Friday, October 20, 2017

Rakks Brackets go to Church | Rakks Blog

Rakks Brackets go to Church | Rakks Blog: "Guy Campbell, the owner of Shelf Shop Guy Inc., is an exclusive distributor of Rakks brackets and shelving hardware systems, "



'via Blog this'

Tuesday, October 10, 2017

Homeless community suing city of San Diego

A ‘pressure cooker’: Trump’s frustration and fury rupture alliances, threaten agenda - The Washington Post

"Donald Trump got elected with minority support from the American electorate, and most of his efforts thus far are focused on energizing and solidifying the 40 percent of Americans who were with him, primarily by attacking the 60 percent who were not," Republican pollster Whit Ayres said. "That is great for his supporters, but it makes it very difficult to accomplish anything in a democracy."

https://www.washingtonpost.com/politics/a-pressure-cooker-trumps-frustration-and-fury-rupture-alliances-threaten-agenda/2017/10/09/41115744-ad0d-11e7-9e58-e6288544af98_story.html?utm_term=.99ad40dfadc5

Saturday, October 7, 2017

A Google security chief considers the NSA a state-sponsored threat | TechCrunch

A Google security chief considers the NSA a state-sponsored threat 

"Moderator and TechCrunch Senior Editor Frederic Lardinois asked Adkins if she thinks of the NSA as a state-sponsored threat in the same way as China and Russia. She confirmed, yes, she considers the US' National Security Agency in that way. Does she worry about the NSA? Yes, she does and it's good to worry about them because if they can attack, other organizations can attack too."

https://techcrunch.com/2017/09/18/a-google-security-chief-considers-the-nsa-a-state-sponsored-threat/?ncid=rss

Man loses damages claim against IVF clinic over 'forged' consent

Wednesday, October 4, 2017

Men's Short Sleeve Hawaiian Shirts | Reyn Spooner

Must-Know Phishing Statistics 2017

Must-Know Phishing Statistics 2017: Click rates for smaller, more customized phishing campaigns are significantly higher.

91% Of Cyberattacks Start With A Phishing Email

91% Of Cyberattacks Start With A Phishing Email: The majority of cyberattacks begin with a user clicking on a phishing email. Ever wondor why users continue to fall for phishing emails?

Monday, October 2, 2017

Why Consent Lifecycle Management is crucial for GDPR compliance and your customer data | Janrain

I didn't specifically mention this in the tip - I was mXxing out the word count, but it pretty interesting re: intersection between coding and regulatory stuff...

Ontario Court of Appeal recognises new tort for invasion of privacy

Ontario Court of Appeal recognises new tort for invasion of privacy: The Ontario Court of Appeal overturned the lower court's decision, ruling in favour of Jones and recognising a new common law tort: intrusion upon seclusion.

Android libraries can share personal information with apps that lack permissions-Backlayer

Android libraries can share personal information with apps that lack permissions-Backlayer: "Libraries are a common target for attackers due to the abundant information that they hold. "



'via Blog this'

Discover the Countries Leading in App Usage

Discover the Countries Leading in App Usage: "In 2016, users downloaded over 90 billion apps on the iOS App Store and Google Play, and they spent nearly 900 billion hours in apps."



'via Blog this'

Saturday, September 30, 2017

Mobile data theft a risk from shared app libraries

Mobile data theft a risk from shared app libraries: ""Mobile developers, and developers in general for that matter, need to always focus on secure coding and, in particular, least privilege," Bambenek said. "



'via Blog this'

Mobile app security best practices: introduction to the four pillars of code security

Mobile app security best practices: introduction to the four pillars of code security: "Four pillars of security, if you will. There is nothing new here; we have just taken what we have learned from traditional SDLC practices, and applied it to mobile with a heavy emphasis on third-party library management. "



'via Blog this'

Is uw organisatie klaar voor de GDPR? | ESET

Thursday, September 28, 2017

Jarvis Writing Desk & Reviews | Birch Lane

Myerstown Writing Desk & Reviews | Birch Lane

Mark Zuckerberg says Facebook will release Russia ads to investigators - Business Insider

"Now, I wish I could tell you we're going to be able to stop all interference, but that wouldn't be realistic. There will always be bad people in the world, and we can't prevent all governments from all interference. But we can make it harder. We can make it a lot harder. And that's what we're going to do."

http://www.businessinsider.com/mark-zuckerberg-says-facebook-will-release-the-russia-ads-to-investigators-2017-9

Morrison & Foerster: NY cyber

Tuesday, September 26, 2017

Ultimate Bed Platform Beds with Drawers

Free shipping...about $1,100...

Clean File Metadata Exchange Makes it Easy to Separate Malware from Safe Files | PCMag.com

Clean File Metadata Exchange Makes it Easy to Separate Malware from Safe Files | PCMag.com: "False positives are often the result of antivirus software encountering a safe program too new to recognize. IEEE's solution hinges on the Clean File Metadata Exchange (CMX) service. With CMX, software authors can submit metadata for new files such as new programs or updates to existing programs before they are even released. Security vendors could then access this data in real-time to stay current with the latest legitimate files and prevent their programs from flagging them as malware."

Like-it Smoke Modular Drawers | The Container Store

Like-it Smoke Modular Drawers | The Container Store: Our innovative Like-it Modular Drawers are engineered to be stacked together in virtually any combination!

Hazelwood Home Carrabba Storage Cube 15" Cube Unit Bookcase & Reviews | Wayfair

Like-it Smoke Modular Drawers | The Container Store

Like-it Smoke Modular Drawers | The Container Store: Like-it Modular Drawers are engineered to be stacked together in virtually any combination!

Niche Cubo Storage Set - 8 Cubes with 4 Optional Fabric Bins - School Furniture at SCHOOLSin

Monday, September 25, 2017

Loft Bed – Finnwood Designs

Loft Bed – Finnwood Designs: Our loft bed is perfect if you are in an apartment and can't spread out so the only way is up.

Extra Long Twin Captains Bed With 3 Drawers On Metal Tracks In Birch

Extra Long Twin Captains Bed With 3 Drawers On Metal Tracks In Birch: The Birch Captain's Bed, shown above in Extra Long Twin size, has three large drawers built-in with metal tracks and round wooden knobs that allow for ease of use when opening and closing.

Atlantic Furniture Soho Extra Long Twin Sleigh Mate's & Captain's Bed with Storage & Reviews | Wayfair

Atlantic Furniture Soho Extra Long Twin Sleigh Mate's & Captain's Bed with Storage & Reviews | Wayfair: he curved headboard and clean lines of the Soho provide a modern accent piece for any bedroom. (84")

Red Barrel Studio Ahoghill Extra Long Twin Mate's & Captain's Bed with Storage & Reviews | Wayfair

Red Barrel Studio Ahoghill Extra Long Twin Mate's & Captain's Bed with Storage & Reviews | Wayfair: he gently curved headboard lends an air of sleigh-bed style to the overall feel of the bed. (86.63" vs. 88")

Alcott Hill Homer Storage Platform Bed & Reviews | Wayfair

Alcott Hill Homer Storage Platform Bed & Reviews | Wayfair: A slight curve of the headboard and a gentle taper over mission style slats make the Homer a classic bed with a modern twist. (87" total.)

Saturday, September 23, 2017

XL Twin Loft Beds | The Bunk & Loft Factory

XL Twin Loft Beds | The Bunk & Loft Factory: "Below are photos of some of the solid wood XL twin loft beds that we have custom built for our customers. These are just examples of the furniture we can build, so if you don't see what you're looking for just ask! "



'via Blog this'

Twin Loft with Bed with Desk Chest and Ladder in Stone Wood Finish

Twin Loft with Bed with Desk Chest and Ladder in Stone Wood Finish: "This friendly loft bed is handcrafted of solid Eastern US poplar and veneers and comes in beautiful stone wood finish options. "



'via Blog this'

Twin Loft Bed - Francis Lofts & Bunks

Twin Loft Bed - Francis Lofts & Bunks: "While we recommend a full or queen sized loft bed when you have the space available, the twin is a perfect solution for the smallest of rooms. Thanks to aluminum, it is insanely sturdy yet very lightweight."



'via Blog this'

Donco Twin Metal Stairway Study Loft - Free Shipping Today - Overstock.com - 15866876

Thursday, September 21, 2017

Passwords to Access Over a Half Million Car Tracking Devices Leaked Online

Passwords to Access Over a Half Million Car Tracking Devices Leaked Online: "Kromtech discovered SVR’s data in a publicly accessible Amazon S3 bucket. It contained information on roughly 540,000 SVR accounts, including email addresses and passwords, as well as some license plates and vehicle identification numbers (VIN)."



'via Blog this'

Viacom Leak May Have Exposed Hundreds of Digital Properties—Paramount Pictures, Comedy Central, MTV, and More

Viacom Leak May Have Exposed Hundreds of Digital Properties—Paramount Pictures, Comedy Central, MTV, and More: "Among the files exposed, for example, are the access key and the secret key to its corporate Amazon Web Services (AWS) account. With that alone, an intruder may have gained further access to an untold number of servers hosted by the AWS account, which is where Viacom has said it plans to host nearly its entire infrastructure. "



'via Blog this'

Announcing the CNS Research Review – October 19-20, 2017 | CNS Website

Announcing the CNS Research Review – October 19-20, 2017 | CNS Website: The CNS Research Review is scheduled on October 19 and 20, 2017 at the UCSD Malamud Room at the Weaver Conference Center.

Tuesday, September 12, 2017

Flooding in Florida...

Flooding in Florida...
https://www.facebook.com/search/str/st.%2Bjohns%2Bcounty%2Bfire%2Brescue/keywords_blended_featured_posts?esd=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

Uber Settles FTC Allegations that It Made Deceptive Privacy and Data Security Claims | Federal Trade Commission

Uber Settles FTC Allegations that It Made Deceptive Privacy and Data Security Claims | Federal Trade Commission

Budapest Convention and related standards

Budapest Convention and related standards: "The Convention on Cybercrime of the Council of Europe (CETS No.185), known as the Budapest Convention, is the only binding international instrument on this issue. It serves as a guideline for any country developing comprehensive national legislation against Cybercrime and as a framework for international cooperation between State Parties to this treaty."

Operation Stop It! Uniting Law Enforcement With Communities In The Fight Against Identity Theft | Benzinga

Monday, September 11, 2017

Sneaky devs could abuse shared libraries to slurp smartphone data • The Register

Sneaky devs could abuse shared libraries to slurp smartphone data • The Register: Oxford researchers reckon they've spotted the next emerging trend in Android advertising (and possibly malware): using common libraries to “collude” between apps with different privilege levels.

21 Android Apps Spotted Using App Collusion Attacks

21 Android Apps Spotted Using App Collusion Attacks: The attack, named Mobile App Collusion (MAC), relies on malware developers splitting their malicious code across different applications, shared code libraries or other means.

Friday, September 8, 2017

How to Recover Deleted Videos from Canon Vixia HD Camcorders

How to Recover Deleted Videos from Canon Vixia HD Camcorders: As long as you have not tried to record anything else, or save any data onto your camcorder, there is a great possibility to recover deleted videos from Canon Vixia. In order to work around this issue, you will need an effective video recovery tool. One such application is Jihosoft Canon Vixia Video Recovery.

Monday, September 4, 2017

Power of Attorney: Plan ahead - MoneySavingExpert

Power of Attorney: Plan ahead - MoneySavingExpert: "If you've chosen the DIY route to make your Power of Attorney, follow the steps to apply online. You'll still need to print out the forms and sign them after you fill them in online."

Monday, August 28, 2017

New Report Highlights Gaps in Preparedness for Cybersecurity Risks to Critical Infrastructure, Calls for “Bold, Decisive Actions” | Publications | Morrison Foerster

New Report Highlights Gaps in Preparedness for Cybersecurity Risks to Critical Infrastructure, Calls for “Bold, Decisive Actions” | Publications | Morrison Foerster: The public and private sectors could together offer “tremendous cyber capabilities and resources,” the report states, but realization of that potential has fallen short in the face of a growing threat, creating “a narrow and fleeting window of opportunity before a watershed, 9/11-level cyberattack.”

China Plans To Create Cybersecurity Schools | PYMNTS.com

China Plans To Create Cybersecurity Schools | PYMNTS.com: China has announced news of its plan to build approximately four to six top-notch cybersecurity schools between 2017 and 2027 to do battle against hackers and cybercrime.

Our fear of killer robots might doom us all

Our fear of killer robots might doom us all: Only true for people to whom autonomous cars are a coll idea and not a nightmare on four wheels: "The problem is you probably won't have autonomous cars and 1,000 other cool inventions, too. Fear of new technology can be stultifying."

windows master image hacking defcon 22 - Google Search

Digital Journal: A Global Digital Media Network

Digital Journal: A Global Digital Media Network

http://m.digitaljournal.com/pr/3459764

Sunday, August 27, 2017

The Travel Pillow reinvented, the Trtl Pillow

The Travel Pillow reinvented, the Trtl Pillow: "Leave your feedback based on your experience with Trtl Pillow
Verify your purchase so we can send your claim code"



'via Blog this'

Ransomworms on the rise: yet another wake up call for the enterprise

MB168B | Monitors | ASUS USA

MB168B | Monitors | ASUS USA: Windows: Windows 7* (32 & 64 bit), Windows 8* (32 & 64 bit), Windows 8.1* (32 & 64 bit), Windows 10 (including Anniversary)
Mac OS: Yosemite 10.10, Mavericks 10.9, Mountain Lion 10.8, Sierra 10.12

How to Interpret a Correlation Coefficient r - dummies

Saturday, August 26, 2017

US Transparency Regarding International Law in Cyberspace | Just Security

"The 2013 Tallinn Manual dealt with conflict law and cyber warfare, while Tallinn 2.0, due out in next January, analyses how peacetime legal regimes apply to activities in cyberspace."

https://www.justsecurity.org/34465/transparency-international-law-cyberspace/

How do I interpret data in SPSS for Pearson's r and scatterplots?

How do I interpret data in SPSS for Pearson's r and scatterplots?: "When Pearson’s r is close to 1…
 
This means that there is a strong relationship between your two variables. This means that changes in one variable are strongly correlated with changes in the second variable."



'via Blog this'

IT professionals need more security training for DevOps

IT professionals need more security training for DevOps: "Despite the fact that nearly 80 percent of those who responded to the survey hold either a bachelor or master's degree in computer science, there is still an overwhelming lack of cybersecurity knowledge prior to entering the workforce.A large majority of those surveyed (70 percent) said that the security education they received did not fully prepare them for what their positions require."

Interpretation Catalysts in Cyberspace by Rebecca Ingber :: SSRN

Grey-Areas-in-the-International-Law-of-Cyberspace

Wednesday, August 23, 2017

Cyber security training

Cyber security training: "“A solid baseline of security-awareness training for employees is a good start and need not be expensive”

Stephen Cobb, digital security expert"



'via Blog this'

Tuesday, August 22, 2017

Great big list of cybersecurity resources | CSO Online

Great big list of cybersecurity resources | CSO Online: Here's an excuse for IT workers to take some extra time off and head to the beach. Bring a smartphone or tablet, and check out these cybersecurity lists. They're an easy read—chock-full of insightful cybersecurity facts, figures, statistics and more.

The U.S. Spy Hub in the Heart of Australia

The U.S. Spy Hub in the Heart of Australia: “Pine Gap literally hardwires us into the activities of the American military and in some cases, that means we will cop the consequences, like it or not,” said Tanter, the University of Melbourne professor. “Pine Gap will be contributing hugely in real-time to those operations, as well as in preparation for them. So whether or not the Australian government thinks that an attack on North Korea is either justified, or a wise and sensible move, we will be part of that,” Tanter added. “We’ll be culpable in the terms of the consequences.”

Did a Mole-Who-Must-Not-Be-Named Leak Plot to Elect Trump?

Did a Mole-Who-Must-Not-Be-Named Leak Plot to Elect Trump?: “We assess Russian President Vladimir Putin ordered an influence campaign in 2016 aimed at the U.S. presidential election. Russia’s goals were to undermine public faith in the U.S. democratic process, denigrate Secretary [Hillary] Clinton, and harm her electability and potential presidency. We further assess Putin and the Russian Government developed a clear preference for President-elect Trump. We have high confidence in these judgments ... Moscow’s influence campaign followed a Russian messaging strategy that blends covert intelligence operations—such as cyber activity—with overt efforts by Russian Government agencies, state-funded media, third-party intermediaries, and paid social media users or ‘trolls.’...”

Wednesday, August 9, 2017

Maybe Americans don’t need fast home Internet service, FCC suggests

Maybe Americans don’t need fast home Internet service, FCC suggests | Ars Technica: "Americans might not need a fast home Internet connection, the Federal Communications Commission suggests in a new document."



'via Blog this'

BlackHat 2017: Multi-Stage Attack Targeting Container Developers, Presented by Aqua

BlackHat 2017: Multi-Stage Attack Targeting Container Developers, Presented by Aqua: "An attack on a container developer has two angles: one is obvious, the other less so. The obvious one is the developer’s level of access to enterprise resources. "



'via Blog this'

Tuesday, August 8, 2017

Arms Control and Disarmament - U.S. History in Context

"The various arrangements, which reduced, limited, and regulated armaments, provided more stable international environment; but could not themselves resolve other threatening, contentious issues. Controlling armaments had to be coupled with diplomatic resolve so that in an atmosphere temporarily cleared of insecurities inspired by unregulated weaponry, statesmen might deal with critical political, social, and economic differences."

http://ic.galegroup.com/ic/uhic/ReferenceDetailsPage/ReferenceDetailsWindow

Monday, August 7, 2017

Russian hackers arrested on vacation in US-led operation | Fox News

Man Who Hacked his Former Employer Gets 18-Month ...

Man Who Hacked his Former Employer Gets 18-Month ...: "A federal court sentenced a Tennessee man to an 18-month prison sentence and ordered him to pay $172,394 in restitution, following his breach into a former employer's network and copying of emails in order to give his new company a competitive edge, according to the US Department of Justice."



'via Blog this'

Russian admits being Ebury botnet herder, now jailed for 46 months • The Register

Russian admits being Ebury botnet herder, now jailed for 46 months • The Register: "A Russian man has been imprisoned for 46 months after admitting to using the Ebury malware to create a massive botnet for fun and profit."



'via Blog this'

Bitcoin values in recent years

Bitcoin Kurs: "After a couple years the value of Bitcoin increased as bitcoins traded for about $0.30 on January 1, 2011, went to $31.50 about six months later and ended the year at $4.25. 2012 proved to be a less volatile year with the Bitcoin price staying under $15.



 2013 - The Insane Bitcoin Price | Bitcoin's Value Increases

But 2013 is a year to remember in Bitcoin since the Bitcoin value increased with use cases and innovation. The Bitcoin price started January around $13.25, hit $266 in April, crashed to $50 a week later, consolidated for about six months and then after the United States Senate hearings on Bitcoin launched to the moon and briefly reached $1,240 before ending the year at around $800."



'via Blog this'

No, the U.S. Government Should Not Disclose All Vulnerabilities in Its Possession - Lawfare

No, the U.S. Government Should Not Disclose All Vulnerabilities in Its Possession - Lawfare. NSA view...


https://www.lawfareblog.com/no-us-government-should-not-disclose-all-vulnerabilities-its-possession

Thursday, August 3, 2017

Have I been pwned? Pwned Passwords

Have I been pwned? Pwned Passwords: The entire set of passwords is downloadable for free below with each password being represented as a SHA1 hash to protect the original value (some passwords contain personally identifiable information).

Tuesday, August 1, 2017

Russia’s hack against Yahoo show need for regulating cyberattacks - San Francisco Chronicle

Events seem to have come full circle for Kaljurand, who's now chairing the Global Commission on the Stability of Cyberspace. The organization wants to establish guidelines on what's permissible or out of bounds when it comes to hacking computer systems in another country.

http://www.sfchronicle.com/business/article/Russia-s-hack-against-Yahoo-show-need-for-11005014.php

How a coffee machine brewed up ransomware, and other startling findings in the HIMSS cybersecurity report | Healthcare IT News

Coffee machines connected to an internal control room network instead of an isolated network were infected in a factory cyberattack. 

http://www.healthcareitnews.com/news/how-coffee-machine-brewed-ransomware-and-other-startling-findings-himss-cybersecurity-report

Sunday, July 30, 2017

Nuance Restores 75% of Clients After NotPetya Malware Attack

Nuance Restores 75% of Clients After NotPetya Malware Attack: Nuance Communications, Inc.�stated that it has restored 75 percent of its clients following the NotPetya malware attack it experienced last month.

Nuance Healthcare, which offers a transcription platform used by medical professionals, said its flagship eScription LH platform has almost been returned to all customers.

Tuesday, July 25, 2017

Saturday, July 22, 2017

IoTBDS 2018 : 3rd International Conference on Internet of Things, Big Data and Security

IoTBDS 2018 : 3rd International Conference on Internet of Things, Big Data and Security: 3rd International Conference on Internet of Things, Big Data and Security IoTBDS

website: http://iotbds.org/

March 19 - 21, 2018 Funchal, Madeira, Portugal

eCrime 2018 : 13th Symposium on Electronic Crime Research

eCrime 2018 : 13th Symposium on Electronic Crime Research: May 14th - 16th 2018 in San Diego, CA.

Tuesday, July 18, 2017

Bridging the Gap Between Students and Security: 7 Steps to Creating a Successful Cybersecurity Campaign | EDUCAUSE

Bridging the Gap Between Students and Security: 7 Steps to Creating a Successful Cybersecurity Campaign | EDUCAUSE: For six years, we've created awareness campaigns featuring online cybersecurity games that entice more than 10,000 campus members to participate. This number continues to grow each year.

More than 120 nations adopt first-ever treaty to ban nuclear weapons at UN - France 24

More than 120 nations adopt first-ever treaty to ban nuclear weapons at UN - France 24: The treaty was adopted by a vote of 122 in favor with one country -- NATO member The Netherlands -- voting against, while Singapore abstained.

Special events aren't so special for Sixth Avenue residents | San Diego Reader

Special events aren't so special for Sixth Avenue residents | San Diego Reader - process notes.


https://m.sandiegoreader.com/news/2017/jul/17/stringers-events-arent-special-sixth-avenue-resid/?templates=mobile&google_editors_picks=true

Sunday, July 9, 2017

Robert Schroder - Ambient Music Guide

Robert Schroder - Ambient Music Guide: "Robert Schroder is one of Krautrock's forgotten heroes, "



'via Blog this'

Saturday, July 8, 2017

Bitcoin is Now Larger Than Most Fiat Currencies in Europe & Americas in Market Cap

Bitcoin is Now Larger Than Most Fiat Currencies in Europe & Americas in Market Cap

https://www.cryptocoinsnews.com/bitcoin-now-larger-fiat-currencies-europe-americas-market-cap/

Why The Cloud And Internet Of Things Don't Always Mix

Why The Cloud And Internet Of Things Don't Always Mix: "Margaret Martonosi, professor at Princeton University, suggests that processing data closer to or within sensors and devices -- and not sending it out to the cloud -- may accomplish more, in a more secure way, and more economically. "There are ways we could do better at designing edge devices to do more computation locally an send less data to the cloud,""



'via Blog this'

Tweet from Tea Pain (@TeaPainUSA)

Tea Pain (@TeaPainUSA) tweeted at 4:18 PM on Fri, Jul 07, 2017:
The next Russian attack on our election will be public and "legal", courtesy of the Trump administration.

https://t.co/E1qrwH0PuR
(https://twitter.com/TeaPainUSA/status/883465291241590784?s=03)

Get the official Twitter app at https://twitter.com/download?s=13

Thursday, July 6, 2017

Russians Are Said to Be Suspects in Hacks Involving Nuclear Site - Bloomberg

Trump budget seeks $3B for Homeland Security cyber unit | TheHill

Trump budget seeks $3B for Homeland Security cyber unit | TheHill: "President Trump’s budget request seeks increases in cybersecurity personnel across several departments and over $3 billion in funding for a Department of Homeland Security (DHS) unit in charge of safeguarding the country’s cyber infrastructure."



'via Blog this'

Wednesday, July 5, 2017

The Silk Road Is Dead, But the Internet's Illicit Drug Economy Is Alive and Well

The Silk Road Is Dead, But the Internet's Illicit Drug Economy Is Alive and Well - Hit & Run : Reason.com

http://reason.com/blog/2017/06/22/the-silk-road-is-dead-but-the-internets

Cruz's ObamaCare fix gets support from Hill conservatives | Fox News

Cruz's ObamaCare fix gets support from Hill conservatives | Fox News: "“The mandates the federal government puts on [Americans] are so ridiculous that men are forced to carry coverage for mammograms, women are forced to carry coverage for prostate issues. It’s absurd,” Marc Short, Trump's director of legislative affairs, told “Fox News Sunday.” “We’re going to get rid of many of those regulations and mandates to lower cost.”"



'via Blog this'

A Primer on DarkNet Marketplaces — FBI

A Primer on DarkNet Marketplaces — FBI: "But what are these underground marketplaces, and what exactly is the DarkNet? To understand both, you first have to have a basic understanding of the entire Internet."



'via Blog this'

A Primer on DarkNet Marketplaces — FBI

Tuesday, July 4, 2017

Monday, July 3, 2017

Dark web drugs

'Smishing' scams target your text messages. Here's how to avoid them | khou.com

What is genetic discrimination? - Genetics Home Reference

Genetic Discrimination and Other Laws - National Human Genome Research Institute (NHGRI)

Add to reference list.

Sunday, July 2, 2017

This is why your rent will keep going up in San Diego - The San Diego Union-Tribune

This is why your rent will keep going up in San Diego - The San Diego Union-Tribune: San Diego County stood out from much of the nation in having the second-worst housing. It has 58 percent of housing that is considered one or two stars (out of five) because of inferior construction, the study said. Los Angeles was the worst, 61 percent, and Austin had the best, 17 percent.

Thursday, June 29, 2017

Page Not Found - Lenovo Support

Page Not Found - Lenovo Support: "The document you have requested is not available. You may have entered an incorrect URL or login with authorized credentials (for Lenovo Field Servicers and/or Call Center Agents only) to view the page."



'via Blog this'

Tuesday, June 27, 2017

Why Mechanical Turk is the greatest market research tool you never thought to use

"One tricky thing about mTurk is setting up the HITs themselves. You need to know a little HTML code. But I'll include the very basic version I use:

<h3>Please follow the link for the survey</h3>"


https://medium.com/@vacord/why-mechanical-turk-is-the-greatest-market-research-tool-you-never-thought-to-use-872120766ee

Towards a Cyber-Security Treaty | Just Security

"Policymakers must therefore first acknowledge existing legal frameworks that transcend the orthodox focus on the law of war. These likely provide a much better starting point. Last year's Report of the U.N. Group of Governmental Experts, for example, has come up with cyber-specific rules of responsible behavior in cyberspace. In addition, Russia, China and four other States have signed an additional non-binding "international code of conduct for information security", in which they pledged "not to use information… to interfere in the affairs of other States or with the aim of undermining the political, economic, and social stability.""

https://www.justsecurity.org/32268/cyber-security-treaty/

PSA: Petya Ransomware Affecting Critical Systems Globally: Here's What to Do.

Sunday, June 25, 2017

Survey Shows US CIOs Getting A GDPR Headache - InformationWeek

Survey Shows US CIOs Getting A GDPR Headache - InformationWeek: US companies that don't have a presence in Europe still have to be sure that they comply with the EU's privacy laws regarding personally identifiable data.

Study finds cybersecurity pros are hiding breaches, bypassing protocols, and paying ransoms - TechRepublic

Study finds cybersecurity pros are hiding breaches, bypassing protocols, and paying ransoms - TechRepublic: It's a shocking discovery that could shake your concept of security to its core: Those trusted to protect your networks are ignoring their own policies. Is something rotten in the state of cybersec?

NSA officials worried about the day its potent hacking tool would get loose. Then it did. - The Washington Post

NSA officials worried about the day its potent hacking tool would get loose. Then it did. - The Washington Post: "“NSA identified a risk and communicated it to Microsoft, who put out an immediate patch” in March, said Mike McNerney, a former Pentagon cybersecurity official and a fellow at the Truman National Security Project. The problem, he said, is no senior official took the step of shouting to the world: “This one is very serious and we need to protect ourselves.”

But critics say the government got off easy this time. What if the Shadow Brokers had dumped the exploits in 2014, before the government had begun to upgrade software on its computers? What if they had released them and Microsoft had no ready patch?"



'via Blog this'

NSA officials worried about the day its potent hacking tool would get loose. Then it did. - The Washington Post

NSA officials worried about the day its potent hacking tool would get loose. Then it did. - The Washington Post: "“If one of our targets discovered we were using this particular exploit and turned it against the United States, the entire Department of Defense would be vulnerable,” the second employee said. “You just have to have a foothold inside the network and you can compromise everything.”"



'via Blog this'

EternalBlue has raised questions

The timing of EternalBlue has raised questions for experts because Microsoft made history by cancelling Patch Tuesday in February then released the fixes for the EternalBlue flaws in a March 2017 Patch Tuesday bulletin about one month before the Shadow Brokers unlocked the full details of the EternalBlue exploit.

Risk & Repeat: Microsoft slams NSA over EternalBlue

Risk & Repeat: Microsoft slams NSA over EternalBlue: "In the aftermath of the WannaCry ransomware attacks this month, Microsoft took the unprecedented step of publically calling out the National Security Agency for hoarding vulnerabilities and exploits, such as EternalBlue.

"



'via Blog this'

BBC video

Cycon | Call for Papers 2018

Thursday, June 22, 2017

Closing the Cybersecurity Skills Gap With a New Collar Approach

Bughunter University

Bughunter University: This site was created by the Google Security Team for members of our Vulnerability Reward Program bug hunter community. If you want to create great vulnerability reports, you've come to the right place! Take a look at various tips on how to be successful with our reward program, get a little behind-the-scenes knowledge, and learn from the mistakes other bug hunters sometimes make.

Program Rules – Application Security – Google

Program Rules – Application Security – Google We have long enjoyed a close relationship with the security research community. To honor all the cutting-edge external contributions that help us keep our users safe, we maintain a Vulnerability Reward Program for Google-owned web properties, running continuously since November 2010.

Patch Rewards – Application Security – Google

Patch Rewards – Application Security – Google Of course, you need to make sure that your work does not violate any law and does not disrupt or compromise any data that is not your own.

HHS targeting outdated regs in wake of damning cybersecurity report, WannaCry

HHS targeting outdated regs in wake of damning cybersecurity report, WannaCry | Healthcare IT News: new cybersecurity threats require updated guidelines, HHS, CMS, ASPR officials say.