Saturday, March 31, 2018

Kimberlé Crenshaw Explains The Power Of Intersectional Feminism In 1 Minute | HuffPost

Kimberlé Crenshaw Explains The Power Of Intersectional Feminism In 1 Minute | HuffPost: "It took Kimberlé Crenshaw, an esteemed civil rights advocate and law professor, about 60 seconds to lay out the importance of “intersectional feminism” on Friday ― and the internet could not get enough of it."



'via Blog this'

10 Insanely Good Reasons You Should Publish On Medium | WordStream

10 Insanely Good Reasons You Should Publish On Medium | WordStream: "If you haven't yet taken the leap, here are 10 insanely good reasons you should syndicate your content on Medium."



'via Blog this'

Tesla says Autopilot was engaged in fatal crash under investigation in California

Tesla says Autopilot was engaged in fatal crash under investigation in California

https://www.wsj.com/articles/tesla-says-autopilot-was-engaged-in-fatal-crash-under-investigation-in-california-1522462409

These 10 industries are most impacted by malicious bot traffic - TechRepublic

Tesla says Autopilot was engaged in fatal crash under investigation in California

Tesla says Autopilot was engaged in fatal crash under investigation in California

Strike 3?

https://www.wsj.com/articles/tesla-says-autopilot-was-engaged-in-fatal-crash-under-investigation-in-california-1522462409

Friday, March 30, 2018

Cybercriminals using clever tricks to hide malware in phones

Cybercriminals using clever tricks to hide malware in phones: While analysts figure out new methodologies for analyzing malware and users begin to understand how all this works, cybercriminals are seeking new ways to hide in phones and compromise devices.

Exclusive: Arizona governor and Uber kept self-driving program secret, emails reveal | Technology | The Guardian

Exclusive: Arizona governor and Uber kept self-driving program secret, emails reveal | Technology | The Guardian: "A cozy relationship with governor Doug Ducey enabled an autonomous program with limited expert oversight – but governor denies it was ‘secret’"



'via Blog this'

Uber reaches settlement with family of woman killed by self-driving car

Uber reaches settlement with family of woman killed by self-driving car: "It pulled its approximately 94 test vehicles off the roads after the accident, and Gov. Doug Ducey has since ordered them to stay off Arizona roads."



'via Blog this'

How to Improve Tech Candidate Recruitment

How to Improve Tech Candidate Recruitment: " So am I describing dating here or recruitment and hiring? Hard to tell, isn’t it?"



'via Blog this'

Yellow wristbands, segregation for Florida homeless in Irma

Yellow wristbands, segregation for Florida homeless in Irma: "she, her husband and her 17-month-old son arrived at an emergency shelter as Hurricane Irma closed in, they were separated from others by yellow wristbands and told to stay in an area with other people like them — the homeless."



'via Blog this'

Defining digital down

Defining digital down: "The Trump Federal Communications Commission (FCC) is following a similar “defining down” policy when it comes to what is acceptable in the all-important networks that connect us."



'via Blog this'

Monopoly quote

GDPR and the End of Reckless Data Sharing - SecurityRoundTable.org

GDPR and the End of Reckless Data Sharing - SecurityRoundTable.org

https://www.securityroundtable.org/gdpr-end-reckless-data-sharing/

The Ransomware Threat to ICS (Industrial Control Systems) Security

The Ransomware Threat to ICS (Industrial Control Systems) Security

https://www.tripwire.com/state-of-security/ics-security/ransomware-threat-ics-security/

Thursday, March 29, 2018

Connected cars pose security risks, and autonomous vehicles only compound the problem | Ovum Link

Connected cars pose security risks, and autonomous vehicles only compound the problem | Ovum Link: "In a few years, we will see the rise of autonomous, or self-driving vehicles, obviating the need for a driver altogether and relying even more heavily on connectivity to perform their tasks."



'via Blog this'

Download the report on Connected cars pose security risks, and autonomous vehicles only compound the problem

Download the report on Connected cars pose security risks, and autonomous vehicles only compound the problem: * The different types of cyber threat posed by Connected Cars

* What impact the evolution of autonomous vehicles will have on the overall attack surface of global automotive fleet

Virus Bulletin :: Last-minute paper: Industroyer: biggest threat to industrial control systems since Stuxnet

Virus Bulletin :: Last-minute paper: Industroyer: biggest threat to industrial control systems since Stuxnet: Our talk will cover a detailed analysis of Industroyer's malicious payloads that directly interfere with the targeted industrial control systems, as well as supporting modules responsible for command & control communication, persistence, and so on.

International operation dismantles organised criminal enterprise operating encrypted communications | Australian Criminal Intelligence Commission

Exclusive: Arizona governor and Uber kept self-driving program secret, emails reveal | Technology | The Guardian

Wednesday, March 28, 2018

About — Peggy Peattie Photography

About — Peggy Peattie Photography: Currently she is an independent photojournalist, documenting the stories of the homeless at www.TalesoftheStreet.com and teaching visual journalism at SDSU and UCSD..

Sophisticated hacking tools now in the hands of petty cybercriminals

Senior NSA official says tech is wondrous -- and risky in a world of cyberspace foes | Fox News

Senior NSA official says tech is wondrous -- and risky in a world of cyberspace foes | Fox News

http://www.foxnews.com/politics/2018/03/24/senior-nsa-official-says-technology-is-great-but-can-bring-great-risk-in-cybersecurity.html

Cyber Analogies: Historical Parallels to Cyber Warfare, Cyber and Computer Security

Cyber Analogies: Historical Parallels to Cyber Warfare, Cyber and Computer Security, Cyber Pearl Harbor Surprise Attack, Nuclear Scenarios, Internet and Web Attacks, Vulnerabilities – CyberWar

http://www.tobem.com/cyberwar/cyber-analogies-historical-parallels-to-cyber-warfare-cyber-and-computer-security-cyber-pearl-harbor-surprise-attack-nuclear-scenarios-internet-and-web-attacks-vulnerabilities/

Tuesday, March 27, 2018

Absent at Munich: Placing cybersecurity on the main stage of geopolitics – GCSC

Absent at Munich: Placing cybersecurity on the main stage of geopolitics – GCSC: "From this perspective, the main policy deliberations have focused on investing resources to solve short-term security deficiencies. But as the recent election attacks have shown, the use of cyber tools can have a long-standing strategic impact. As the internet of things continues to connect our devices to the cyber realm, real world risks have amplified dramatically."

Security Controls for Computer Systems: Report of Defense Science Board Task Force on Computer Security

Security Controls for Computer Systems: Report of Defense Science Board Task Force on Computer Security - RAND Report R-609-1 | RAND - Ware report 1973

https://www.rand.org/pubs/reports/R609-1/index2.html

Friday, March 23, 2018

Three things you won’t want to miss from ESET at RSA 2018 | WebWire

Three things you won’t want to miss from ESET at RSA 2018 | WebWire: "ESET’s technology and telemetry allows them to track some of the most dangerous and destructive cybercriminals and cyber-espionage groups — and how any IT department globally can now both utilize and benefit from the very same intel."



'via Blog this'

Creating Gritty Black and White Portraits - Jeff Smallwood Photography

Creating Gritty Black and White Portraits - Jeff Smallwood Photography: "I've been interested in learning is how to create gritty, dark, black and white portraits"



https://wegraphics.net/blog/tutorials/photoshop-quick-tip-create-a-dragan-style-portrait-effect-in-5-steps/



https://youtu.be/3I10C8j1B0o - cool Dragan effect tutorial.



'via Blog this'

How to Test Images, Messages, Packaging, and Product Concepts with Surveys | SurveyMonkey

How to Test Images, Messages, Packaging, and Product Concepts with Surveys | SurveyMonkey: "For example, your hypothesis could be, “The package design with both a picture of the product and the logo will outperform a package with just our company logo because consumers 1) recognize and trust our brand but 2) want to see what they’re getting.”"



'via Blog this'

Cybersecurity apathy rife among US government employees, survey finds

Cybersecurity apathy rife among US government employees, survey finds: "Just 13 percent of government employees believe they have complete personal responsibility for the security of their work devices or information, according to a survey by security services firm Dtex Systems."



'via Blog this'

The NSA Worked to “Track Down” Bitcoin Users, Snowden Documents Reveal

The NSA Worked to "Track Down" Bitcoin Users, Snowden Documents Reveal

https://theintercept.com/2018/03/20/the-nsa-worked-to-track-down-bitcoin-users-snowden-documents-reveal/

US National Security Agency Develops System To Identify Bitcoin Users, Say…

Thursday, March 22, 2018

78% of Healthcare Workers Lack Data Privacy, Security Preparedness

78% of Healthcare Workers Lack Data Privacy, Security Preparedness: "Seventy percent of employees in numerous industries lack awareness to stop preventable cybersecurity attacks, MediaPro found in its 2017 State of Privacy and Security Awareness Report. However, 78 percent of healthcare employees showed some lack of preparedness with common privacy and security threat scenarios."



'via Blog this'

The power of optimism in determining the future. A briefing from Futurist Chet W. Sisk - LEAD Global

You'll see it when you believe it: The power of optimism in determining the future. A briefing from Futurist Chet W. Sisk - LEAD Global: "Tell the whole story. Tell them about what positive possibilities can come if they  re-imagine the future  beyond  the dystopian tropes of our movies, tv shows and pop culture.  We used to call that hope."



'via Blog this'

Booking Flights: Our Data Flies with Us - Our Data Our Selves

Booking Flights: Our Data Flies with Us - Our Data Our Selves: "Our Passenger Name Records (PNRs) are commonly displayed as six-digit codes, but they are actually data-rich records generated every time we book flights or hotels. In this article we look at what data is included in a PNR and how this data might be used against politically-engaged individuals."



'via Blog this'

Wednesday, March 21, 2018

Quick Start - Games FB

Quick Start - Games: Go to the Basic Settings section of your app and make sure to set the category to Games. Save your changes.

A Poor Mother's Right to Privacy: A Review by Danielle Keats Citron :: SSRN

How Cambridge Analytica turned Facebook ‘likes’ into a lucrative political tool | Technology | The Guardian

How Cambridge Analytica turned Facebook ‘likes’ into a lucrative political tool | Technology | The Guardian: The algorithm at the heart of the Facebook data breach sounds almost too dystopian to be real. It trawls through the most apparently trivial, throwaway postings –the “likes” users dole out as they browse the site – to gather sensitive personal information about sexual orientation, race, gender, even intelligence and childhood trauma.

“Cambridge Analytica executives created a company with the Executive Director & Deputy Chairman of…”

"Cambridge Analytica executives created a company with the Executive Director & Deputy Chairman of…" https://medium.com/@wsiegelman/cambridge-analytica-executives-created-a-company-in-2017-with-the-executive-director-deputy-b803f27f84a2

THE AUTOMOBILE IS THE WORST INVENTION EVER

THE AUTOMOBILE IS THE WORST INVENTION EVER

http://greenbaum-pr.com/automobile-worst-invention-ever/

Tuesday, March 20, 2018

Fees and entry requirements

Fees and entry requirements: To apply for this course you need a Professional Diploma or a Postgraduate Diploma, you must also have a minimum of six months work experience at graduate level, in either a managerial or professional capacity which may include voluntary work, placements, internships, project management etc.

MA snd MSc by Research - Research degrees - Research - Kingston University London

MA snd MSc by Research - Research degrees - Research - Kingston University London: In exceptional circumstances, we may consider you for admission to a research degree without the conventional qualifications. If you have substantial relevant professional experience, including publications or written reports, the University will consider these as a potential alternative basis for an application for admission to a research degree programme.

Private traits and attributes are predictable from digital records of human behavior | Proceedings of the National Academy of Sciences

Private traits and attributes are predictable from digital records of human behavior | Proceedings of the National Academy of Sciences: We show that easily accessible digital records of behavior, Facebook Likes, can be used to automatically and accurately predict a range of highly sensitive personal attributes including: sexual orientation, ethnicity, religious and political views, personality traits, intelligence, happiness, use of addictive substances, parental separation, age, and gender.

Big Five Personality Test

Big Five Personality Test: This is an interactive version of the IPIP Big-Five Factor Markers, a measure of the big five personality traits.

20 TOP VOICES OF CYBER SECURITY AND INFORMATION SECURITY FOR MARCH 2018 BY JAN BARBOSA - beBee Producer

20 TOP VOICES OF CYBER SECURITY AND INFORMATION SECURITY FOR MARCH 2018 BY JAN BARBOSA - beBee Producer

https://www.bebee.com/producer/@jan-barbosa/20-top-voices-of-cyber-security-and-information-security-for-march-2018-by-jan-barbosa

Monday, March 19, 2018

Sony eSupport - VGN-SZ360P - News & Alerts

Humalogy, the Perfect Blending of Humanity & Technology - SpeakersOffice

Humalogy, the Perfect Blending of Humanity & Technology - SpeakersOffice: What is the definition of Humalogy?“The perfect blending of humanity and technology. Melding the head (information processing power) and the heart (human/spiritual connection.) The efficient use of machines, and the sensitive understanding of emotions.”

Friday, March 16, 2018

Apprenticeships - ApprenticePower

Apprenticeships - ApprenticePower: "Apprentice Power collaborates with employers, industry and trade associations, education institutions, staffing agencies and investors to create apprenticeship strategies that support economic development. "



'via Blog this'

National Novel Writing Month

"In order to update your word count in November, you need to give your novel a title (don't worry, you can always change it later!). You cannot write your novel on our site, but you can share a short synopsis and excerpt."

https://nanowrimo.org/how-it-works

Free Family History and Genealogy Records — FamilySearch.org

Free Family History and Genealogy Records — FamilySearch.org: Genealogy: Ancestors Remembered

Sunday, March 11, 2018

No one’s coming. It’s up to us. – Dan Hon – Medium

No one’s coming. It’s up to us. – Dan Hon – Medium: Metcalfe’s law says that the value of a telecommunications network is proportional to the square of the number of connected users of the system.

Wednesday, March 7, 2018

Cybersecurity Briefings | Accenture

Cybersecurity Briefings | Accenture: To protect their businesses, CEOs and directors must demand appropriate briefings from their chief information security officers (CISOs).

Here's what keeps your CISO up at night - Help Net Security

Here's what keeps your CISO up at night - Help Net Security: 89.1 percent of all information security leaders are concerned about the rise of digital threats they are experiencing across web, social and mobile channels, according to the 2018 CISO Survey by RiskIQ.

Here's what keeps your CISO up at night - Help Net Security

Here's what keeps your CISO up at night - Help Net Security: 89.1 percent of all information security leaders are concerned about the rise of digital threats they are experiencing across web, social and mobile channels, according to the 2018 CISO Survey by RiskIQ.

Women of Infosec call bullsh*t on RSA's claim it could only find one female speaker by Magda CHELLY

Two Factor Auth List

Two Factor Auth List

https://twofactorauth.org/

Inside the 'Stalkerware' Surveillance Market, Where Ordinary People Tap Each Other's Phones - Motherboard

Inside the 'Stalkerware' Surveillance Market, Where Ordinary People Tap Each Other's Phones - Motherboard

For LM

https://motherboard.vice.com/en_us/article/53vm7n/inside-stalkerware-surveillance-market-flexispy-retina-x

Monday, March 5, 2018

Free SSL Guide | InMotion Hosting

Free SSL Guide | InMotion Hosting: "When you enable Free SSL, your domains are automatically assigned an SSL if they are eligible"



'via Blog this'

Fred Cohen & Associates

Fred Cohen & Associates: "A Case for Benevolent Viruses
by Dr. Frederick B. Cohen * "



'via Blog this'

Cyber-attack: US and UK blame North Korea for WannaCry - BBC News

Cyber-attack: US and UK blame North Korea for WannaCry - BBC News: "The US and UK governments have said North Korea was responsible for the WannaCry malware attack affecting hospitals, businesses and banks across the world earlier this year."



'via Blog this'

UK and US blame Russia for 'malicious' NotPetya cyber-attack - BBC News

UK and US blame Russia for 'malicious' NotPetya cyber-attack - BBC News: "The Russian military was directly behind a "malicious" cyber-attack on Ukraine that spread globally last year, the US and Britain have said."



'via Blog this'

Saturday, March 3, 2018

Navigating Healthcare's Biggest Cybersecurity Challenges Endpoint

"To validate the HIMSS results, Palo Alto Networks® analyzed threat data from more than 1,000 global healthcare providers and found that email-based campaigns account for 94 percent of all attacks"

https://get.info.paloaltonetworks.com/webApp/navigating-healthcares-cybersecurity-challenges-en?utm_source=twitter&utm_medium=social-cpc&utm_content=himsssecuritystudy&utm_campaign=Events-Americas-EN-Programmatic-HIMSS&CampaignId=7010g000001Lvwp

Black Hat | EU

Black Hat | Sponsors: No other European security event offers the depth of content combined with the opportunities for networking and career growth that Black Hat delivers.

Friday, March 2, 2018

S. Cobb on Security: Getting to know CISOs: Challenging assumptions about closing the cybersecurity skills gap

S. Cobb on Security: Getting to know CISOs: Challenging assumptions about closing the cybersecurity skills gap: "The cybersecurity skills gap is a serious problem for many countries, and it is a problem that I have been studying for some time."



Tweet with pic



'via Blog this'

Big Band Recordings Every Drummer Should Own – DRUM! Magazine

Caring Neighborhoods - City of Sacramento

Caring Neighborhoods - City of Sacramento: "Sacramento is a city of neighborhoods. Many residents of these neighborhoods are growing older and are facing the challenges of living independently and no longer feel connected to the communities they live in. In Sacramento, approximately 47,551 people are over 65. Thirty percent of those are over 80 years old. "



'via Blog this'

File your CFP Submission for @dianainitiative | The Diana Initiative 3.0

File your CFP Submission for @dianainitiative | The Diana Initiative 3.0

Check out....

https://www.dianainitiative.org/cfp/

World's Biggest Family Tree Contains 13 Million People—And It Shows…

World's Biggest Family Tree Contains 13 Million People—And It Shows…

"colleagues downloaded 86 million public profiles from Geni.com, one of the largest collaborative genealogy websites"

http://www.newsweek.com/worlds-biggest-family-tree-contains-13-million-people-and-it-shows-when-827893

Thursday, March 1, 2018

419 Princeton Dr Se, Albuquerque, NM 87106 - realtor.com®

419 Princeton Dr Se, Albuquerque, NM 87106 - realtor.com®: "Pueblo Style UNM/CNM House & Guest House"



'via Blog this'

7 Best Places to Live in Albuquerque for Top Healthcare - Movoto

7 Best Places to Live in Albuquerque for Top Healthcare - Movoto: "The 87106 area is home to the UNM/Southeast Heights neighborhood, which offers immediate access to the University of New Mexico hospital and the UNM Carrie Tingley Hospital. "



'via Blog this'

PCSD – Psychiatric Centers at San Diego

PCSD – Psychiatric Centers at San Diego: "Psychiatric Centers at San Diego, Incorporated Medical Group (PCSD) is a group of psychiatrists, therapists, and nurse practitioners who are engaged in a wide range of professional endeavors."



'via Blog this'

eCrime 2018 : IEEE 13th Symposium on Electronic Crime Research

eCrime 2018 : IEEE 13th Symposium on Electronic Crime Research: The thirteenth Symposium on Electronic Crime Research (eCrime) 2018 will be held between May 14th - 16th 2018 in San Diego, CA.

The Right Way to Monetize a Blog (With Lessons From Wait But Why)

blog sponsorship - Google Search