Tuesday, May 30, 2017

Wally Rebounder Ping Pong Partner Table Tennis Trainer | Wally Rebounder Table Tennis Trainer

Wally Rebounder Ping Pong Partner Table Tennis Trainer | Wally Rebounder Table Tennis Trainer


http://www.wallyrebounder.com/

Cycon | Live Stream of CyCon 2017 Keynotes

Cycon | Live Stream of CyCon 2017 Keynotes: "The 9th International Conference on Cyber Conflict, CyCon 2017, brings key experts and decision-makers of the global cyber defence community to Tallinn from May 30th to June 2nd.

Selected Cycon 2017 Keynotes listed below are broadcast live on the news portal of Estonian national broadcaster ERR http://www.err.ee/598943/kaks-paeva-otseulekandeid-kuberjulgeoleku-konverentsilt

We invite you to share the link! "



'via Blog this'

You're not going to believe what I'm about to tell you - The Oatmeal

You're not going to believe what I'm about to tell you - The Oatmeal



Good source of stuff...

Wednesday, May 24, 2017

Encryption: Vital to the Founding Fathers, Vital to Modern America | RealClearTechnology

Encryption: Vital to the Founding Fathers, Vital to Modern America | RealClearTechnology: "However, the issues at stake today are not fundamentally different from those present at America’s founding."



'via Blog this'

Encryption to come under renewed fire from European Commission in June

Encryption to come under renewed fire from European Commission in June: "Encryption will face a make it or break it moment in June when the European Commission lays out new options for forcing internet companies to hand over the keys."



'via Blog this'

At Crypto Hearing, Best Arguments Against Backdoor Mandates Come from Members of Congress Themselves

At Crypto Hearing, Best Arguments Against Backdoor Mandates Come from Members of Congress Themselves: "“I have three general concerns about Director Comey’s proposal. First, it’s impossible to build just a backdoor for just the good guys… j"



'via Blog this'

Encryption Workarounds by Orin S. Kerr, Bruce Schneier :: SSRN

Encryption Workarounds by Orin S. Kerr, Bruce Schneier :: SSRN: "The remainder of the essay develops lessons about encryption workarounds and the broader public debate about encryption in criminal investigations. "



'via Blog this'

Sunday, May 21, 2017

New Gene Tests Pose a Threat to Insurers - The New York Times

Genetic testing is another reason to fear the AHCA.

Pre-existing Conditions and Medical Underwriting in the Individual Insurance Market Prior to the ACA

Feds use anti-terror tool to hunt the undocumented

NSA feared its hacking tool would get loose — then it did – The Denver Post

NSA feared its hacking tool would get loose — then it did – The Denver Post

http://www.denverpost.com/2017/05/17/nsa-hacking-tool-loose/

GAO Finds Information Security, Privacy Key IoT Challenges

Thursday, May 18, 2017

WannaCrypt Hackers May Have A Hard Time Claiming That Ransom Without Getting Caught

WannaCrypt Hackers May Have A Hard Time Claiming That Ransom Without Getting Caught: Though bitcoin’s anonymity makes it popular, hackers may find it impossible to collect the $70,000 collected so far without leaving a trail behind them.

Chainalysis – Blockchain analysis

Chainalysis – Blockchain analysis: Train your analysts to be able to spot emerging threats from the deep web and investigate ransomware or extortion notes in-house.

New York's New Cybersecurity Regulations: The Good, The Bad And The Ugly - Security - United States

New York's New Cybersecurity Regulations: The Good, The Bad And The Ugly - Security - United States: The first foray into comprehensive state regulation of business data protection practices, and arguably the most stringent, is New York's Cybersecurity Requirements for Financial Services Companies, to be found at 23 NYCRR 500.

Study finds cybersecurity pros are hiding breaches, bypassing protocols, and paying ransoms - TechRepublic

Study finds cybersecurity pros are hiding breaches, bypassing protocols, and paying ransoms - TechRepublic

http://www.techrepublic.com/article/study-finds-cybersecurity-pros-are-hiding-breaches-bypassing-protocols-and-paying-ransoms/

Medical Devices Hit By Ransomware For The First Time In US Hospitals | Forbes Mobile

Adylkuzz hack, called larger than WannaCry, slows computers across the globe - CBS News

Wednesday, May 17, 2017

Tuesday, May 16, 2017

Monday, May 8, 2017

Wanna Know If Someone Planted Spyware on Your Computer? - Motherboard

Wanna Know If Someone Planted Spyware on Your Computer? - Motherboard: "Figuring out whether someone has installed malware on your computer can be tricky. Specifically, victims of domestic abuse and surveillance often don't know what sort of software has been used to monitor them."



'via Blog this'