored on your device and will restore the software to original manufacturer settings. It will not remove software updates but it can undo any changes to settings that might be causing you problems.

This process will erase all of your data so a full back up using Samsung KIES is strongly advised before conducting a factory reset.

In order to back up your data, you will need to install KIES onto your PC. There are two versions of KIES: the one you need depends on what version of Android your Samsung device is using.

To check the Android version of your device, please follow these steps:

1. Go to your Apps
2. Then to Settings
3. Click on More
4. Click About Device
5. Here you will see your Android version
If your Android version is 4.3 or above, you will need to download KIES 3. If your Android version is below 4.3, please download KIES.

You can download both versions from this link: Samsung KIES

Once the correct version is installed, please follow these steps:

1. Connect your device to your computer using the Samsung USB Cable that came with your device (the charging cable with the plug head removed)
2. Open KIES and click the Back Up/Restore tab.
3. Click Data Backup
4. Mark the check box next to the content you want to back up. You can select all content by marking the check box next to Select all Items. Click Backup.
5. Click Complete when the backup is finished.
6. You can have KIES automatically back up your device every time it's connected by clicking the check box next to Automatically back up when USB connection is established.

To factory reset the device please follow the next steps:

1. From the Home Screen, tap the Applications menu item.
2. Tap on Settings.
3. Scroll down to Privacy and tap it.
4. Tap the Factory Data Reset menu item.
5. Tap the Reset phone button.
6. Tap the Erase Everything button.

Your phone will now reset and will begin the initial start-up process. Please ensure that you have your various accounts' details ready – e.g., Samsung account, email account, Wi-Fi.

If you have any more queries, please get in touch either by phone or email and I will be happy to help.

Kind regards,

Maneesha

Customer Service Representative

Wednesday, July 1, 2015

Bureau of Justice Statistics (BJS) - Criminal Victimization, 2013 (Revised)

Bureau of Justice Statistics (BJS) - Criminal Victimization, 2013 (Revised): "Presents 2013 estimates of rates and levels of criminal victimization in the United States. This bulletin includes violent victimization (rape or sexual assault, robbery, aggravated assault, and simple assault) and property victimization (burglary, motor vehicle theft, and property theft). It describes the annual change from 2012 and analyzes 10-year trends from 2004 through 2013."



'via Blog this'