Thursday, May 31, 2018

Cisco's Talos Intelligence Group Blog: New VPNFilter malware targets at least 500K networking devices worldwide

Cisco's Talos Intelligence Group Blog: New VPNFilter malware targets at least 500K networking devices worldwide: "Defending against this threat is extremely difficult due to the nature of the affected devices. The majority of them are connected directly to the internet, with no security devices or services between them and the potential attackers. "



'via Blog this'

Cisco's Talos Intelligence Group Blog: New VPNFilter malware targets at least 500K networking devices worldwide

Cisco's Talos Intelligence Group Blog: New VPNFilter malware targets at least 500K networking devices worldwide: "The behavior of this malware on networking equipment is particularly concerning, as components of the VPNFilter malware allows for theft of website credentials and monitoring of Modbus SCADA protocols. Lastly, the malware has a destructive capability that can render an infected device unusable, which can be triggered on individual victim machines or en masse, and has the potential of cutting off internet access for hundreds of thousands of victims worldwide."



'via Blog this'

You should reboot and update your router to protect from malware | Popular Science

You should reboot and update your router to protect from malware | Popular Science: "If you have any of these routers, it’s especially important that you reboot and patch your hardware to the most recent version. If you get your router through an ISP, you can also call the provider to see if they have any further instructions, which may include swapping out your gear."



'via Blog this'

Experts Letter on the Importance of Security Research

Experts Letter on the Importance of Security Research - Center for Democracy & TechnologyCenter for Democracy & Technology: On April 10, 2018, over fifty experts and expert advocates published a statement in support of security research and against efforts to chill or intimidate security researchers.

Turning an Amazon Echo Into a Spy Device Only Took Some Clever Coding | WIRED

Turning an Amazon Echo Into a Spy Device Only Took Some Clever Coding | WIRED: Then again, putting a mic in your home naturally invites questions over whether it can be used for eavesdropping—which is why researchers at the security firm Checkmarx started fiddling with Alexa, to see if they could turn it into a spy device. They did, with no intensive meddling required.

200 Million Sets of Japanese PII Emerge on Underground Forums | SecurityWeek.Com

200 Million Sets of Japanese PII Emerge on Underground Forums | SecurityWeek.Com: Advertised by a Chinese threat actor at around $150, the dataset contained names, credentials, email addresses, dates of birth, phone numbers, and home addresses, and was initially spotted in December 2017.

"Wicked" Variant of Mirai Botnet Emerges | SecurityWeek.Com

"Wicked" Variant of Mirai Botnet Emerges | SecurityWeek.Com: Similar to other botnets based on Mirai, the newly discovered Wicked iteration contains three main modules: Attack, Killer, and Scanner. Unlike Mirai, however, which used brute force to gain access to vulnerable IoT devices, Wicked uses known and available exploits, many of which are already old, the security researchers discovered.

Luxury hackers crack Bimmers and Benzes, a tale of BMW's bugs and Mercedes-Benz thugs

Luxury hackers crack Bimmers and Benzes, a tale of BMW's bugs and Mercedes-Benz thugs

https://www.scmagazine.com/luxury-hackers-crack-bimmers-and-benzes-a-tale-of-bmws-bugs-and-mercedes-benz-thugs/article/768267/

Feds: Braking system disabled in Uber self-driving SUV that fatally struck Arizona woman

Feds: Braking system disabled in Uber self-driving SUV that fatally struck Arizona woman | Local news | tucson.com

http://tucson.com/news/local/feds-braking-system-disabled-in-uber-self-driving-suv-that/article_f4817b98-5f63-11e8-b386-1732458ded61.amp.html

Tuesday, May 29, 2018

An unsecured T-Mobile website made customer information available to anyone - The Verge

An unsecured T-Mobile website made customer information available to anyone - The Verge: A T-Mobile web domain left millions of customers’ account information — including their names, addresses, and sometimes tax identification numbers — unprotected for anyone to access.

Monday, May 28, 2018

Saturday, May 26, 2018

The Regiment Today

The Regiment Today: "We have been part of the fabric of London for over 150 years. The Company is proud to be Combat Infantry. "



'via Blog this'

WW1 London Scottish 2

WW1: "National Archive Reference: WO 95/2340/2

Unit: 2nd/14th London Regiment (2nd Battalion London Scottish Regiment) -90th Brigade: 30th Division

Date Range: 01 June 1918 – 31st August 1919

Description: This Diary covers the history of the 2nd Battalion from when they returned from Palestine and re-joined the war on the Western Front, through the last 100 days through Belgium and then their work after the armistice based in Etaples.   This volume has been digitised and is available to download for a fee - not yet:"

'via Blog this'

WW1 - London Scottish 1

WW1: "National Archive Reference: WO 95/2956/1

Unit: 1st/14th London Regiment (1st Battalion London Scottish Regiment) – 168th Brigade; 56th Division

Date Range: 01 February 1916 – 31 May 1919

Description: This War Diary covers the Battalion’s service with the 56th (London) Division including the various battles of the Somme; Arras 1917 and 1918; 3rd Ypres;  Cambrai to the end of the War and the Army of Occupation in Hilden, Germany.  This volume has been downloaded."

'via Blog this'

Discovery | The National Archives

Discovery | The National Archives: "Our guides are a great place to start your research. What are you looking for?"



'via Blog this'

Wednesday, May 23, 2018

Conf fees

Exclusive: U.S. Government Can’t Get Controversial Kaspersky Lab Software Off Its Networks

Exclusive: U.S. Government Can’t Get Controversial Kaspersky Lab Software Off Its Networks: "The law says American agencies must eliminate the use of Kaspersky Lab software by October. U.S. officials say that’s impossible—it’s embedded too deep in our infrastructure."



'via Blog this'

RSA's 1996 Data Security Conference Will Bring Together "Who's Who" of Cryptography

RSA's 1996 Data Security Conference Will Bring Together "Who's Who" of Cryptography; January Conference Will Feature Most Current Information on Security Standards, Technologies, and Products from Industry, Academic, and Government Experts. - Free Online Library: "Dec. 11, 1995--The fifth annual 1996 RSA Data Security Conference promises to be one of the most important cryptography events of the year, as well as the largest RSA conference to date. The conference, which will be held January 17-19, 1996 at San Francisco's Fairmont Hotel, will feature the latest in data encryption technologies, products, market and regulatory issues, and will showcase the newest commercial applications of modern cryptographic technology with an emphasis on Public Key Cryptosystems. "



'via Blog this'

Tuesday, May 22, 2018

incompetech Music Search

incompetech Music Search: ""Cyborg Ninja" Kevin MacLeod (incompetech.com)
Licensed under Creative Commons: By Attribution 3.0 License
http://creativecommons.org/licenses/by/3.0/"



'via Blog this'

Shop Enterprise Hard Drives and Server Parts

Shop Enterprise Hard Drives and Server Parts: "Need Help finding the correct part? Live Chat operators are standing by."



'via Blog this'

NIH Computer Security Awareness Course

NIH Computer Security Awareness Course: "If you wish to earn a certificate, you must complete each course in a single session, without closing your browser."



'via Blog this'

13 Free InfoSec Training Resources For IT Pros

13 Free InfoSec Training Resources For IT Pros: "There are all kinds of free training resources available for information security professionals. "



'via Blog this'

Google and Microsoft disclose new CPU flaw, and the fix can slow machines down

Google and Microsoft disclose new CPU flaw, and the fix can slow machines down

https://www.theverge.com/2018/5/21/17377994/google-microsoft-cpu-vulnerability-speculative-store-bypass-variant-4

How to Wrap Text Around an Image. | CoffeeCup Software

How to Wrap Text Around an Image. | CoffeeCup Software

https://www.coffeecup.com/help/articles/how-to-wrap-text-around-an-image/

HTML- Text- Wrapping Text Around Images

Tesla tech issues

Monday, May 21, 2018

Free Broken Link Checking Tool - Dead Link Checker

Free Broken Link Checking Tool - Dead Link Checker: Stopping search engine website crawlers in their tracks - damaging your rankings by preventing Google, Yahoo, Bing, etc. from indexing the page.
Negatively affecting user experience - by redirecting visitors to error pages.

Saturday, May 19, 2018

CPI Inflation Calculator

Cleaning up | SSL Insecure Content Fixer

Cleaning up | SSL Insecure Content Fixer: "Once you identify what is causing your HTTPS insecure content warnings, you can plan how to fix them. Start by classifying your warnings in groups, and then look at how each group can be handled."



'via Blog this'

Wednesday, May 16, 2018

Acrylic COUNTER TOP Display Case 12 x 7 x 22.5 (different shelf spacing avail) | eBay

Acrylic COUNTER TOP Display Case 12 x 7 x 22.5 (different shelf spacing avail) | eBay:



'via Blog this'

About Super Soundproofing - The First Online Soundproofing Resource

About Super Soundproofing - The First Online Soundproofing Resource: "We are proud to be the first established soundproofing company offering exclusive soundproofing products and services online."



'via Blog this'

12 Most Useful .htaccess Tricks for WordPress

12 Most Useful .htaccess Tricks for WordPress: "The .htaccess file is a server configuration file. It allows you to define rules for your server to follow for your website."



'via Blog this'

Redirecting a Web Folder Directory to another Directory in htaccess

Redirecting a Web Folder Directory to another Directory in htaccess: "Redirecting within the same domain
Using htaccess in your root level of your web server, how you redirect one page to another is:

RewriteRule ^url-string-to-redirect$ http://www.yourdomain.com/your-new-url-string [R=301,L]"



'via Blog this'

HP 500658-B21 4gb Memory 4rx8 Pc3-8500r-7lp

HP 500658-B21 4gb Memory 4rx8 Pc3-8500r-7lp - 501534-001, 500203-061 at Amazon.com:



Note price...$20.


RSA's 1996 Data Security Conference Will Bring Together "Who's Who" of Cryptography

RSA's 1996 Data Security Conference Will Bring Together "Who's Who" of Cryptography; January Conference Will Feature Most Current Information on Security Standards, Technologies, and Products from Industry, Academic, and Government Experts. - Free Online Library: "-Dec. 11, 1995--The fifth annual 1996 RSA Data Security Conference promises to be one of the most important cryptography events of the year, as well as the largest RSA conference to date. The conference, which will be held January 17-19, 1996 at San Francisco's Fairmont Hotel, will feature the latest in data encryption technologies, products, market and regulatory issues, and will showcase the newest commercial applications of modern cryptographic technology with an emphasis on Public Key Cryptosystems. "



'via Blog this'

Google sells the future, powered by your personal data

criminals using ai - Google Search

Sunday, May 13, 2018

Facial recognition software helps diagnose rare genetic disease: Soon, physicians may be able to diagnose by snapping a photo -- ScienceDaily

Facial recognition software helps diagnose rare genetic disease: Soon, physicians may be able to diagnose by snapping a photo -- ScienceDaily: "Using facial analysis technology, the researchers compared a group of 156 Caucasians, Africans, Asians and Latin Americans with the disease to people without the disease. Based on 126 individual facial features, researchers made correct diagnoses for all ethnic groups 96.6 percent of the time."



'via Blog this'

Safety Freeze (Your Backup is Safety Frozen) – Help Desk

Safety Freeze (Your Backup is Safety Frozen) – Help Desk:

"1. Reboot your computer to make sure all Backblaze files are unlocked.

2. Uninstall Backblaze.
• Mac -- Hold down option and click on the Backblaze menu bar icon and choose Uninstall."



'via Blog this'

NIST adds privacy recommendations to its Risk Management Framework

Privacy and risk: https://www.scmagazine.com/nist-adds-privacy-recommendations-to-its-risk-management-framework/article/764855/

From Stephen's mobile: 1 (619) 203-8317
Warning: May contain autocorrec terrors.

SSP Foam Mat 1/4 thick by 48 wide w/PSA (per foot)-Super Soundproofing Store

SSP Foam Mat 1/4 thick by 48 wide w/PSA (per foot)-Super Soundproofing Store: "Super Soundproofing Foam Mat for noise control: A closed cell vinyl-nitrile noise control foam suitable as a sound barrier as well as a sound absorber. "



'via Blog this'

Coroplast 48 in. x 96 in. x 0.157 in. White Corrugated Plastic Sheet-CP4896S - The Home Depot

Coroplast 48 in. x 96 in. x 0.157 in. White Corrugated Plastic Sheet-CP4896S - The Home Depot: "Can be easily cut using standard utility knife for specific sizes"



'via Blog this'

Saturday, May 12, 2018

Best Soundproofing & Noise Control Materials - Super Soundproofing

Best Soundproofing & Noise Control Materials - Super Soundproofing: "At the Super Soundproofing™ Company, you can get the highest quality and most affordable soundproofing products like Noise Reduction, Acoustical Absorption and the Best Soundproofing Materials from our in-stock warehouse. "



'via Blog this'

12 Most Useful .htaccess Tricks for WordPress

12 Most Useful .htaccess Tricks for WordPress: "Having said that, let’s take a look at some useful .htaccess tricks for WordPress that you can try."



'via Blog this'

Redirect ALL files of a directory to a new destination (htaccess) - Server Config - The SitePoint Forums

Redirect ALL files of a directory to a new destination (htaccess) - Server Config - The SitePoint Forums

https://www.sitepoint.com/community/t/redirect-all-files-of-a-directory-to-a-new-destination-htaccess/2831

Yes, You Can Record Your Own Audiobook. Here's How. | Rob Dircks

Yes, You Can Record Your Own Audiobook. Here's How. | Rob Dircks

http://robdircks.com/yes-you-can-record-your-own-audiobook-heres-how/
"You keep more revenue. If your book is produced through ACX, you'll either share royalties with a narrator or pay a narrator upfront to perform your audiobook. When you narrate your own book, all of your audiobook's revenue goes to you."



'via Blog this'

(16) 5 Tips You Must Know When You Narrate An Audio Book | LinkedIn

(16) 5 Tips You Must Know When You Narrate An Audio Book | LinkedIn: "When we’re speaking at low volume, we automatically access our ‘chest voice’ – our resonant voice."



'via Blog this'

Iron overload disease causes rapid growth of potentially deadly bacteria, UCLA study finds | UCLA

Iron overload disease causes rapid growth of potentially deadly bacteria, UCLA study finds | UCLA

http://newsroom.ucla.edu/releases/iron-overload-disease-causes-rapid-growth-of-potentially-deadly-bacteria-ucla-study-finds

Vibrio vulnificus - an overview | ScienceDirect Topics

Vibrio vulnificus - an overview | ScienceDirect Topics

https://www.sciencedirect.com/topics/medicine-and-dentistry/vibrio-vulnificus

Wednesday, May 9, 2018

Book Review: Platform Capitalism by Nick Srnicek | LSE Review of Books

Book Review: Platform Capitalism by Nick Srnicek | LSE Review of Books: "In Platform Capitalism, Nick Srnicek examines the rise of platform-based businesses from the 1970s to the present and how these are transforming the workings of contemporary capitalism."



'via Blog this'

Wednesday, May 2, 2018

The Self-Driving Car Industry’s Biggest Turning Point Yet - The New York Times

The Self-Driving Car Industry’s Biggest Turning Point Yet - The New York Times: "Waymo says that by 2020 — that is, two years from now — its fleet of self-driving Jaguars will be doing as many as a million trips per day."



'via Blog this'

Uber’s Self-Driving Cars Were Struggling Before Arizona Crash - The New York Times

Uber’s Self-Driving Cars Were Struggling Before Arizona Crash - The New York Times: "Uber’s robotic vehicle project was not living up to expectations months before a self-driving car operated by the company struck and killed a woman in Tempe, Ariz."



'via Blog this'

Hackers exploit smart thermometer to steal casino information

Hackers exploit smart thermometer to steal casino information: ""They then found the high-roller database and then pulled that back across the network, out the thermostat, and up to the cloud.""



'via Blog this'

Downloads - My Visual Studio

Downloads - My Visual Studio: "Windows 10 (business editions), version 1803 (Updated March 2018)"



'via Blog this'

Cyber Threats to Industrial Control and Other Vertical-Industry Systems - Webcast - 2018-04-25 13:00:00 EDT

Cyber Threats to Industrial Control and Other Vertical-Industry Systems - Webcast - 2018-04-25 13:00:00 EDT: "In this Dark Reading webinar, top experts offer insight on the threat posed to industrial control systems (ICS) and other vertical-industry systems, and how you can expand your enterprise security strategies to protect them."



'via Blog this'

This Day in Labor History: January 4, 1977 - Lawyers, Guns & Money

This Day in Labor History: January 4, 1977 - Lawyers, Guns & Money: "As late as the mid-1970s, liberals believed another era of left-leaning government was around the corner. When Ted Kennedy fought to kill Richard Nixon’s milquetoast national health care plan, it was under the assumption that something much better would come soon. While the recession and oil shocks that began in 1973 put a damper on this, liberals did not believe the fundamental equation of American politics had changed. "



'via Blog this'

The Incredible Lost History of How “Civil Rights Plus Full Employment Equals Freedom”

The Incredible Lost History of How “Civil Rights Plus Full Employment Equals Freedom”: "Scott King went on to found the National Committee for Full Employment/Full Employment Action Council in 1974. And the NCFE/FEAC in turn helped create the political space for the high-water mark of the civil rights movement’s influence on economic policy: the Full Employment and Balanced Growth Act of 1978."



'via Blog this'

KnowBe4 Releases Q1 2018 Top-Clicked Phishing Report

KnowBe4 Releases Q1 2018 Top-Clicked Phishing Report:



The Top 10 Most-Clicked General Email Subject Lines Globally for Q1 2018 include:

 1. A Delivery Attempt Was Made – 21%

 2. Change of Password Required Immediately – 20%

 3. W-2 – 13%

Book and Journals Publishing

Book and Journals Publishing:

⦁ Build professional standing

⦁ Earn high royalties

Market Crashes: The Dotcom Crash

Market Crashes: The Dotcom Crash: "How Much: The Nasdaq Composite lost 78% of its value as it fell from 5046.86 to 1114.11. "



'via Blog this'

Old RSA and security notes

Try this:

https://books.google.com/books?id=Xmje7y-t104C&pg=PA74&lpg=PA74&dq=1996+rsa+data+security+conference+fairmont+hotel+san+francisco&source=bl&ots=Q0dGEyC8CM&sig=bvrzoIjSwCI6bjYYPEwH8x2ZFuM&hl=en&sa=X&ved=0ahUKEwi4vuOboM7aAhWurFkKHSaIC-IQ6AEIbTAF#v=onepage&q=1996%20rsa%20data%20security%20conference%20fairmont%20hotel%20san%20francisco&f=false