Friday, August 31, 2018

Securing Remote Desktop (RDP) for System Administrators | Information Security and Policy

Securing Remote Desktop (RDP) for System Administrators | Information Security and Policy: "By setting your computer to lock an account for a period of time after a number of incorrect guesses, you will help prevent hackers from using automated password guessing tools from gaining access to your system (this is known as a "brute-force" attack)."

Ex-hacker launches blockchain powered cyber security solution

Thursday, August 30, 2018

Vladimir Putin and Donald Trump's great success in exploiting the rise of nationalist Christianity

Vladimir Putin and Donald Trump's great success in exploiting the rise of nationalist Christianity

https://theconversation.com/amp/vladimir-putin-and-donald-trumps-great-success-in-exploiting-the-rise-of-nationalist-christianity-92963

Blog This! for Google Sites - Google Product Forums

Blog This! for Google Sites - Google Product Forums: "not only did it stop working but the Blog This! button mysteriously disappeared from my chrome browser."

Diplomacy in Cyberspace

Diplomacy in Cyberspace: "Because cyberspace threats are almost always international, as is the technology itself, an unprecedented level of international coordination, engagement and cooperation is required both to counter threats and to embrace and drive the economic and social opportunities that cyberspace offers."

Wednesday, August 29, 2018

Tuesday, August 28, 2018

When multi-factor will not save you by Michalis Kamprianis

When multi-factor will not save you by Michalis Kamprianis - password, passwords, course | Peerlyst: There is a lot of discussion lately about multi-factor authentication and how this will upgrade everyone’s security. Indeed, it is an improvement and it was about time we start becoming more conscious about the security issues related to authentication.

Wednesday, August 22, 2018

Monday, August 20, 2018

Digital shadows: dark market report

digital shadows: Read this report to learn why businesses and consumers are still at risk after Operation Bayonet:

Amazon’s facial recognition matched 28 members of Congress to criminal mugshots - The Verge

Amazon’s facial recognition matched 28 members of Congress to criminal mugshots - The Verge: The test also showed indications of racial bias, a long-standing problem for many facial recognition systems. 11 of the 28 false matches misidentified people of color (roughly 39 percent), including civil-rights leader Rep. John Lewis (D-GA) and five other members of the Congressional Black Caucus.

Predatory journals aren't just a scam: they're also how quacks and corporate shills sciencewash their bullshit / Boing Boing

Predatory journals aren't just a scam: they're also how quacks and corporate shills sciencewash their bullshit / Boing Boing: Inside the Fake Science Factory (German/English subtitles) documents Svea Eckert and team's years of investigation into predatory journals and the criminals behind them.

Bogus journals being used to publish fake science – Naked Security

Bogus journals being used to publish fake science – Naked Security: OMICS does not tell researchers that they must pay significant publishing fees until after it has accepted an article for publication, and often will not allow researchers to withdraw their articles from submission, thereby making the research ineligible for publication in another journal.

Tuesday, August 14, 2018

Tests | Music, Sound and Performance Lab

Tests | Music, Sound and Performance Lab: The first part is to characterise and compare two disorders of music and language (Congenital Amusia and Dyslexia)

The 16 best free GarageBand plugins | TechRadar

The 16 best free GarageBand plugins | TechRadar: Once in GarageBand, you can access your AU plugins by creating a software instrument track, then clicking on the "Edit" tab in the right-hand Track Info column (see left image).

Video: Fake Science (English subtitles) - Reportage & Documentation

Video: Fake Science (English subtitles) - Reportage & Documenntation:  It's a science scandal that affects us all - an academic illusory world: increasingly poor or even falsified studies are given the appearance of being scientific. This has dangerous consequences."

Most Common Cryptocurrency Scam Methods All Investors & Traders Should Know

Most Common Cryptocurrency Scam Methods All Investors & Traders Should Know: In this article we will be writing about the most common types of fraudulent activities that affected the community.

Monday, August 13, 2018

The unsung story of amusia – The Brain Bank North West

The unsung story of amusia – The Brain Bank North West: More colloquially called “tone deafness”, approximately 4% of the population suffer from amusia.

Tone Deafness: A Broken Brain? - The Atlantic

Tone Deafness: A Broken Brain? - The Atlantic: It's been difficult for researchers to get over the idea that, with enough exposure to music, people born with amusia might somehow learn to listen. But even as music has become even more pervasive (think iPods), the condition persists.

Defending Science - Dr Nick - The Incrementalist

Defending Science - Dr Nick - The Incrementalist: The harm from these publications extends far beyond the individual papers and authors financial loss for the cost of publishing and attendance.

The Genetics of Congenital Amusia (Tone Deafness): A Family-Aggregation Study

The Genetics of Congenital Amusia (Tone Deafness): A Family-Aggregation Study: Congenital amusia (commonly known as “tone deafness”) is a lifelong impairment of music perception that affects 4% of the population.

Wednesday, August 8, 2018

Endpoint security suites must have these features | CSO Online

Endpoint security suites must have these features | CSO Online: "New endpoint security technologies tended to come in one of two areas. Advanced prevention tools added new techniques for detecting malware that bypassed AV signatures. Many of these tools also contained anti-exploit technologies for detecting and blocking common memory exploits and/or attacks against common applications like browsers."

Fighting ransomware with network segmentation as a path to resiliency - Help Net Security

Fighting ransomware with network segmentation as a path to resiliency - Help Net Security: Organization can achieve network resiliency and survivability through a strategy embracing network segmentation in general, and micro-segmentation in particular.

Tuesday, August 7, 2018

Monday, August 6, 2018

Sunday, August 5, 2018

Top 5 - Most Affordable - Portland Suburbs : Real Estate Agent PDX

Top 5 - Most Affordable - Portland Suburbs : Real Estate Agent PDX: If you don’t mind a bit of airplane traffic noise and want to be reasonably close to the heart of Portland, check out the neighborhoods east of 205 in Northeast Portland. Parkrose, Argay, Parkrose Heights, and Russel all have median home values similar to the more far-flung suburbs mentioned here.

iPhone supplier TSMC shut down factories after virus attack - The Verge

Wednesday, August 1, 2018

OP0182 Gout and dementia in the elderly: a medicare claims study | Annals of the Rheumatic Diseases

OP0182 Gout and dementia in the elderly: a medicare claims study | Annals of the Rheumatic Diseases: a large French population-based study in the elderly (65 years or older) showed that hyperuricemia was associated with a higher risk of dementia and with MRI changes of ageing in the brain