NSA Releases Disputed Email from Drake Case | Secrecy News
“If the system continues to be one-sided, where individuals are routinely held to account for supposedly improperly disclosing protected information but no one is ever held accountable for improperly classifying information in the first place, it sends a very clear message to the millions of individuals with security clearances to continue to overclassify with impunity. That does not bode well for either the security of our nation or our democratic form of government.”
Just a basic blog—snagging random stuff that catches our eye—nothing else, really...
Tuesday, July 31, 2012
ClevX DriveSecurity powered by ESET
ClevX DriveSecurity powered by ESET
ClevX DriveSecurity™ powered by ESET is a powerful antivirus utility that prevents malware from spreading via portable drives.
ClevX DriveSecurity™ powered by ESET is a powerful antivirus utility that prevents malware from spreading via portable drives.
Monday, July 30, 2012
Daily Kos: The Gentleperson's Guide to Forum Spies
What follows is a lengthy dissertation on how to subvert/co-opt Internet discussion groups. A veritable how-to manual for Forum Trolls and Hijackers
Daily Kos: The Gentleperson's Guide to Forum Spies:
Daily Kos: The Gentleperson's Guide to Forum Spies:
10 Scariest Hacks CIO.com
10 Scariest Hacks CIO.com: Researchers from Black Hat and Defcon showed all manner of serious attacks on everything from browsers to automobiles.
Black Hat USA 2012 | Briefings
Black Hat USA 2012 | Briefings: This talk demonstrates how modern day financial applications, password and credit card managers, and other applications handling sensitive data are attacked on the iOS platform, and sometimes all too easily breached in as little as seconds. Attendees will learn how iOS applications are infected, how low-level classes and objects are manipulated and abused, logic checks bypassed, and other dark techniques used to steal data.
Saturday, July 28, 2012
Defcon 20: Skillz, thrills for the whole hacker family | Security & Privacy - CNET News
Defcon 20: Skillz, thrills for the whole hacker family | Security & Privacy - CNET News: This year's hacker show has something for everyone, from hardware hacking and zero-day contests to con games and nerd-core rappers.
NSA Chief: Agency Wants to Provide Malware Signatures, Not Enter Private Networks | Threat Level | Wired.com
NSA Chief: Agency Wants to Provide Malware Signatures, Not Enter Private Networks | Threat Level | Wired.com: the proposal the NSA had unsuccessfully pushed for at the White House would have required critical infrastructure companies – such as utilities, telecoms, ISPs, transportation and financial services companies – to allow their e-mail and other internet traffic to be scanned using threat signatures provided by the NSA and to turn over any evidence of a suspected attack to the government for analysis. The NSA felt the government needed an expanded role because private firms had failed to demonstrate that they were capable of defending themselves against cyber threats.
Tuesday, July 24, 2012
Defcon 19: Paul Roberts, Aaron Barr, Joshua Corman and Jericho
Defcon 19: Paul Roberts, Aaron Barr, Joshua Corman and Jericho Whoever Fights Monsters.. - YouTube
"This video is part of the Infosec Video Collection at SecurityTube.net: http://www.securitytube.net "
'via Blog this'
"This video is part of the Infosec Video Collection at SecurityTube.net: http://www.securitytube.net "
'via Blog this'
Sunday, July 22, 2012
Carney: Seek balance in a new pain-pill law
Carney: Seek balance in a new pain-pill law: Last week, a grand jury in Suffolk County released a report showing a dramatic increase in arrests and overdose deaths related to prescription painkillers there.
Demise of American Pain Foundation Can Help End the Opioid Lunacy | American News Report
Who sponsored this...
Demise of American Pain Foundation Can Help End the Opioid Lunacy | American News Report:
In the lunacy of the over-prescribing of opioids for all levels of pain in the U.S. and Canada, there is now a large dose of sanity. That sanity is an organization called Physicians for Responsible Opioid Prescribing (PROP). Their mission is to reduce morbidity and mortality from opioids and to promote cautious, safe, and responsible opioid prescribing practices
Demise of American Pain Foundation Can Help End the Opioid Lunacy | American News Report:
In the lunacy of the over-prescribing of opioids for all levels of pain in the U.S. and Canada, there is now a large dose of sanity. That sanity is an organization called Physicians for Responsible Opioid Prescribing (PROP). Their mission is to reduce morbidity and mortality from opioids and to promote cautious, safe, and responsible opioid prescribing practices
A severe and growing shortage of physicians willing to prescribe morphine and related opioid analgesics
There is a Pain Crisis in America. Its primary manifestation is the routine and widespread under-treatment of pain, especially chronic, non-cancer pain. Other manifestations include a severe and growing shortage of physicians willing to prescribe morphine and related opioid analgesics, the widespread use of more toxic and less efficacious classes of medications in an effort to avoid opioids, and the profound distortion of medical education and of the doctor-patient relationship.
Oldest Civilization may be in Antarctica
Oldest Civilization may be in Antarctica
"In 1949 the joint British-Swedish expedition conducted a thorough seismic exploration of the southernmost continent through the thick ice. The results coincided with the map of Reis. However, it was a mystery how the map data were to agree with the level of science of 1513."
'via Blog this'
"In 1949 the joint British-Swedish expedition conducted a thorough seismic exploration of the southernmost continent through the thick ice. The results coincided with the map of Reis. However, it was a mystery how the map data were to agree with the level of science of 1513."
'via Blog this'
Friday, July 20, 2012
CSA 1987
"COMPUTER SECURITY ACT OF 1987
Public Law 100-235 (H.R. 145)
January 8, 1988"
'via Blog this'
http://www.youtube.com/watch?v=2TaMepzJPP0&feature=youtu.be
Public Law 100-235 (H.R. 145)
January 8, 1988"
'via Blog this'
http://www.youtube.com/watch?v=2TaMepzJPP0&feature=youtu.be
Bank Sues Customer Over ACH/Wire Fraud
Bank Sues Customer Over ACH/Wire Fraud
Last week, a federal appellate court reversed a lower court's ruling in the ACH/wire fraud dispute between PATCO Construction Inc. and the former Ocean Bank, which is now part of People's United.
Last week, a federal appellate court reversed a lower court's ruling in the ACH/wire fraud dispute between PATCO Construction Inc. and the former Ocean Bank, which is now part of People's United.
Sunday, July 15, 2012
Vizio Demo — Just another WordPress site
Vizio Demo — Just another WordPress site:
Another Post with Everything In It
Lorem ipsum dolor sit amet, consectetuer adipiscing elit. Curabitur quam augue, vehicula quis, tincidunt vel, varius vitae, nulla. Sed convallis orci.
Another Post with Everything In It
Lorem ipsum dolor sit amet, consectetuer adipiscing elit. Curabitur quam augue, vehicula quis, tincidunt vel, varius vitae, nulla. Sed convallis orci.
Saturday, July 14, 2012
Problem loading page
https://d33ds.co/archive/yahoo-disclosure.txt
Apparently not there. Trying pastebin.
Apparently not there. Trying pastebin.
Friday, July 13, 2012
Govts should focus on cybersecurity education, not militarization | ZDNet
Govts should focus on cybersecurity education, not militarization | ZDNet:
Governments should spend more time and effort educating citizens and other countries on existing online threats and forge partnerships with private sector organizations rather than militarize the cyber arena.
According to Yaacob Ibrahim, Singapore's minister for information
Governments should spend more time and effort educating citizens and other countries on existing online threats and forge partnerships with private sector organizations rather than militarize the cyber arena.
According to Yaacob Ibrahim, Singapore's minister for information
DarkComet shut-down shows law enforcement works - CSO Online - Security and Risk
DarkComet shut-down shows law enforcement works - CSO Online - Security and Risk
"DarkComet made headlines in February, when it was used in siphoning information from the computers of Syrian activists opposed to dictator Bashar al-Assad,"
'via Blog this'
"DarkComet made headlines in February, when it was used in siphoning information from the computers of Syrian activists opposed to dictator Bashar al-Assad,"
'via Blog this'
Trojan Downloader Determines OS, Infects Systems With Custom Malware | threatpost
Trojan Downloader Determines OS, Infects Systems With Custom Malware | threatpost
"A new downloader uncovered by researchers at the Finnish security firm F-Secure is capable of sniffing out which operating system a user is running and infecting them with a custom malicious payload."
'via Blog this'
"A new downloader uncovered by researchers at the Finnish security firm F-Secure is capable of sniffing out which operating system a user is running and infecting them with a custom malicious payload."
'via Blog this'
Dark Comet RAT Tailored For Attacks On Gamers, Governments | threatpost
Dark Comet RAT Tailored For Attacks On Gamers, Governments | threatpost
"Researchers analyzing the Dark Comet remote access Trojan (RAT) program say that data from more than 400 campaigns suggests the malicious program is being used for a wide range of jobs, from attacks on online gamers, to potential hacks of air force bases and government Web sites."
'via Blog this'
"Researchers analyzing the Dark Comet remote access Trojan (RAT) program say that data from more than 400 campaigns suggests the malicious program is being used for a wide range of jobs, from attacks on online gamers, to potential hacks of air force bases and government Web sites."
'via Blog this'
Wednesday, July 11, 2012
Audio to Text - Speechpad
Audio to Text - Speechpad
Speechpad specializes in converting audio to text to create a high value document that can be read, searched and archived.
Speechpad specializes in converting audio to text to create a high value document that can be read, searched and archived.
NSA: Cybercrime is 'the greatest transfer of wealth in history' | ZDNet
NSA: Cybercrime is 'the greatest transfer of wealth in history' | ZDNet
The director of the National Security Agency (NSA) has called cybercrime "the greatest transfer of wealth in history." As such, he urged politicians and the American population in general to support cybersecurity legislation being pushed through Congress.
The director of the National Security Agency (NSA) has called cybercrime "the greatest transfer of wealth in history." As such, he urged politicians and the American population in general to support cybersecurity legislation being pushed through Congress.
Online Text to Speech Synthesizer
Online Text to Speech Synthesizer:
"You can quickly share the sound and text you entered by copying the generated link and pasting it somewhere."
'via Blog this'
"You can quickly share the sound and text you entered by copying the generated link and pasting it somewhere."
'via Blog this'
The NSA Is Building the Country's Biggest Spy Center (Watch What You Say) | Threat Level | Wired.com
The NSA Is Building the Country's Biggest Spy Center (Watch What You Say) | Threat Level | Wired.com:
"In the process—and for the first time since Watergate and the other scandals of the Nixon administration—the NSA has turned its surveillance apparatus on the US and its citizens"
'via Blog this'
"In the process—and for the first time since Watergate and the other scandals of the Nixon administration—the NSA has turned its surveillance apparatus on the US and its citizens"
'via Blog this'
NSA Chief Denies Wired's Domestic Spying Story (Fourteen Times) In Congressional Hearing - Forbes
NSA Chief Denies Wired's Domestic Spying Story (Fourteen Times) In Congressional Hearing - Forbes:
"if Dick Cheney were elected president and wanted to detain and incessantly waterboard every American who sent an email making fun of his well-known hunting mishaps, what I’d like to know is, does the NSA have the technological capacity to identify those Cheney bashers based upon the content of their emails?"
'via Blog this'
"if Dick Cheney were elected president and wanted to detain and incessantly waterboard every American who sent an email making fun of his well-known hunting mishaps, what I’d like to know is, does the NSA have the technological capacity to identify those Cheney bashers based upon the content of their emails?"
'via Blog this'
NSA Chief: Cybercrime constitutes the “greatest transfer of wealth in history” | The Cable
NSA Chief: Cybercrime constitutes the “greatest transfer of wealth in history” | The Cable: But the real threat on the Internet will come when cyber attacksbecome militarized, a threat the U.S. must deal with now, he said.
Google May Pay $22.5 Million in FTC Privacy Settlement - Security - News & Reviews - eWeek.com
Google May Pay $22.5 Million in FTC Privacy Settlement - Security - News & Reviews - eWeek.com: "Google and the Federal Trade Commission are reportedly close to a settlement regarding charges Google circumvented privacy settings in the Apple Safari Web browser."
'via Blog this'
'via Blog this'
Download Blue Cat's Phaser by Blue Cat Audio
Download Blue Cat's Phaser by Blue Cat Audio
"Modeled after vintage analog phaser circuits, Blue Cat's Phaser reproduces this old vintage phasing effect that you can find on so many recording"
'via Blog this'
"Modeled after vintage analog phaser circuits, Blue Cat's Phaser reproduces this old vintage phasing effect that you can find on so many recording"
'via Blog this'
Over 90 Free VST Effects Plugins
Over 90 Free VST Effects Plugins
"VST plugins can add power and flexibility to your digital audio workstation."
'via Blog this'
"VST plugins can add power and flexibility to your digital audio workstation."
'via Blog this'
Monday, July 9, 2012
Free text to speech software with naturally sounding voices -- Free NaturalReader
Free text to speech software with naturally sounding voices -- Free NaturalReader:
"NaturalReader is a Text to Speech software with natural sounding voices. This easy to use software can convert any written text such as MS Word, Webpage, PDF files, and Emails into spoken words."
'via Blog this'
"NaturalReader is a Text to Speech software with natural sounding voices. This easy to use software can convert any written text such as MS Word, Webpage, PDF files, and Emails into spoken words."
'via Blog this'
Acapela Text to Speech Demo
Acapela Text to Speech Demo: "For demo and evaluation purpose only, for commercial use of generated sound files please go to www.acapela-box.com "
'via Blog this'
'via Blog this'
Online Text to Speech Synthesizer
Online Text to Speech Synthesizer
"This online application converts text into speech.
You may write anything into the text field and press the blue speak button at the bottom left. "
'via Blog this'
"This online application converts text into speech.
You may write anything into the text field and press the blue speak button at the bottom left. "
'via Blog this'
Saturday, July 7, 2012
Pena Nieto Bets on Pablo Escobar Nemesis to Win Mexico Drug War - Businessweek
Pena Nieto Bets on Pablo Escobar Nemesis to Win Mexico Drug War - Businessweek:
Drug War ‘Disaster’ -- “It’s a disaster,” said Suarez-Mier, who representedMexico’s attorney general when the Merida Initiative, a three-year, $1.6 billion anti-narcotics program funded by the U.S.,was signed in 2008. “When you decapitate a cartel, they tend tofracture and now we have more cartels that are more violent.”
Drug War ‘Disaster’ -- “It’s a disaster,” said Suarez-Mier, who representedMexico’s attorney general when the Merida Initiative, a three-year, $1.6 billion anti-narcotics program funded by the U.S.,was signed in 2008. “When you decapitate a cartel, they tend tofracture and now we have more cartels that are more violent.”
U.S. pressures companies to report cybercrime – USATODAY.com
U.S. pressures companies to report cybercrime – USATODAY.com
Wyndham did not report the break-in in corporate filings even though the U.S. Securities and Exchange Commission wants companies to inform investors of cybercrimes.
Wyndham did not report the break-in in corporate filings even though the U.S. Securities and Exchange Commission wants companies to inform investors of cybercrimes.
Friday, July 6, 2012
Novel observations in hereditary hemochromatosis: potential implications for clinical strategies
Novel observations in hereditary hemochromatosis: potential implications for clinical strategies
raises the possibility that compensatory mechanisms exist to partially offset the hepcidin-mediated effects on dietary iron absorption in hereditary hemochromatosis patients with elevated transferrin saturation.
raises the possibility that compensatory mechanisms exist to partially offset the hepcidin-mediated effects on dietary iron absorption in hereditary hemochromatosis patients with elevated transferrin saturation.
Thursday, July 5, 2012
Cybercriminals Sniff Out Vulnerability - WSJ.com
Cybercriminals Sniff Out Vulnerability - WSJ.com
With cybercriminals a greater threat to small businesses than ever before, more entrepreneurs like Lloyd Keilson are left asking themselves who is to blame for hacking attacks that drain their business accounts.
With cybercriminals a greater threat to small businesses than ever before, more entrepreneurs like Lloyd Keilson are left asking themselves who is to blame for hacking attacks that drain their business accounts.
Find and Call: Leak and Spam - Securelist
Find and Call: Leak and Spam - Securelist:
The application is called ‘Find and Call’ and can be found in both the iOS Apple App Store and Android’s Google Play.
The application is called ‘Find and Call’ and can be found in both the iOS Apple App Store and Android’s Google Play.
Wednesday, July 4, 2012
Vegas Pro 11 Overview
Vegas Pro 11 Overview
"an efficient, intuitive and integrated content creation environment for video and broadcast professionals."
'via Blog this'
"an efficient, intuitive and integrated content creation environment for video and broadcast professionals."
'via Blog this'
Tuesday, July 3, 2012
Glyde – Your Online Garage Sale | Culture Milk
Glyde – Your Online Garage Sale | Culture Milk:
Of course, Glyde sells the actual product for a higher price, but the money you actually make through them is higher than any other service.
Of course, Glyde sells the actual product for a higher price, but the money you actually make through them is higher than any other service.
Make an Old Computer Your Home Security System | SecurityNewsDaily.com
Make an Old Computer Your Home Security System | SecurityNewsDaily.com:
Setting up a home camera security system on an old computer is easier than it seems, said Robert Siciliano, a security and ID theft expert based in Boston.
Setting up a home camera security system on an old computer is easier than it seems, said Robert Siciliano, a security and ID theft expert based in Boston.
BBB teaches best back-to-school lesson: How students can avoid identity theft - DailyFinance
BBB teaches best back-to-school lesson: How students can avoid identity theft - DailyFinance:
College students have enough to worry about without falling prey to scammers looking to steal their identities and good credit.
College students have enough to worry about without falling prey to scammers looking to steal their identities and good credit.
Sunday, July 1, 2012
Group makes final push to rid DNSChanger infections - SC Magazine
Group makes final push to rid DNSChanger infections - SC Magazine
Despite months of warnings, 303,867 machines worldwide remain infected with DNSChanger malware
Despite months of warnings, 303,867 machines worldwide remain infected with DNSChanger malware
Stuxnet Will Come Back to Haunt Us - NYTimes.com
Stuxnet Will Come Back to Haunt Us - NYTimes.com
The decision by the United States and Israel to develop and then deploy the Stuxnet computer worm against an Iranian nuclear facility late in George W. Bush’s presidency marked a significant and dangerous turning point in the gradual militarization of the Internet.
The decision by the United States and Israel to develop and then deploy the Stuxnet computer worm against an Iranian nuclear facility late in George W. Bush’s presidency marked a significant and dangerous turning point in the gradual militarization of the Internet.
Back-to-School Shopping? Avoid ATM Scams
Many shoppers are opting to use a debit card to pay for those purchases, increasing the potential of becoming a victim of various high tech scams.
Back-to-School Shopping? Avoid ATM Scams - MetroFamily Magazine - August 2011 - Oklahoma City, OK:
Back-to-School Shopping? Avoid ATM Scams - MetroFamily Magazine - August 2011 - Oklahoma City, OK:
Credit, ATM and Debit Cards: What to do if They're Lost or Stolen
Credit, ATM and Debit Cards: What to do if They're Lost or Stolen
Your liability under federal law for unauthorized use of your ATM or debit card depends on how quickly you report the loss.
Your liability under federal law for unauthorized use of your ATM or debit card depends on how quickly you report the loss.
Information Technology: Edu phishing example
Information Technology: A scam first reported on May 14th of this year has returned. This time, an e-mail allegedly from Sarah Williams at the HelpDesk, includes a request for personal information (Username, Password, Address, and Department).
Amid Back-To-School Season, Feds Warn About ID Theft Scams Targeting Kids
Amid Back-To-School Season, Feds Warn About ID Theft Scams Targeting Kids
But federal authorities are warning parents that back-to-school season is actually a risky time of year when it comes to the potential for young people to become targeted by identity thieves.
But federal authorities are warning parents that back-to-school season is actually a risky time of year when it comes to the potential for young people to become targeted by identity thieves.
How Amazon Saved My Life - IndieReader
How Amazon Saved My Life - IndieReader:
Did I cry over some of these rejections? Absolutely. Did I feel inadequate, untalented, hurt? Yes. Did I doubt my ability to craft a story that readers could fall in love with? You bet.
Did I cry over some of these rejections? Absolutely. Did I feel inadequate, untalented, hurt? Yes. Did I doubt my ability to craft a story that readers could fall in love with? You bet.
Subscribe to:
Posts (Atom)