Monday, March 26, 2012

Household Botnet Infections: The Day Before Zero

Household Botnet Infections The Day Before Zero

Within the ISP/Telco world that have chosen to deploy the Damballa CSP product, between 18-22% of unique subscriber IP addresses are actively seeking to connect to known C&C servers.

Friday, March 23, 2012

'System is blinking red': Alarming rhetoric in push for cybersecurity bills - The Hill's Hillicon Valley

'System is blinking red': Alarming rhetoric in push for cybersecurity bills - The Hill's Hillicon Valley:

Lawmakers and administration officials have warned of potentially catastrophic consequences if Congress doesn't pass cybersecurity legislation this year, but some observers question whether the rhetoric is overblown.

� (Tylko u nas!) Czy gruziński botnet to rządowy projekt? -- Niebezpiecznik.pl --

� (Tylko u nas!) Czy gruziński botnet to rządowy projekt? -- Niebezpiecznik.pl --:

Jako pierwsi w Polsce mamy przyjemność poninformować, że dziś o 14:00 ESET postanowił ujawnić informacje na temat ciekawego botnetu, kt�ry został namierzony na początku tego roku. Botnet miał swoje C&C (czyli centrum zarządzania) w …rządowej domenie Gruzji

Thursday, March 22, 2012

Pentagon invests heavily in new arsenal of cyberweapons - The Hill's DEFCON Hill

Pentagon invests heavily in new arsenal of cyberweapons - The Hill's DEFCON Hill

"The Defense Department is pouring roughly $3.4 billion into cyberwarfare accounts across the services and various combat commands, according to The Washington Post. "

'via Blog this'

Anonymous hacked 100M people in 2011, more than half all global data theft | VentureBeat

Anonymous hacked 100M people in 2011, more than half all global data theft | VentureBeat

"2011 was the year of the hacktivist, according to a study from Verizon, which shows that 100 million users saw their data compromised by Anonymous-related activities last year."

'via Blog this'

NSA Chief Appears to Deny Ability to Warrantlessly Wiretap Despite Evidence | Electronic Frontier Foundation

NSA Chief Appears to Deny Ability to Warrantlessly Wiretap Despite Evidence | Electronic Frontier Foundation:

"if the communications of millions of ordinary Americans were gathered and stored indefinitely in Utah, it would not be “collected” until the NSA “officially accepts, in some manner, such information for use within that component.” "

'via Blog this'

Wednesday, March 21, 2012

China Corporate Espionage Boom Knocks Wind Out of U.S. Companies - Bloomberg

China Corporate Espionage Boom Knocks Wind Out of U.S. Companies - Bloomberg:

"There have been a large number of corporate spying cases involving China recently, and they are coming to light as President Barack Obama and the U.S., along with Japan and the European Union, have filed a formal complaint to the World Trade Organization over China’s unfair trading practices."

'via Blog this'

Friday, March 16, 2012

Left Handed Cordoba C5-CE Acoustic-Electric Cutaway Classical Guitar

Left Handed Cordoba C5-CE Acoustic-Electric Cutaway Classical Guitar

Solid cedar soundboard
Mahogany back and sides
Spanish cedar neck
Rosewood fingerboard
Nickel-plated tuners
50mm head nut

La Patrie Etude Left-Handed Classical Guitar Steve's Music Store

La Patrie Etude Left-Handed Classical Guitar

The Etude is the most popular model in the La Patrie lineup. The Etudes specifications match those of the Motif but with a full size body. Incredibly responsive thanks to the feather-light Custom Polished finish, this guitar features great dynamic range along with the harmonically rich sound that you usually find in a guitar several times the price.

Thursday, March 15, 2012

SmitFraudFix Screenshot Collection

SmitFraudFix

Example: Registry Cleaner rogue installs itself with fake warning messages displayed by a Trojan Downloader.

Scottish charity signs ICO undertaking following personal data theft - ICO news release

Scottish charity signs ICO undertaking following personal data theft - ICO news release

A Scottish charity - based in Glasgow - breached the Data Protection Act after two unencrypted memory sticks and papers containing the personal details of up to 101 individuals were stolen from an employee’s home.

In the world of Big Data, privacy invasion is the business model

In the world of Big Data, privacy invasion is the business model | Molly Rants - CNET News

Meanwhile, it's absolutely ludicrous that the U.S. can't provide us with privacy and data protection laws that are at least as strict as those in Europe.

JWK Software - NFC Based Mobile Apps

JWK Software - NFC Based Mobile Apps

NFC Task Launcher makes NFC useful for every day life. You can use a single NFC tag to configure your phone or perform actions immediately when it is read.

Wednesday, March 14, 2012

Google’s privacy policy may cost them government contracts

Google’s privacy policy may cost them government contracts | CivSource:

Miller and Gould note that there are other concerns, specifically that Google has made no assurances that it is not monitoring or using government data without explicit consent. Questions about Google’s practices through its Apps for Government offering have been cropping up throughout state governments as well. The company’s high profile failure to comply with law enforcement security requirements in Los Angeles being one of the more troubling examples.