Friday, December 30, 2011

Rivets are bayonets - Drive them home!

Rivets are bayonets - Drive them home!

The amazing poster colletion at the Library of Congress.

Featured Articles: The Rustock takedown

Featured Articles

"The Rustock takedown was the second major botnet takedown Microsoft has spearheaded within the last two years. In 2010, Microsoft asked for and received a court order that shut down a number of malicious domains used by the Waledac botnet. (See the Security Intelligence Report website for more information.) As part of that effort, Microsoft filed a John Doe lawsuit against the anonymous operators of the Rustock botnet, based in part on the abuse of Microsoft trademarks in the bot’s spam."

UNODC crime and criminal justice statistics

UNODC crime and criminal justice statistics

Cross-national UNODC crime statistics for over 120 countries are available on this page covering the period 2003 to 2008. Statistics on police-recorded offences and identified victims are available by crime type. Statistics on the response of the criminal justice system are divided according to police, prosecution, court and prison statistics.

Thursday, December 29, 2011

UNODC Resources: data and analysis

Resources: data and analysis:

One of the key tasks of UNODC is to produce and disseminate accurate drugs and crime statistics at the international level.

E-ZPass New York - Close Account Form

E-ZPass New York - Close Account Form

In order to process your request to close your account, please complete, sign and return this form along with the tag(s) to the address below or at one of our Walk-In Customer Service Centers:

Verizon to Charge Customers $2 Fee When Paying Bills Online

Verizon to Charge Customers $2 Fee When Paying Bills Online or Over the Phone Starting January 15 – Droid Life

Time to set up “auto pay” through your Verizon Wireless account. According to our sources, Big Red will start charging you a $2 fee both over the phone and online for your monthly bill transaction unless you have your account set up to pay automatically.

Information Warfare, 1995

Information Warfare

The National Computer Security Association sponsors an annual International Conference on Information Warfare.

Wednesday, December 28, 2011

Recent Links on Varied Topics

Samsung 4G LTE Mobile Hotspot

It's small and portable and it fits easily in a purse, pocket, or briefcase. No more lugging a brick-sized gizmo around to stay connected. Because of how little it weighs, convenience and portability are greatly enhanced.

Macrium Reflect FREE Edition - Information and download

One to try?

iTunes - Podcasts - DEFCON 3 [Audio] Speeches from the Hacker Convention. by The Dark Tangent

DEFCON 3 was held August 4-6th 1995 at the Tropicana in Las Vegas. Past speeches and talks from DEF CON hacking conferences in an iTunes friendly m4b format.

How do I transfer Palm contacts to Address Book?

First off, launch your Palm desktop application, then from the File menu choose Export. You'll get a window that looks like this:

About Us | Steven K Carpentry

Carpentry & Handyman Services to businesses and residences in San Diego county. If you’re looking for an experienced carpenter then look no further.

Saturday, December 24, 2011

ECOR® | Innovative Nature-Engineered™ Products

ECOR® | Innovative Nature-Engineered™ Products:

"Ecor® | The Shape of Green to Come ™
Ecor® is an innovative environmental core technology offering an extensive new generation of highly versatile, strong, lightweight, three-dimensional engineered molded fiber (3dEMF) panel products manufactured from an almost unlimited variety of readily-available, low-cost and underutilized raw material sources."

'via Blog this'

Corrugated Packing Material | honeycomb board | corrugated sheet | coroplast

Corrugated Packing Material | honeycomb board

"Honeycomb board is a lightweight, tough and durable packing material consisting of a honeycomb core sandwiched between kraft linerboard. Amazingly light and incredibly strong, honeycomb board is an excellent alternative to cardboard."

'via Blog this'

What is BlogThis! ? - Blogger Help

What is BlogThis! ? - Blogger Help

"BlogThis! is an easy way to make a blog post without visiting blogger.com. Once you add the BlogThis! link to your browser's toolbar, blogging will be a snap."

'via Blog this'

Save On Discount Utrecht Honeycomb Board 42x30x1/2 - 10pk & More Corrugated Cardboard at Utrecht

Honeycomb Board 42x30x1/2 - 10pk & More Corrugated Cardboard at Utrecht:

Honeycomb board is a sheet material in which the medium is made from a paperboard honeycomb. The medium is sandwiched between paperboard liners. Compared to both cardboard and foam core, it has good structural characteristics.

asada's memorandum (The Day I Saw Van Gogh's Genius in a New Light)

asada's memorandum (The Day I Saw Van Gogh's Genius in a New Light)

The event’s main objective was to educate the public about the diversity of color vision which exists in our society.

Wednesday, December 21, 2011

Researchers demo cloud security issue with Amazon AWS hijacking attack

Researchers demo cloud security issue with Amazon AWS hijacking attack

Researchers from the Horst Goertz Institute (HGI) of the Ruhr-University Bochum (RUB) in Germany have demonstrated an account hijacking attack against Amazon Web Services (AWS) that they believe affects other cloud computing products as well.

The attack uses a technique, known at XML signature wrapping or XML rewriting, that has been known since 2005 and exploits a weakness in the way Web services validate signed requests.

The 6 Stages of Exposing Yourself with Content Marketing | Content Marketing

The 6 Stages of Exposing Yourself with Content Marketing | Content Marketing | Social Media Consulting - Convince & Convert:

To study the relative merits of content creation and dissemination, we declared there to be 6 stages on the content marketing continuum (6 stages of opening the kimono in the parlance of the presentation).

Taking Down the Giant: Be the Thought Leader Your Customers Are Looking For

Taking Down the Giant: Be the Thought Leader Your Customers Are Looking For

Write about the ecosystem that your solution resides in. Offer help to the person that’s buying your solution with tips, tricks, and how-to articles. Identify, contact, and build relationships with the influencers (authors, bloggers, analysts, etc.) in your industry.

How do you define good content? | OpenView Blog

How do you define good content? | OpenView Blog

1. Substance – First and foremost, the content items you post need to be substantive enough to make it worth the reader’s time. Keep in mind that “substantive” doesn’t necessarily mean “long”; in fact some articles might even be too long for online publication. It means that the content you’re creating adds standalone value to the page. In other words, people can read this one page and get something out of it.

Content Marketing Tips and Resources

Content Marketing Tips and Resources

Have a minute? Check out this series of short video primers with content marketing expert Joe Pulizzi.

What Does Your Content Marketing Strategy Say About YOU? | OpenView Labs

What Does Your Content Marketing Strategy Say About YOU? | OpenView Labs

Baer shares his six stages of the content marketing continuum, offering real world examples of these content marketing strategies in action.

7 Basic Content Marketing Principles for the Corporate Marketer | Content Marketing Institute

Basic Content Marketing Principles for the Corporate Marketer | Content Marketing Institute:

Yes, every business wants to boost sales and build brand awareness; but the truth of the matter is that to reach those goals you must first succeed in building an online conversation around the content objects you produce.

Monday, December 19, 2011

Malware developer AMA : IAmA

IAmA Malware developer AMA : IAmA

I develop malware for profit, ask me anything. I'm not giving any background, I'll let the answers do the talking.

Sunday, December 18, 2011

Norton Study Calculates Cost of Global Cybercrime: $114 Billion Annually

Norton Study Calculates Cost of Global Cybercrime: $114 Billion Annually

Sept. 7, 2011 – Symantec Corp. (Nasdaq: SYMC) For the first time a Norton study calculates the cost of global cybercrime: $114 billion annually1. Based on the value victims surveyed placed on time lost due to their cybercrime experiences, an additional $274 billion was lost2. With 431 million adult victims globally in the past year and at an annual price of $388 billion globally based on financial losses and time lost, cybercrime costs the world significantly more than the global black market in marijuana, cocaine and heroin combined ($288 billion).

Cybercrime: A Shocking Picture of the Problem - Norton Community

Cybercrime: A Shocking Picture of the Problem - Norton Community

"Cybercrime costs $388 billion dollars in annual losses globally and it affected almost 7 in 10 adults last year.

"Norton Cybercrime Report 2011, a study on the impact of cybercrime that included a survey of over 12,000 adults in 24 countries. This provides an important and accurate picture of the scope of cybercrime globally and the results are shocking! Every day of the past year, over 1 million online adults in 24 countries experienced cybercrime. This can also be broken down to 50,000 victims per hour, 820 victims per minute, or 14 victims every second. In just the last 12 months 44% of people have been a victim of cybercrime while only 15% have been a victim of physical crime in the same period. "

Credit Card Fraud: How Big Is The Problem? | Practical eCommerce

Credit Card Fraud: How Big Is The Problem? | Practical eCommerce

Across the board, the cost of managing fraud exceeds the cost of fraud itself by as much as 300 percent, according to preCharge's report.

Public records shed light on American Express plans

Public records shed light on American Express plans in Whitsett data, center, building - Burlington Times News

In the year since American Express decided to build a massive data center in eastern Guilford County, much has happened, but most of it didn't make headlines.

Saturday, December 17, 2011

Thursday, December 15, 2011

Why Privacy Matters Even if You Have 'Nothing to Hide' - The Chronicle Review - The Chronicle of Higher Education

Why Privacy Matters Even if You Have 'Nothing to Hide' - The Chronicle Review - The Chronicle of Higher Education

One of the characters in Henry James's 1888 novel, The Reverberator, muses: "If these people had done bad things they ought to be ashamed of themselves and he couldn't pity them, and if they hadn't done them there was no need of making such a rumpus about other people knowing."

Wednesday, December 14, 2011

Report on UK cybercrime statistics reveals culprits and responders

Report on UK cybercrime statistics reveals culprits and responders

While most agreed that cybercrime awareness was important in beating cybercrime, 45% of respondents said they had no cybersecurity-related training in the last year. Only 24% of UK respondents received face-to-face training, which most people agreed was the most effective.

London Conference on Cyberspace - The Nation

London Conference on Cyberspace - The Nation

The London Conference on Cyberspace (1-2 November 2011) We are writing to inform you that the Foreign Secretary will be chairing the London Conference on Cyberspace from 1 - 2 November this year.

London Conference on Cyberspace: Chair's statement

London Conference on Cyberspace: Chair's statement

Quoting the UK Foreign Secretary William Hague: "Earlier this year I proposed the following principles for governing behaviour in cyberspace, and called for a more focussed and inclusive dialogue between all those with a stake in the Internet – civil society and industry as well as governments - on how we might implement them..."

  1. The need for governments to act proportionately in cyberspace and in accordance with national and international law;
  2. The need for everyone to have the ability – in terms of skills, technology, confidence and opportunity – to access cyberspace;
  3. The need for users of cyberspace to show tolerance and respect for diversity of language, culture and ideas;
  4. Ensuring that cyberspace remains open to innovation and the free flow of ideas, information and expression;
  5. The need to respect individual rights of privacy and to provide proper protection to intellectual property;
  6. The need for us all to work collectively to tackle the threat from criminals acting online; and
  7. The promotion of a competitive environment which ensures a fair return on investment in network, services and content.

Erase All Data Before Selling Your iPhone

Erase All Data Before Selling Your iPhone

With the arrival of iPhone 4, you may consider selling your existing iPhone and upgrade to the new one. Whether you plan to sell your old iPhone on eBay or through a store, make sure you completely erase all data on your device.

Tuesday, December 13, 2011

Russia: Election Day DDoS-alypse

Russia: Election Day DDoS-alypse Global Voice:

Global Voices is an international community of bloggers who report on blogs and citizen media from around the world.

Friday, December 9, 2011

Thursday, December 8, 2011

History of Ultimate bet - How Ultimatebet.com Started - UB History |

History of Ultimate bet - How Ultimatebet.com Started - UB History |: Ultimate Bet is an online poker room that runs off the Cereus Poker Network, along with its sister site, Absolute poker (AP).

The Once and Future War | World Policy Institute

The Once and Future War | World Policy Institute: There’s no one better qualified to explore the innovations of war on and off the battlefield. From the British Defense Ministry in Whitehall, General Shaw spoke with World Policy Journal editor David A. Andelman and outgoing managing editor Justin Vogt.

Cybercriminals offer complex infection services

Cybercriminals offer complex infection services: Services for fraudsters utilizing malware are not new – AV checkers, malware encryption and malware infection services have existed in the criminal underground market for several years.

However, recent research has indicated changes in service scope and price due to service convergence and demanding buyers.

Report Details China's Electronic Espionage Apparatus

Report Details China's Electronic Espionage Apparatus: A report which details China's electronic espionage and intelligence apparatus has been released by researchers at the Project 2049 Institute.

The report, titled "The Chinese People's Liberation Army Signal Intelligence and Cyber Reconnaissance Infrastructure",

Brazilian Banking Trojan Poses as Microsoft Anti-Malware Tool | Malware & Computer Viruses | Anti-Virus Software & Web Browser Security | SecurityNewsDaily

Brazilian Banking Trojan Poses as Microsoft Anti-Malware

The Trojan affects "ntldr," the default boot loader on Windows machines, explained Kaspersky Lab expert Fabio Assolini. Identified as Trojan-Downloader.Win32.VB.aoff, the Trojan originated in Brazil, and spreads as a link attached to emails.

Wednesday, December 7, 2011

InterfaceLIFT: Icons sorted by Date

InterfaceLIFT: Icons sorted by Date

There are 1080 desktop icon sets listed below, sorted by the date they were posted to the site, beginning with the most recent content. You are on page 4 of 108.

SuperDuper!

SuperDuper!

SuperDuper is the wildly acclaimed program that makes recovery painless, because it makes creating a fully bootable backup painless. Its incredibly clear, friendly interface is understandable, easy to use...

True!

How do you upgrade the hard drive in the "Mid-2009," "Mid-2010" "Early 2011," and "Late 2011" 13-Inch, 15-Inch, and 17-Inch MacBook Pro models? What type of hard drive do these models support? Can one replace the hard drive with an SSD? @ EveryMac.com

Good video instructions

How do you upgrade the hard drive in the "Mid-2009," "Mid-2010" "Early 2011," and "Late 2011"Pro models?

...the basic procedure is to turn off the notebook, disconnect cables, and let it cool; flip it over and unscrew the bottom plate, discharge static electricity, unscrew the retaining bar, disconnect the SATA connector, remove the mounting screws, install the new drive, and reassemble the computer.

Saturday, December 3, 2011

Hotel Esprit Bratislava : Welcome

Hotel Esprit Bratislava Map

This ancient city with over two millennia of history is one of the youngest capitals in Europe. Since 1919 Bratislava has been the capital of the Slovak Republic and it is currently regarded as one of the fastest developing cities in Europe. Bratislava represents an important centre of trade, culture and art and its huge potential is chiefly in its excellent transport connections with Vienna, Prague and Budapest.


View Larger Map

Hotel Esprit Bratislava : Welcome

Hotel Esprit Bratislava

Welcome to the new design hotel, Hotel Esprit, which creates a unique atmosphere for you thanks to its stylish interior and carefully selected decor. The hotel is situated in the immediate vicinity of Incheba exhibition centre, the historic city centre and Bratislava Castle.

Budget Light-weight Pulpboard Coasters

Budget Light-weight Pulpboard Coasters

Promote your message while your guests enjoy their beverage with Customized Pulpboard Coasters. Promotional Round Coasters keep your brand or message in plain sight in bars, restaurants, nightclubs, and at private or corporate events.

Friday, December 2, 2011

Lawmaker calls for FTC probe into Carrier IQ | Reuters

Lawmaker calls for FTC probe into Carrier IQ | Reuters: U.S. Representative Edward Markey on Friday asked the Federal Trade Commission to investigate whether software maker Carrier IQ violated millions of mobile phone users' privacy rights.

Thursday, December 1, 2011

Wednesday, November 30, 2011

BUSTED! Secret app on millions of phones logs key taps • The Register

BUSTED! Secret app on millions of phones logs key taps • The Register:

An Android app developer has published what he says is conclusive proof that millions of smartphones are secretly monitoring the key presses, geographic locations, and received messages of its users.

Tuesday, November 29, 2011

Feds Seize 150 Websites In Counterfeit Crackdown : NPR

Feds Seize 150 Websites In Counterfeit Crackdown : NPR: Federal authorities announced Monday that they have seized the domain names of 150 websites accused of selling counterfeit or pirated merchandise. Agents from the Department of Homeland Security and the FBI coordinated the effort for "Cyber Monday," the day that for many shoppers kicks off the online holiday shopping season. Undercover agents had been buying merchandise from the websites for three months. Then they contacted big companies to make sure the items were phony before taking over the domain names.

Monday, November 28, 2011

HP EliteBook 8760w Mobile Workstation Configure your model - HP Small & Medium Business products

HP EliteBook 8760w Mobile Workstation Configure your model - HP Small & Medium Business products

HP EliteBook 8760w Mobile Workstation - configure your model

MRP40 Morse Decoder by dxzone.com

>MRP40 is a powerful and highly-effective ham radio software program that decodes received CW audio that has been fed to a computer’s sound card. The decoded text is displayed on the computer’s monitor.

MRP40 Morse Decoder by dxzone.com

Amazon.com: Solid Thermal Insulated Blackout Curtain 84"L- 1 Set-BLACK: Home & Garden

Amazon.com: Solid Thermal Insulated Blackout Curtain 84"L- 1 Set-BLACK: Home & Garden

Best Home Fashion introduces the new Blackout Curtain. It features innovative fabric construction. Compare to the other curtains, our product is extremely SOFT and DRAPERY. The sophisticated designs allow you to decorate your windows with great styles. NEVER compare our Blackout Curtains with those cheap ones that are stiff and looks like a shower curtain.

Sunday, November 27, 2011

Customize 13.3" Laptop | VAIO S Series Configure-to-Order | VPCSA390X CTO | Sony USA

Customize 13.3" Laptop | VAIO S Series Configure-to-Order | VPCSA390X CTO | Sony USA:

Intel Core™ i7-2640M processor (2.80GHz / 3.50GHz with Turbo Boost)

The Regex Coach - interactive regular expressions

The Regex Coach - interactive regular expressions

The Regex Coach is a graphical application for Windows which can be used to experiment with (Perl-compatible) regular expressions interactively. It has the following features:

How to use Migration Assistant to transfer files from another Mac

How to use Migration Assistant to transfer files from another Mac

You can use Migration Assistant to transfer important information, such as user accounts, applications, network and computer settings, and files, from one Mac computer to another via a FireWire cable or over a wired or wireless network.

How to Transfer Mac OS X Application Data between Computers - Professional PHP

How to Transfer Mac OS X Application Data between Computers - Professional PHP

You can open the Keychain Access application to view and manage your passwords. Each User’s keychain is stored in their ~/Library/Keychains directory. (The ~ means this directory is a subdirectory of your user home directory.)

Fix Fan Noise & Overheating After Upgrading to Mac OS X 10.7 Lion with SMC Reset

Fix Fan Noise & Overheating After Upgrading to Mac OS X 10.7 Lion with SMC Reset

To give further backing to the solution, Apple’s support doc lists the following as the first reason to reset the SMC: “The computer’s fans run at high speed although the computer is not experiencing heavy usage and is properly ventilated.

Friday, November 25, 2011

HP Z600 Workstation for $5,099

HP Z600 Workstation - HP Z600 Workstation for $5,099

The HP Z600 is engineered to optimize the way processor, memory, graphics, OS, and software technology work together to deliver massive, whole-system computational power.

Tuesday, November 22, 2011

Paper Bin & Parts Boxes

Paper Bin & Parts Boxes

Length is the widest dimension of the opening into the box. Width is the smallest dimension of the opening into the box. Depth is the distance into the box from the opening to the bottom of the box.

Moving Services from ABF U-Pack Moving

Moving Services from ABF U-Pack Moving

U-Pack ReloCubes are ground-level and big enough for a room's worth of furnishings. The ideal moving option for apartment and college moves.

Monday, November 21, 2011

SOPA goes for House debate Dec. 15 - Post Tech - The Washington Post

SOPA goes for House debate Dec. 15 - Post Tech - The Washington Post:

Rep. Lamar Smith’s (R-Tex.) Stop Online Piracy Act, a legislation that has pitted media companies against high-tech firms such as Google and Facebook:

"Legitimate websites have nothing to worry about under this bill.”

Except maybe blogs and search sites that innocently link to sites that are not innocent.

Saturday, November 19, 2011

2011/Support/en - Wikimedia Foundation

Spread the word and show the world that you support Wikipedia

2011/Support/en - Wikimedia Foundation

(And make that chap's face go away.)

SOPA: 9 Tech Companies That Support The 'Stop Online Piracy Act'

SOPA: 9 Tech Companies That Support The 'Stop Online Piracy Act'

In a speech to the Hollywood Chamber of Commerce, former Senator and MPAA President Chris Dodd chastised tech companies who oppose SOPA saying, "There are those in the tech industry who hold the mistaken belief that there is nothing wrong with providing links to stolen content[...] I wonder if they would feel the same if their patents were stolen and used by others for profit?"

Come on Mr. Dodd, this does not even make sense. Name someone who thinks it is okay to provide links to stolen content. And tech companies take legal action against infringers all the time, using the legal system, not by nuking the national and global infrastructure.

Friday, November 18, 2011

EU Adopts Resolution Against US Domain Seizures

EU Adopts Resolution Against US Domain Seizures

The European Parliament has adopted a resolution which criticizes domain name seizures of “infringing” websites by US authorities. According to the resolution these measures need to be countered as they endanger “the integrity of the global internet and freedom of communication.” With this stance the European Parliament joins an ever-growing list of opposition to the Stop Online Piracy Act .

Wednesday, November 16, 2011

Sharp Rees-Stealy Medical Group - Home

Sharp Rees-Stealy Medical Group

Sharp Rees Stealy! We are pleased to welcome you to our office. If you're looking for quality care with a personal touch, we hope you'll give us a call. We look forward to the opportunity of serving your family's optometric needs.We are conveniently located nearby and would be delighted to have you as a patient.

Hillcrest Optical

About Us: Hillcrest Optical, originally San Diego Optical established in 1948 at 420 Thorn Street has a rich and diverse history.

Saturday, November 12, 2011

In which I fall truly, madly, dIkea’s Dignitet curtain hanging system

In which I fall truly, madly, deeply in love with Ikea’s Dignitet curtain hanging system:

The thing is, all the Ikea rods except one kind of ugly one stop at 79 inches, and the bedroom windows in the Schoolhouse are 101 inches wide. I bought the Dignitet system as a default solution – but I have ended up thinking it is the best thing since sliced bread.

Friday, November 11, 2011

Gary Fisher Simple City 3 - Trek Bicycle Superstore

Gary Fisher Simple City 3 - Trek Bicycle Superstore

Fisher's Simple City 3 is the perfect answer to high gas prices and headache-inducing traffic. It sports a sweet-riding butted-aluminum frame with a quick-shifting 3-speed drivetrain that's great for commuting, city biking and bike paths

Cybercrime Corner - SC Magazine US

Cybercrime Corner - SC Magazine US:

Stephen Cobb has been a CISSP since 1996 and has helped companies large and small to manage their information security, with a focus on emerging threats and data privacy issues.

Have You Checked Your DNS Settings? - ReadWriteCloud

Have You Checked Your DNS Settings? - ReadWriteCloud:

Now might be time to use a DNS provider such as OpenDNS.org, that can provide more security and higher performance of this critical function

Tuesday, November 8, 2011

Wachovia employee busted for attempted half million dollar embezzlement - Media Town Talk - Delco News Network

Wachovia employee busted for attempted half million dollar embezzlement - Media Town Talk - Delco News Network

Delaware County Criminal Investigation Detectives arrested Librado S. Wright for attempting to embezzle over half a million dollars from Wachovia Bank, now owned and operated by Wells Fargo.

BBC News - Smartphone scams: Owners warned over malware apps

BBC News - Smartphone scams: Owners warned over malware apps:

Get Safe Online, a joint initiative between the government, police and industry, said it was concerned that users of smartphones, such as Android devices, were not taking steps to protect their devices

Friday, November 4, 2011

FBI — Cyber Crimes

FBI — Cyber Crimes:

Bobnev was indicted for his alleged participation in a money laundering scheme involving unauthorized access to the accounts of a major provider of investment services. Bobnev allegedly accessed compromised accounts and wire transferred funds out of these accounts to money mules in the United States.

cybercrime.gov

Some fascinating reading at cybercrime.gov:

Former Citadel Employee Arrested for Theft of Financial Firm's Trade Secrets: Hard drives recovered from canal allegedly contained effort to construct currency futures trading platform based on Citadel's proprietary model (October 13, 2011)

Thursday, November 3, 2011

The Socialbot Network: When Bots Socialize for Fame and Money

LERSSE Digital Library: Record#264: The Socialbot Network: When Bots Socialize for Fame and Mone

We adopt a traditional web-based botnet design and built a Socialbot Network (SbN): a group of adaptive socialbots that are orchestrated in a command-and-control fashion.

Kelihos, Waledac and Storm malware believed to have same author

Kelihos, Waledac and Storm malware believed to have same author:

Pierre-Marc Bureau, senior malware researcher at antivirus company ESET, posits that its author is the same person (or group of people) who has developed the Storm worm and the Waledac malware.

How Not to Get Hooked by a ‘Phishing’ Scam

How Not to Get Hooked by a ‘Phishing’ Scam:

If you get an email or pop-up message that asks for personal or financial information, do not reply. And don’t click on the link in the message, either. Legitimate companies don’t ask for this information via email

APWG Consumer Advice

APWG Consumer Advice:

as a general rule you should be careful about giving out your personal financial information over the Internet. The Anti-Phishing Working Group has compiled a list of recommendations below that you can use to avoid becoming a victim of these scams.

National Retail Federation - Holiday Shopping Tips

National Retail Federation - Holiday Shopping Tips:

Fail to prepare = prepare to fail! Make your Black Friday shopping trip as successful (and enjoyable!) as possible by following these tips from the National Retail Federation

Idiot's Guide to Bitcoin [WIP]

Idiot's Guide to Bitcoin [WIP]:

"I wrote this after trying to explain Bitcoin to my mom. Brackets indicate a link to be added later. Suggestions welcome."

Hmmm, don't think my Mum would get that. I don't get it. I have yet to read a clear statement of what bitcoin is.

BitcoinTraining.com

bitcoin BitcoinTraining.com:

First Bitcoin ATM debuted in San Diego

Wednesday, November 2, 2011

Researchers Flood Facebook With Bots, Collect 250GB Of User Data | TechCrunch

Researchers Flood Facebook With Bots, Collect 250GB Of User Data | TechCrunch:

In an experiment that reveals as much about the people on Facebook as it does about Facebook itself, researchers from the University of British Columbia Vancouver infiltrated the social network with bots and made off with information from thousands of users.

TechCrunch: Agari Email Security

TechCrunch: Agari’s technology, which was developed by former IronPort/Cisco employees, assesses, visualizes, and protects against email threats to brands, such as phishing and other fraud.

America's Cup | America’s Cup World Series shifts focus to San Diego

America's Cup | America’s Cup World Series shifts focus to San Diego:

With the second stop for the America’s Cup World Series in Plymouth reaching a thrilling conclusion on Sunday, with ORACLE Racing Spithill’s Fleet Racing Championship win punctuated by capsizes and collisions, attention now shifts to the next event in San Diego, November 12-20.

Pack-up started in the Race Village on Sunday night and continues throughout the week, with the cargo ship HR Constitution being loaded with the lifeblood of the America’s Cup World Series, including the AC45 race boats, 102 shipping containers, 20 support boats, and one of the cranes used to hoist the AC45s into the water. The ship is scheduled to depart Plymouth Sound on Sunday and to arrive in San Diego by October 24, approximately three weeks ahead of the first race day.

HR CONSTITUTION - Vessel's Details and Current Position - 9273791 - 305429000

HR CONSTITUTION - Vessel's Details and Current Position - 9273791 - 305429000:

HR CONSTITUTION
Contribute to this page
Vessel's Details
Ship Type: Cargo
Year Built: 2006

Global Security Survey: Security Budgets Increasing, But Strategy Lacking | SecurityWeek.Com

Global Security Survey: Security Budgets Increasing, But Strategy Lacking | SecurityWeek.Com: While it’s good news that 59 percent of respondents plan to increase their information security budgets in the coming 12 months, only 51 percent of respondents said they have a documented information security strategy in place. Additionally, 35 percent of respondents said security budgets would remain the same over the next year, and 6 percent said information security budgets would decrease.

Sail-World.com : America's Cup: Oracle Racing News - Edition 32

Sail-World.com : America's Cup: Oracle Racing News - Edition 32: 'Day 2 of unloading the America’s Cup freighter in San Diego'

Construction on village for next leg of America’s Cup World Series begins in San Diego: Sailing News | bettor.com

Construction on village for next leg of America’s Cup World Series begins in San Diego: Sailing News | bettor.com: Ansell believes that everything will be ready on time for them to start sailing in the event. They will receive team’s shore crews on November 1, and will do the next stage of the preparation. Ansell also said that each team is responsible to build their bases and they will be ready to set sail on San Diego waters on November 8, to get some practice before the first day of the event on November 12.

Foreign Secretary opens the London Conference on Cyberspace

Foreign Secretary opens the London Conference on Cyberspace:

The 7 principles proposed are:

The need for governments to act proportionately in cyberspace and in accordance with international law;
The need for everyone to have the ability to access cyberspace, including the skills, technology, confidence and opportunity to do so;
The need for users of cyberspace to show tolerance and respect for diversity of language, culture and ideas;
Ensuring that cyberspace remains open to innovation and the free flow of ideas, information and expression;
The need to respect individual rights of privacy and to provide proper protection to intellectual property;
The need for us all to work together collectively to tackle the threat from criminals acting online;
And the promotion of a competitive environment which ensures a fair return on investment in networks, services and content.

Hague suggested these principles as a starting point in efforts to reach a broad agreement about behaviour in cyberspace.

Chemicals and defence firms targeted by hacking attack

BBC News - Chemicals and defence firms targeted by hacking attack:

"This is unfortunately becoming a new normal behaviour," Symantec's chief technology officer, Greg Day, told the BBC.

"We had at least a decade of cybercrime which generally targeted anybody. Then we had the emergence of very skilled techniques involving a lot of time and effort to target global organisations."

London hosts cyberspace security conference

As many as 5% of PCs are infected with malware - short for malicious software - Prof Anderson said, and there was a one in 20 risk that any given computer was sending spam without the owner's knowledge.

"If you want to defend against this kind of threat it's not enough to just shoot a few crocodiles, you have to drain the swamp," Prof Anderson told BBC Radio 4's Today programme.

BBC News - London hosts cyberspace security conference

Tuesday, November 1, 2011

Study Reveals 75 Percent of Individuals Use Same Password for Social Networking and Email

According to a week-long study conducted by Internet security company BitDefender, over 250,000 user names, email addresses, and passwords used for social networking sites can easily be found online.

Study Reveals 75 Percent of Individuals Use Same Password for Social Networking and Email | SecurityWeek.Com:

The study also revealed that 75 percent of social networking username and password samples collected online were identical to those used for email accounts.

Poor Password Security Poses Big IT Problem

Poor Password Security Poses Big IT Problem

A fundamental lack of IT security awareness – particularly in the area of password control and privileged logins – is potentially paving the way for more waves of data breaches, new research reveals.

from | IT Password Management | Password Management Tools | Business News Daily

Site Identity Button | How to | Firefox Help

Site Identity Button | How to | Firefox Help

The Site Identity Button is a Firefox security feature that gives you more information about the sites you visit.

Firefox & You: Security

Firefox & You:

Luckily, Firefox knows what's hiding under the bed, so it has plenty of built-in features to put online monsters in their place. That's a big reason for our accelerated release process, too.

Survey Reveals How Stupid People are With Their Passwords | SecurityWeek.Com

Survey Reveals How Stupid People are With Their Passwords | SecurityWeek.Com

Don't think this is a helpful attitude in cybersecurity awareness:

"It never fails to amaze me when I read studies about how careless and stupid people are with regards to their online security"

Cyber-attacks on UK at disturbing levels, warns GCHQ chief | Technology | guardian.co.uk

Cyber-attacks on UK at disturbing levels, warns GCHQ chief | Technology | guardian.co.uk

'Exponential rise' in attacks on departments, industry and public reveal global cybercrime marketplace, says intelligence director

International Conference on Cyber Security

International Conference on Cyber Security

ICCS 2012 is an event consisting of four days, over 50 unique lectures from keynote, distinguished, plenary and parallel speakers in the disciplines of Emerging Technologies, Operations and Enforcement, and Real Life Experiences.

Facebook passwords are not case sensitive

Facebook passwords are not case sensitive (update) | ZDNet:

Facebook actually accepts three forms of your password:
  • Your original password.
  • Your original password with the first letter capitalized. This is only for mobile devices, which sometimes capitalize the first character of a word.
  • Your original password with the case reversed, for those with a caps lock key on.

Conference on Cyberspace

Conference on Cyberspace:

The London Conference will launch a focused and inclusive dialogue to help guide the behaviour of all in cyberspa

Cyber-attacks on UK at disturbing levels, warns GCHQ chief | Technology | guardian.co.uk

Cyber-attacks on UK at disturbing levels, warns GCHQ chief | Technology

'Exponential rise' in attacks on departments, industry and public reveal global cybercrime marketplace, says intelligence director

Monday, October 31, 2011

Internet Access - Households and Individuals, 2011

Internet Access - Households and Individuals, 2011:

21 per cent of Internet users did not believe their skills were sufficient to protect their personal data

77 per cent of households had Internet access

Sony’s Weakest Link Hijack | OpenID

Sony’s Weakest Link Hijack | OpenID

Sony announced today that a large number of accounts were hijacked using an attack based on the fact that people reuse passwords across websites. These “weakest link hijackings” are an evolution of the phishing attacks that have become so well known over the last few years.

Cyber Experts Point to Computer Passwords as Weakest Link in Cyber Defences by Contingency Today

Cyber Experts Point to Computer Passwords as Weakest Link in Cyber Defences by Contingency Today

Interesting stuff. From straight password guessing to password reset hacks.

Sunday, October 30, 2011

FTC Gives Final Approval to Settlement with Google over Buzz Rollout

FTC Gives Final Approval to Settlement with Google over Buzz Rollout

The settlement bars the company from future privacy misrepresentations, requires it to implement a comprehensive privacy program, and calls for regular, independent privacy audits for the next 20 years.

FTC Gives Final Approval to Settlement with Google over Buzz Rollout

FTC Gives Final Approval to Settlement with Google over Buzz Rollout

The settlement bars the company from future privacy misrepresentations, requires it to implement a comprehensive privacy program, and calls for regular, independent privacy audits for the next 20 years.

Official Google Blog: A fall sweep

Official Google Blog: A fall sweep

In a few weeks we’ll shut down Google Buzz and the Buzz API, and focus instead on Google . While people obviously won't be able to create new posts after that, they will be able to view their existing content on their Google Profile, and download it using Google Takeout.

Google ends buzz privacy row with ftc- The Inquirer

Google ends buzz privacy row with ftc- The Inquirer

Unlike its Google social network, Google's Buzz had a rather blighted entrance to the market, thanks to the fact that it put users in the unfortunate position of having their contact lists exposed.

Google Must Submit to Privacy Audits for 20 Years Under FTC Settlement | Reuters

Google Must Submit to Privacy Audits for 20 Years Under FTC Settlement | Reuters

Google's settlement with the Federal Trade Commission over what the feds called deceptive tactics became official Monday.

Google agrees to FTC settlement (corrected) - MarketWatch

Google agrees to FTC settlement (corrected) - MarketWatch:

The FTC said the agreement represents the first settlement order that mandates a comprehensive Internet privacy program and the first time the agency alleged a violation of the U.S.-EU safe harbor framework, which covers personal data exchanged between the U.S. and European Union.

Saturday, October 29, 2011

BlueSniff: Eve meets Alice and Bluetooth

BlueSniff: Eve meets Alice and Bluetooth

First, we show that the Bluetooth packets have no confidentiality properties. Specifically we demonstrate how data can be unwhitened and the hopping sequence calculated. Prior work has shown how the data can be decrypted if necessary [14]. Second, we show that the undiscoverable mode does not provide access control to master devices, nor protects the secrecy of their MAC address. We are able to determine the complete MAC address of these devices. Finally, all our work was done using GNU Radio and we therefore provide the first open-source Bluetooth sniffer, free from any licensing restrictions.

Bluetooth Security Review, Part 2 | Symantec Connect Community

Bluetooth Security Review, Part 2

... we look at Bluetooth viruses, several unpublished vulnerabilities in Symbian based phones, and then moves on to discuss "Blue tag" tracking, positioning, and privacy issues.

Configure the Diamante for Bluetooth wireless realtime

Configure the Diamante for Bluetooth wireless realtime

The configuration process identifies the computer’s address and generates a Passkey. The Passkey is a security code that allows your writing machine and the computer to communicate securely. You must use this code to establish an active wireless connection between the writing machine and your computer.

Schneier on Security: Bluetooth Sniper Rifle

Schneier on Security: Bluetooth Sniper Rifle

We've all known that you can intercept Bluetooth communications from up to a mile away. What's new is the step-by-step instructions necessary to build an interceptor for yourself for less than $400. Be the first on your block to build one.

Friday, October 28, 2011

7 SEO Friendly Site Features that Developers Often Miss - Search Engine Watch (#SEW)

7 SEO Friendly Site Features that Developers Often Miss - Search Engine Watch (#SEW):

But unfortunately, a lot of developers can have a bit of a blind-spot when it comes to SEO.

FTC Finalizes Settlement of Google Buzz Privacy Issues - Search Engine Watch (#SEW)

FTC Finalizes Settlement of Google Buzz Privacy Issues - Search Engine Watch (#SEW):

The FTC has approved its settlement with Google that addresses improper privacy disclosure during the release of Buzz. The settlement mandates additional privacy procedures, including third-party privacy audits every other year for the next two decades

'Smishing' scammers may hit cellphones – USATODAY.com

In the recent spate of scams in the West, identity thieves sent text messages en masse to random cellphones that read: "Wells Fargo notice: Your card 4868* has been deactivated." The message listed a phone number.

People who dialed the number were asked for account information, Social Security numbers and personal identification numbers, officials said.

'Smishing' scammers may hit cellphones – USATODAY.com

Monday, October 24, 2011

401k Rollover Annuity

401k Rollover Annuity: Guaranteed Principal: Principal is guaranteed with a 401k rollover annuity, while principal is not guaranteed with mutual funds, stocks, or bonds associated with your 401k or IRA investment.

Wednesday, October 19, 2011

"Security Breach" Class Action Dismissed for No Actual Damages - Privacy In Focus - Wiley Rein LLP

"Security Breach" Class Action Dismissed for No Actual Damages - Privacy In Focus - Wiley Rein LLP:

October 2003 | Privacy In Focus

On October 20, a federal judge in Arizona dismissed a class action lawsuit that had been filed against TriWest Healthcare Alliance stemming from a security breach at the TriWest facilities.

Monday, October 17, 2011

Cloud Security - Metaflows Product

Cloud Security

The MetaFlows Security System (MSS) is software that you can install on your cloud server that will monitor traffic flowing in and out of your cloud instances to detect and prevent cloud security incidents. Metaflows customers can manage both on-site and cloud-based assets through a single, unified and secure web browser dashboard.

Austin software developer's future unclear after employees walk out, offices locked by landlord

Austin software developer's future unclear after employees walk out, offices locked by landlord

The future of local software developer Appiction LLC was unclear Wednesday after most of its employees resigned and the company was locked out of its North Austin offices.

The 1974 Privacy Act

"No agency shall disclose any record which is contained in a system of records by any means of communication to any person, or to another agency, except pursuant to a written request by, or with the prior written consent of, the individual to whom the record pertains, unless disclosure of the record would be--"

THE PRIVACY ACT OF 1974, 5 U.S.C. 552a -- As Amended

10 Massive Security Breaches -- InformationWeek

They make the news on a regular basis: incidents in which a company or government agency's security is breached, leading to a loss of information, personal records, or other data.

10 Massive Security Breaches -- InformationWeek

Legal Resources | BCP Business Center

Here in the legal resources section of the Business Center, you'll find more in-depth, legal information–like case highlights, reports, workshops, rules and laws the FTC enforces, and compliance documents like staff opinion letters, Commission advisory opinions, policy statements, and industry guides.

Legal Resources | BCP Business Center:

Friday, October 14, 2011

Firesheep addon updated to exploit Google info leak • The Register

Firesheep addon updated to exploit Google info leak • The Register

“We extended Firesheep to implement our information leakage attack,” researchers Vincent Toubiana and Vincent Verdot of the Alcatel-Lucent Bell Labs wrote in a recently released paper (PDF). “As a result, when a Google SID cookie is captured, the account name appears in the Firesheep sidebar. Double clicking on it starts the attack; double clicking again displays the retrieved list of visited links.”

Facebook accused of violating US wiretap law • The Register

Facebook accused of violating US wiretap law • The Register

“Plaintiff did not give consent or otherwise authorize Facebook to intercept, track, collect, and store her wire or electronic communications, including but not limited to her internet browsing history when not logged-in to Facebook.”

Cyber Threats to Expect in Coming Year

Cyber Threats to Expect in Coming Year

The year ahead will feature new and sophisticated means to capture and exploit user data, as well as escalating battles over the control of online information that threaten to compromise content and erode public trust and privacy.

New Survey Data From Experian Reveals People Are Making It Easy For Cybercriminals To Steal Their Identity - Dark Reading

New Survey Data From Experian Reveals People Are Making It Easy For Cybercriminals To Steal Their Identity - Dark Reading

nearly 54 percent of respondents do not use a password to lock their phone and/or tablet.

FTC and Disney Breach

FTC - CyBIR: Cyber and Privacy Breaches – Insurance and Reinsurance

Disney’s Playdom, Inc. subsidiary and its Senior Vice-President Howard Marks have agreed to pay $3 million to settle charges by the FTC that they collected and disclosed personal information of more than 1.2 million children in violation of the Children’s Online Privacy Protection Act (“COPPA”). Between 2006 and 2010,

Thursday, October 13, 2011

Netflix Facebook

Unfortunately, we will not be offering this feature in the U.S. because a 1980’s law creates some confusion over our ability to let U.S. members automatically share the television shows and movies they watch with their friends on Facebook.

http://blog.netflix.com/2011/09/help-us-bring-facebook-sharing-to.html

Herman Cain's '999 plan': long overdue tax reform or job killer? - CSMonitor.com

Herman Cain's '999 plan': long overdue tax reform or job killer? - CSMonitor.com

One of the major implications would be moving the nation away from consumption. That may not be so bad, says Mark Zandi, chief economist at Moody’s Analytics in West Chester, Pa. “The more we save and invest, the stronger our economy would be.” But, he quickly adds, “It’s not exactly what I would do, but I sympathize with the spirit.”

Cybercriminals Use Facebook, Bitcoin to Steal Digital Currency - ABC News

Cybercriminals Use Facebook, Bitcoin to Steal Digital Currency - ABC News

To steal loot this way no credit card is necessary. Cyber thieves attempt to get users to provide a phone number that will allow them to apply a minimal fee to each cell phone bill, perhaps $1 or $10. It’s those little fees connected to sending text messages that can go unnoticed.

(9) Facebook

(9) Facebook: WE DO NOT GUARANTEE THAT FACEBOOK WILL BE SAFE OR SECURE.

Koch Brothers Flout Law Getting Richer With Secret Iran Sales - Bloomberg

Koch Brothers Flout Law Getting Richer With Secret Iran Sales - Bloomberg

Internal company records show that Koch Industries used its foreign subsidiary to sidestep a U.S. trade ban barring American companies from selling materials to Iran. Koch-Glitsch offices in Germany and Italy continued selling to Iran until as recently as 2007, the records show.

Win32/Cycbot: Ready to Ride | ESET ThreatBlog

Win32/Cycbot: Ready to Ride | ESET ThreatBlog:

Win32/Cycbot is a multithreaded application and just a single instance of the bot can handle dozens of tasks, clicking advertisements or poisoning web searches. Here is an example of the bot’s network activity, captured over several minutes.

Wednesday, October 12, 2011

Enterprise Applications in the Cloud: A SaaS Security Perspective -- Enterprise Systems

Enterprise Applications in the Cloud: A SaaS Security Perspective -- Enterprise Systems

Proven backup and recovery services at the SaaS application, infrastructure and the cloud level are necessary to facilitate disaster recovery and mitigate risks against the loss of sensitive data due to failures.

The backup data should be protected, similar to operational data, using strong encryption mechanisms. These checks are essential to reduce the risk of unauthorized access and leakage of sensitive data.

Tuesday, October 11, 2011

Plantronics P251N-U10P Supra Plus Polaris Noise-Canceling (NOW HW251N A10)

Plantronics P251N-U10P Supra Plus Polaris Noise-Canceling (NOW HW251N A10)

Plantronics Supra Plus Polaris HW251N plus A10 connector cable. By clicking "Add to Cart" on this page you will be getting both the headset and the bottom cable to connect to your phone. Nothing additional is needed! Plantronics Supra Plus features a noise canceling microphone and is ideal for use in noisy offices and call centers.

Virus phone scam being run from call centres in India | Technology | The Guardian

Virus phone scam being run from call centres in India | Technology | The Guardian

The scam always starts the same way: the phone rings at someone's home, and the caller – usually with an Indian accent – asks for the householder, quoting their name and address before saying "I'm calling for Microsoft. We've had a report from your internet service provider of serious virus problems from your computer."

I received a Phone Call From Someone claiming I have a Virus - Microsoft Answers

I received a Phone Call From Someone claiming I have a Virus - Microsoft Answers

I have just recieved a phone call form someone claiming to be from Microsoft, who says that I have a virus which is sending information from my computer.

Monday, October 10, 2011

Thousands of Hacked Sites Seriously Poison Google Image Search Results | Unmask Parasites. Blog.

Thousands of Hacked Sites Seriously Poison Google Image Search Results | Unmask Parasites. Blog

The attack uses cloaking to feed keyword-rich pages with hot-linked images to search engine bots and return a malicious JavaScript that redirects to fake AV sites to visitors that come from search engines.

10 FTP Clients Malware Steals Credentials From | Unmask Parasites. Blog.

10 FTP Clients Malware Steals Credentials From | Unmask Parasites. Blog

I always suggest that you don’t store passwords in your FTP programs where they are easily accessible by any program running on your computer (including malware).

Trojan Abuses FTP Access and Infects PHP

WordPress › Support XML parsing error

This trojan sents all your FTP data and passwords to someone who than uses it to change all index.html and index.php files on your server and adds to the end a string like

Microsoft knocks out another botnet as Kelihos is taken offline | Security | silicon.com

Microsoft knocks out another botnet as Kelihos is taken offline | Security | silicon.com:

Microsoft has put a halt to the Kelihos botnet and is accusing a Czech resident of hosting the botnet and using it to deliver spam and steal data, the company said today.

Online fraud declines as tighter web security sees crooks resort to retro methods | Security | silicon.com

Online fraud declines as tighter web security sees crooks resort to retro methods | Security | silicon.com

Initiatives such as chip and PIN are forcing fraudsters to give up on high-tech scams and resort to more traditional methods of committing financial crimes, according to a report by fraud prevention group Financial Fraud Action UK (FFA UK).

Escalating Cyberthreats: Simple Steps to Secure Your SMB - A BrightTALK webcast

Escalating Cyberthreats: Simple Steps to Secure Your SMB - A BrightTALK webcast

Good start to Cybersecurity Awareness Month.

Hackers Scam Friends of Victim | NBC Philadelphia

The message, from Norma Henson, claimed that she had been mugged while on vacation in London and needed $1650 wired to her. Ted decided to call Henson and his suspicion was confirmed.

Henson wasn’t in England but instead at her home in Pine Hill, NJ. It was true however, that she was the victim of a crime, though it took place in cyberspace rather than the streets of London.

Hackers Scam Friends of Victim | NBC Philadelphia

Ubee Interactive | Product Detail | DOCSIS 2.0 Modem

Ubee DOCSIS 2.0 Modem

The Ubee U10C018 Data Cable Modem is the most compact design available in the market today measuring at under 5 inches long.

Sunday, October 9, 2011

Slovakian Intrigues: Michael Genelin’s Jana Matinova Novels � Scene of the Crime

Good reading...

Slovakian Intrigues: Michael Genelin’s Jana Matinova Novels

Genelin is the author of three novels in the crime series featuring police commander Jana Matinova: Siren of the Waters, Dark Dreams, and coming this summer, The Magician’s Accomplice.

Genelin takes the reader into a part of Europe that most are unfamiliar with: Slovakia—yes the Slovakia that was once part of Czechoslovakia.

NYC ID Theft Ring Bust Leads to 111 Arrests - TIME

A sign of the times? When pay stagnates and work is hard to find, folks are more easily tempted...

NYC ID Theft Ring Bust Leads to 111 Arrests - TIME

Bank tellers, restaurant workers and other service employees in New York lifted credit card data from residents and foreign tourists as part of an identity theft ring that stretched to China, Europe and the Middle East and victimized thousands, authorities said Friday.

TriWest pay $10M to settle false claims

TriWest are the same folks who lost a boat loadof personal data on service members and didn't want to pay for identity theft protection.

"TriWest Healthcare Alliance Corp. agreed to pay $10 million to resolve allegations that the Arizona-based contractor filed false inflated claims to the U.S. military's Tricare medical benefit plan between 2004 and 2010, the Justice Department said.

TriWest was accused of failing to pass on negotiated discounts with service providers to the program, which covers millions of military members, retirees and their families.

The settlement resolves a lawsuit filed by four former TriWest employees, Judi Jerdee, Deborah Thornton, Linda Glassgow and Paige Fiorillo, under the qui tam, or whistleblower provisions, of the False Claims Act. Together, the qui tam relators will receive $1.7 million as their share of the government's recovery.

"Ensuring that the programs receive the contractual savings and deductions to which they are entitled is essential to our commitment," Melinda Haag, U.S. attorney for the northern district of California, said."

TriWest pay $10M to settle false claims


FORMULA ONE - F1 News, Formula One Racing, and Pictures of F1

FORMULA ONE - F1 News, Formula One Racing, and Pictures on SPEED:

The Motor Sports Authority, SPEED and associated logos are registered trademarks of Speed Channel Inc

The CURTA Calculator Page

The CURTA Calculator Page

CURTA Literature Listing is a list of all know CURTA literature compiled by Rick Furr and Skip Godfrey. Please send us copies of your literature if it is different so we can include it.

Saturday, October 8, 2011

American Express Extended Warranty - Important Information!

American Express Extended Warranty - Important Information!

If the covered item has an extended warranty of 5 years or less, AmEx will double the duration coverage, up to a maximum of one additional year

Friday, October 7, 2011

Inside Social Games - Tracking Innovation at the Convergence of Games and Social Platforms

Inside Social Games - Tracking Innovation at the Convergence of Games and Social Platforms:

"Depending on how the game performs in the next few weeks, The Sims Social could go into a period of decline or finally unseat Zynga’s CityVille as the largest application on Facebook."

Researcher: Malware, Increasingly Interdependent, Stifles Security Wares | threatpost

Researcher: Malware, Increasingly Interdependent, Stifles Security Wares | threatpost:

"Rather than operating independently, the BlackHole BEP relied heavily on the Zeus malware family to spread - and vice-versa, Sood found. The Zeus malware relies on BlackHole's anti-malware tracking features, whereas Sood observed BlackHole uses the Zeus database of infected hosts to spread, harvesting specific details about the Zeus-infected target and then launching attacks that would trigger infections on that host, Sood said."

Thursday, October 6, 2011

Information Security Policies Made Easy | Information Security Policy

Information Security Policies Made Easy | Information Security Policy

Information Security Policies Made Easy is the "gold standard" information security policy resource based on the 25 year consulting experience of Charles Cresson Wood, CISSP, CISA. The most complete security policy library available, ISPME contains over 1400 pre-written information security policies covering over 200 security topics and organized in ISO 27002 format. Take the work out of creating, writing, and implementing security policies.

Former Countrywide analyst sentenced to prison for selling data of 2.5 million customers - The Washington Post

Former Countrywide analyst sentenced to prison for selling data of 2.5 million customers - The Washington Post:

A former senior analyst for Countrywide Home Loans was sentenced Wednesday to eight months behind bars for downloading and selling the personal information of some 2.5 million customers in a scam that cost the mortgage lender some $30 million.

Check Point software takes aim at botnets

Check Point software takes aim at botnets:

The heart of the new software is ThreatSpect, the anti-bot engine that identifies bots and focuses in three areas - detecting command and control computers via IP address, DNS and URL, detecting communications patterns and detecting and blocking what data it is trying to send,

Dandy Livingstone - Wikipedia, the free encyclopedia

Dandy Livingstone - Wikipedia, the free encyclopedia:

Dandy Livingstone (born Robert Livingstone Thompson, 14 December 1943,[1] Kingston, Jamaica) is a Jamaican reggae musician and producer, best known for his 1972 hit, "Suzanne Beware of the Devil", and for his song, "Rudy, A Message to You", which was later a hit for The Specials. "Suzanne Beware of the Devil", reached number 14 on the UK Singles Chart.[2]

'Tricked' RSA Employee Opened Door that Led to APT Attack

'Tricked' RSA Employee Opened Door that Led to APT Attack:

A well-crafted e-mail with the subject line "2011 Recruitment Plan" tricked an RSA employee to retrieve from a junk-mail folder and open a message containing a virus that led to a sophisticated attack on the company's information systems, a top technologist at the security vendor says in a blog.

Too Much Cybersecurity Awareness

Too Much Cybersecurity Awareness:

"There's too much awareness without anything being done. The problem is that when consumers see time and time again, nothing happens to correct it. They throw up their hands. There's no amount of consumer education to make them smart enough to resist attacks."

Wednesday, October 5, 2011

CSIS: This is how Windows get infected with malware

When a Microsoft Windows machine gets infected by viruses/malware it does so mainly because users forget to update the Java JRE, Adobe Reader/Acrobat and Adobe Flash. This is revealed by a survey conducted by CSIS Security Group A/S.

CSIS: This is how Windows get infected with malware

| NBC San Diego

Can you see this?

| NBC San Diego Consumer Bob

Tuesday, October 4, 2011

RealLegal, LLC - Improving the Business of Law

RealLegal, LLC - Improving the Business of Law

Each RealLegal E-Transcript has guaranteed page and line integrity and comes as a read-only, accurate, encrypted, virus and password-protected transcript. For maximum security and authentication, court reporters can include their official electronic signature with each RealLegal E-Transcript. Law firms also have the ability to create their own E-Transcript from an ASCII using RealLegal E-Transcript Internet™ on a pay-per-use basis.

Stenograph: industry leader in court reporting technology, supplies, and education.

Stenograph: industry leader in court reporting technology, supplies, and education.

Case CATalyst is the industry-leading software for computerized-assisted transcription (CAT) with special editions configured for judicial reporters, captioners, editors, and students.

Monday, October 3, 2011

OnStar reverses course on controversial GPS tracking plans - Computerworld

OnStar reverses course on controversial GPS tracking plans - Computerworld:

GM subsidiary OnStar has reversed course on a planned change to its privacy policies that would have let it collect and share GPS tracking and other data from vehicles -- even after their users stopped subscribing to OnStar service.

Sunday, October 2, 2011

Facebook changes touch privacy nerve – USATODAY.com

Ten consumer and privacy groups have joined Reps. Ed Markey, D-Mass., and Joe Barton, R-Tex., in calling on the Federal Trade Commission to investigate new sharing mechanisms designed to accelerate the collection and dispersal of information about Facebook users' Internet activities.

Facebook changes touch privacy nerve – USATODAY.com

Saturday, October 1, 2011

Poisoned Google image searches becoming a problem

If you are a regular user of Google's search engine you might have noticed that poisoned search results have practically become a common occurrence.

Poisoned Google image searches becoming a problem

Friday, September 30, 2011

ISC Diary | More on Google image poisoning

The activities behind the scenes to poison Google’s image search are actually (and unfortunately) relatively simple.

ISC Diary | More on Google image poisoning

Thursday, September 29, 2011

Code Signing Certificate for Microsoft Authenticode - Code Signing Certificates from Thawte

With code signing from Thawte, you can assure users that your code and content is safe to download, and protect your most valuable business asset: your reputation. Code signing authenticates the code’s source and confirms the integrity of content distributed online. Thawte� Code Signing Certificate for Microsoft� Authenticode� (Multi-Purpose) offers maximum flexibility with a single certificate to sign code developed on multiple platforms.

Code Signing Certificate for Microsoft Authenticode - Code Signing Certificates from Thawte

Code Signing for Developers

Code signing adds a digital signature to software files. Digital signatures can identify the software publisher, and verify that the software users receive over the Internet has not been altered or corrupted since it was created and signed by a third party.

Code Signing for Developers

Tuesday, September 27, 2011

Feds seize $15m from scareware monger's Swiss account • The Register

Feds seize $15m from scareware monger's Swiss account • The Register:

Last year, the US Attorney's office in Chicago accused Jain of selling more than $100m worth of rogue antivirus software.

The programs carried titles such as WinFixer, WinAntivirus, DriveCleaner, and ErrorSafe and sold for $30 to $70 for each copy. The US citizen and former resident of Mountain View, California, was believed to have fled to Ukraine, authorities said at the time.

Feds seize $15m from scareware monger's Swiss account • The Register

Feds seize $15m from scareware monger's Swiss account • The Register:

Jain had originally surrendered to ICE agents, but was declared a fugitive in January 2009 when he failed to appear for a scheduled appearance in federal court in San Jose, California.

Hackers breach Sony's password reset system | Security | News | PC Pro

Hackers breach Sony's password reset system | Security | News | PC Pro:

“A new hack is currently doing the rounds in dark corners of the internet that allows the attacker the ability to change your password using only your account’s email and date of birth,” the website reported. “Without any shadow of a doubt this is real.”

Monday, September 26, 2011

Modern Warfare, Too - by Michael Tanji - Tablet Magazine - A New Read on Jewish Life

Modern Warfare, Too - by Michael Tanji - Tablet Magazine - A New Read on Jewish Life:

"If you’re not actually going to bomb your adversaries back into the Stone Age, you don’t want to destroy the power plant, you just want to turn it off, because eventually you want the lights to come back."

Sunday, September 25, 2011

Masterminds of far-reaching scareware scam charged - SC Magazine US

Masterminds of far-reaching scareware scam charged - SC Magazine US:

A trio of men have been indicted for their alleged role in a highly profitable, Ukraine-based "scareware" scheme that tricked unwitting users into purchasing more than one million fake anti-virus programs, resulting in an estimated $100 million in losses to victims.

Shaileshkumar Jain
Bjorn Sundin
James Reno
Chicago

CyberCrime & Doing Time

CyberCrime & Doing Time:

We've already seen nearly 500 copies of the new Government-related Zeus spam campaign so far this morning in the UAB Spam Data Mine. As has been typical in this campaign that we first started tracking on July 13th, the detection has been fairly horrible each morning for the new malware version.

(ISC)2 Security Transcends Technology

(ISC)2 Security Transcends Technology:

There is an immediate need from the public to better understand information security safety issues

Security sector on the attack - The Irish Times - Fri, Sep 23, 2011

Security sector on the attack - The Irish Times - Fri, Sep 23, 2011:

At the opposite end of the spectrum, attacks are now being created specifically to exploit flaws in just one organisation’s systems, or to target particular individuals.

Wednesday, September 21, 2011

Cyber-Security Can't Ignore Human Behavior - James Fallows - Technology - The Atlantic

Cyber-Security Can't Ignore Human Behavior - James Fallows - Technology - The Atlantic:

Here's a quote we can't agree with:

"On the positive side, the cyber-universe can be thought of as reduced to the 0s and 1s of binary data. Actions in this universe consist of sequences of changes to binary data, interleaved in time, and having some sort of locations in space. One can speculate as to why mathematics is so effective in explaining physics, but the cyber-world is inherently mathematical."

Noooo, cyber-world is inherently human, humans doing things with binary data.

Tuesday, September 20, 2011

Health Data Management: Security

Data Security: With increasing federal scrutiny of health care data breaches, maintaining a secure network and clinical infrastructure is crucial for both payers and providers. Topics here include: data breaches, data encryption and other security techniques, access and authentication issues, and regulatory requirements.

Craigslist Apartment Scams Target Renters Seeking Deals | Internet Scams & Phishing | Identity Theft & Online Fraud | SecurityNewsDaily

This particular listing in question, in San Diego, was spotted by Stephen Cobb, who came across it while looking to relocate from upstate New York for a new job that began Sept. 1 in the sunny Southern California city.
It's the job Cobb was moving to take, as a researcher for the cybersecurity firm ESET, that helped him recognize and avoid falling victim to the alluring apartment scam.


Craigslist Apartment Scams Target Renters Seeking Deals | Internet Scams & Phishing | Identity Theft & Online Fraud | SecurityNewsDaily

Sunday, September 18, 2011

Forget 2012 end of the world, the PC apocalypse comes in 2015

Forget 2012 end of the world, the PC apocalypse comes in 2015:

"Forget what we have taken for granted on how consumers use the Internet", Karsten Weide, IDC research vice president, says in a statement. "Soon, more users will access the Web using mobile devices than using PCs, and it's going to make the Internet a very different place".

Windows XP PCs breed rootkit infections - Computerworld

Windows XP PCs breed rootkit infections - Computerworld:

Machines running the decade-old Windows XP make up a huge reservoir of infected PCs that can spread malware to other systems, a Czech antivirus company said today.

Windows XP computers are infected with rootkits out of proportion to the operating system's market share, according to data released Thursday by Avast Software, which surveyed more than 600,000 Windows PCs.

While XP now accounts for about 58% of all Windows systems in use, 74% of the rootkit infections found by Avast were on XP machines.

XP's share of the infection pie was much larger than Windows 7's, which accounted for only 12% of the malware-plagued machines -- even though the 2009 OS now powers 31% of all Windows PCs.

What if the Secret to Success Is Failure? - NYTimes.com

What if the Secret to Success Is Failure? - NYTimes.com

Very stimulating article on education.

UBS Says Trading Losses Were Closer to $2.3 Billion - NYTimes.com

File under unbelievable?

UBS Says Trading Losses Were Closer to $2.3 Billion - NYTimes.com:

“The true magnitude of the risk exposure was distorted because the positions had been offset in our systems with fictitious, forward-settling, cash ETF positions, allegedly executed by the trader,” the UBS statement said. “These fictitious trades concealed the fact that the index futures trades violated UBS’s risk limits.”

Wednesday, August 24, 2011

Latest Earthquakes M5.0 in the World - Past 7 days

Latest Earthquakes M5.0 in the World - Past 7 days:

Magnitude 5 and greater earthquakes located by the USGS and contributing networks in the last week (168 hours). Magnitudes 6 and above are in red. (Some early events may be obscured by later ones on the maps.)

MLK memorial ‘holy ground’ for many - The Washington Post

MLK memorial ‘holy ground’ for many - The Washington Post:

The Martin Luther King, Jr. Memorial official unveiling on the National Mall is scheduled for Sunday, August 28.

Richard Clarke 9/11 Interview: Was There a CIA Cover-Up?

Richard Clarke 9/11 Interview: Was There a CIA Cover-Up? - The Daily Beast:

Did the CIA keep mum about two 9/11 hijackers because it tried and failed to recruit them? Anthony Summers and Robbyn Swan, authors of 'The Eleventh Day,' on whether there’s any truth behind ex-Bush official Richard Clarke’s claim.

Russia Green Lights $65 Billion Siberia-Alaska Rail and Tunnel to Bridge the Bering Strait!

Russia Green Lights $65 Billion Siberia-Alaska Rail and Tunnel to Bridge the Bering Strait!

The high speed railway and tunnel will be a private public partnership whose economic impact could be startling. 100 million tons of freight could be moved per year using the most efficient known way of transport. Proposed tidal energy plants could provide 10 gigawatts of energy and a string of wind power fields could churn a constant supply of clean energy, serving as a vital link to a worldwide energy grid. The tunnel alone would take fifteen years to complete — and an energy and railway network would take many more — but the project would significantly change the shipping and energy industry.

Sunday, August 21, 2011

Used KUBOTA Tractors, KUBOTA Tractors For Sale At TractorHouse.com

Used KUBOTA Tractors, KUBOTA Tractors For Sale At TractorHouse.com:

Sample Of KUBOTA Tractors Less than 40 HP
2011 KUBOTA B2620HSD, Call, MI
2007 KUBOTA L3400DT, US $14,500, PA
2002 KUBOTA L3010, US $8,900, MS
2009 KUBOTA BX2360, US $12,999, NY
2011 KUBOTA B3200HSD, Call, IL
2006 KUBOTA L3830HST, US $17,000, KS
2011 KUBOTA B2920HSD, Call, WA
1984 KUBOTA L245H, Call, PA
2005 KUBOTA L3830, US $25,200, GA
KUBOTA BX2350, US $10,000, MI

Saturday, August 20, 2011

Tuesday, August 16, 2011

Scam: Just Gorgeus 2bedrooms/2bathrooms Apartment Downtown

Only trouble is, this same place is for rent in DC, Seattle, Boston, and so on...get the picture, same in every posting.

"Fully furnished, the apartment has everything that you wished for,"

Just Gorgeus 2bedrooms/2bathrooms Apartment Downtown

Renovated spacious and clean apartment 2bd/2ba central location

Apartment scam

Renovated spacious and clean apartment 2bd/2ba central location:

"Fully furnished, the apartment has everything that you wished for,"

Clean and Spacious Apartment Scam

Apartment scam:

Clean and Spacious Apartment 2bd/2ba Great Location:

"Fully furnished, Modern kitchen and bath, cable TV, Internet WI-FI, electricity/water/local phone, Nestled in a quiet, almost suburban-like setting,"

Monday, August 15, 2011

Summary of the Amazon EC2, Amazon EBS, and Amazon RDS Service Event

Summary of the Amazon Service Events in the EU West Region:

"We would like to share more details with our customers about the events that occurred with Amazon Elastic Compute Cloud (“EC2”), Amazon Elastic Block Store (“EBS”), and Amazon Relational Database Service (“RDS”) earlier this week, and what we are doing to prevent these sorts of issues from happening again. The service disruption primarily affected EC2 instances, RDS instances, and a subset of EBS volumes in a single Availability Zone in the EU West Region"

What is a Violation of Privacy?

What is a Violation of Privacy?

"The problems with the privacy community are two things. First: they are creating a reality distortion field around your rights to privacy. Second: they cannot tell the difference between a potential violation and an actual violation."

Saturday, August 13, 2011

Tribeca Nylon Tri-fold Carry-on Garment Bag | Overstock.com

Tribeca Nylon Tri-fold Carry-on Garment Bag | Overstock.com:

"The Garment bag was surprisingly attractive, spacious and apparently durable. Nice to have something that is functional and will fit in approved carry-on space"

Monday, August 8, 2011

Open Directory - Computers: Security: Policy: Sample Policies

Very handy when you need security policies.

Open Directory - Computers: Security: Policy: Sample Policies

"Defines acceptable use of IT equipment and computing services, and the appropriate employee security measures to protect the organization's corporate resources and proprietary information."

Solid brass & solid nickel silver ID Tags

Solid brass & solid nickel silver ID Tags

You only pay $5 shipping and handling.
  • Self-adhesive backing.
  • Adheres to leather, vinyl, metal, paper and other materials.
    For fabric cases use either luggage tag style.
  • Needs no tools; simply apply with finger tip pressure.

Official Website Florida Department of Highway Safety and Motor Vehicles

Official Website Florida Department of Highway Safety and Motor Vehicles:

"If you want to review the current status of your driver license, you can check that at no cost online by clicking here."

Friday, August 5, 2011

Meet Dark Tangent, the hacker behind Black Hat and DEF CON - CNN.com

"CNN: How did Black Hat and DEF CON get started?

Moss: The two are definitely interconnected. DEF CON started several years before Black Hat did because there was just no market for a commercial-type security con. Everything was underground or much more informal and when the Internet started growing up then all of a sudden companies were looking around for security information. A friend of mine suggested I should charge a lot more money and make a professional version of DEF CON."

Meet Dark Tangent, the hacker behind Black Hat and DEF CON - CNN.com:

China Suspected Of Shady RAT Attacks -- InformationWeekChina Suspected Of Shady RAT Attacks - security Blog

China Suspected Of Shady RAT Attacks -- InformationWeekChina Suspected Of Shady RAT Attacks - security Blog:

"Shady RAT--for remote access tool--is the name of the 'low and slow' attack detected by McAfee, and detailed in a report it released on Tuesday. According to McAfee, the attack successfully compromised at least 72 organizations, including 22 governmental agencies and contractors, 13 defense contractors, 23 businesses, and think tanks, political nonprofits, and other organizations."

Thursday, August 4, 2011

SDBJ Annual Awards Programs

SDBJ Annual Awards Programs:

"San Diego is home to some of the most successful companies and business people in the world. At the San Diego Business Journal we do more than just cover these standouts, we reward them for their success. Annually, the San Diego Business Journal presents special award ceremonies and educational seminars, celebrating the beacons of our region and providing top quality mentoring from the highest levels of the national business world."

San Diego Business Journal Online Store | San Diego Business Journal

San Diego Business Journal Online Store | San Diego Business Journal:

• 51 weeks of the San Diego Business Journal
• The Annual Book of Lists [the Ultimate Reference Guide to San Diego County business
• All published Special Supplements
• VIP Access to www.sdbj.com
• Full and easy access to SDBJ archives

Wednesday, August 3, 2011

Rebuilding rural America through rural philanthropy

Rebuilding rural America through rural philanthropy:

"From the Rural Tour, which I led two years ago — to the new White House Rural Council, which I chair — from broadband, to energy and microenterprises, the USDA’s ongoing focus has been jobs and opportunity for rural citizens. This kind of opportunity adds value to agricultural products, attracts industry and makes rural America competitive. But our work also goes to quality-of-life issues like education, healthcare and community services, and makes rural communities better places to live and raise families.

Rural America abounds with potential, but we must better use a powerful tool capable of also improving opportunity in rural America: philanthropic partnerships.

Our rural communities need more investment, innovation and networks.

To unleash the wealth and capital that exist in our rural communities we need funding from many sources. That is why I traveled to Kansas City this week to address the Rural Philanthropy Conference of the Council on Foundations."

White space rural broadband moves one step closer

White space rural broadband moves one step closer:

"The Institute of Electrical and Electronics Engineers (IEEE), the organisation that helped ignite the Wi-Fi revolution nearly a decade ago, has published a new wireless standard that promises to bring broadband access to under-served rural areas.

Called IEEE 802.22, the new specification has been designed to take advantage of those portions of the radio frequency spectrum that are increasingly available as digital television switchover schemes make progress around the world.

With support for both VHF (very-high frequency) and UHF (ultra-high frequency) TV bands, sites as far as 100 kilometres away from a single transmitter could enjoy broadband speeds typical of more densely populated areas."

Tuesday, August 2, 2011

Jeep Grand Cherokee WJ - Roof rack cross bars

Jeep Grand Cherokee WJ - Roof rack cross bars:

"The rail end caps, two at the rear and two at the front, are attached with plastic clip tabs. To remove or install the adjustable crossrails, the two rear caps must be removed. The easiest way to remove them is to pry out one side with a trim stick or your fingers while pulling the cap up from the back (front side of vehicle). Note the location of the lock tabs in the photo above. The edges of the caps can be sharp so it's best to use a rag or glove to protect your fingers while pulling them off. When re-installing, make sure to align the end tab and check that they are completely seated on all sides."

Shotguns > Hunting > O/U on GunsAmerica.

WEATHERBY ORION III:

"BEAUTIFUL - WEATHERBY ORION III - .20 GA. - OVER/UNDER SHOTGUN. FIELD MODEL - 26' BARRELS - 2 3/4' OR 3' CHAMBER - WALNUT STOCK - SILVER ENGRAVED RECEIVER - SELECTIVE BARRELS - AUTO EJECTORS - CHOKES"

Sunday, July 31, 2011

How to Enable Intel VT and AHCI on a Napa/Santa Rosa platform Phoenix BIOS Vaio laptop

How to Enable Intel VT and AHCI on a Napa/Santa Rosa platform Phoenix BIOS Vaio laptop:

"Before you attempt this modification, make sure that the BIOS on your SZ is updated to these versions: R0112N0 for Napa SZs or R0122S5 for Santa Rosa SZs."

Internet monitoring software for businesses

Internet monitoring software for businesses:

"Know what your employees are doing online?
Avoid non-work related employee Internet use
Block unwanted downloads of dangerous files
Enforce your privacy & security policies
Monitor & control employee Internet usage in real time"

Amazon.com: reese cargo carrier

Amazon.com: reese cargo carrier:

"Car Hitch & Rooftop Cargo Carriers"

Friday, July 29, 2011

In Perspective: Right Now, Apple Has More Cash On Hand Than Treasury

In Perspective: Right Now, Apple Has More Cash On Hand Than Treasury : The Two-Way : NPR:

"As of Wednesday, the Treasury reported it had $73.768 billion cash on hand. What the Obama administration has been saying is that that number will dwindle to a point where the U.S. will not be able to pay its financial obligations, unless it's allowed to borrow more money.

$73.768 billion sounds like a lot of money, but to put it in perspective, Apple Insider points out that in its third quarter earning's report, Apple said it had $76.156 billion in cash."

Ant Video Downloader - Ant.com

Ant Video Downloader:

"Go to any video site and play any video. The download button from our add-on will be activated."

Open Directory - Computers: Security: Policy: Sample Policies

Open Directory - Computers: Security: Policy: Sample Policies:

"Defines acceptable use of IT equipment and computing services, and the appropriate employee security measures to protect the organization's corporate resources and proprietary information."

RIT - Information Security: Policy and Standards

RIT - Information Security: Policy and Standards:

"What are Policy and Standards?

Policy defines the strategy and direction of RIT’s approach to a particular issue; in this instance information security. All policies are grouped together in the Institute Policies and Procedures Manual.

Standards are created by the Information Security Office to help the RIT community implement the Information Security Policy.

The Information Security Policy (and standards) apply to the entire RIT community, including students, faculty, staff, external business associates, and volunteers."

Thursday, July 28, 2011

Researchers Build a Botnet Playground

Researchers Build a Botnet Playground

"Researchers have created their own botnet and unleashed it on 98 servers running 3,000 copies of Windows XP to better understand how they operate. The team from ESET and Ecole Polytechnique de Montreal needed to keep the Waledac botnet from infecting other computers, and took a cue from 'Battlestar Galactica.' They physically disconnected the servers from the Ecole Polytechnique's network, and only loaded software from DVD."

Raising a Botnet in Captivity - Technology Review

Raising a Botnet in Captivity - Technology Review

Researchers created their own, imprisoned, network of zombie computers to better learn how to take down those at large on the Internet."

Tuesday, July 26, 2011

Not All Free Identity Theft Services are Created Equal

Not All Free Identity Theft Services are Created Equal:

"Do you really want to give this to a company you’ve never done business with before—especially one that’s offering you something for free?

Think long and hard about who has your best interests at heart before accepting a complimentary identity theft service."

UPDATE: Booz Allen Hamilton Issues Statement on Hack

UPDATE: Booz Allen Hamilton Issues Statement on Hack:

"The leak is being touted as 'Military Meltdown Monday' and includes 'logins of military personnel—including personnel from US CENTCOM, the Marine Corps, various Air Force facilities, Homeland Security, State Department staff, and what looks like private sector contractors,' according to the Gizmodo article."

Weapon Systems Specs Stolen in Contractor Breach

Weapon Systems Specs Stolen in Contractor Breach:

Reuters reports that a classified US military weapons system will now need to be redesigned after specs and plans for the system were stolen from a defense contractor database in a breach earlier this year.

Defense officials have announced plans to shore up information networks to prevent the future losses of sensitive and classified materials."

Saturday, July 23, 2011

Donating Blood Questions and Answers

Donating Blood Questions and Answers: "Is it true that individuals diagnosed with hemochromatosis can now donate?

FDA has always allowed individuals diagnosed with hemochromatosis to donate blood."

Friday, July 22, 2011

On LulzSec, Censorship & CloudFlare - CloudFlare's blog

On LulzSec, Censorship & CloudFlare - CloudFlare's blog: "Two broad points that I've drawn from the experience of watching this unfold over the last three weeks. First, CloudFlare is firm in our belief that our role is not that of Internet censor. There are tens of thousands of websites currently using CloudFlare's network. Some of them contain information I find troubling. Such is the nature of a free and open network and, as an organization that aims to make the whole Internet faster and safer, such inherently will be our ongoing struggle."