Why the GOP Should Fear a Romney Presidency - Jack M. Balkin - The Atlantic:
if Obama loses, the president who finally unravels Reaganism could turn out to be Mitt Romney.
Just a basic blog—snagging random stuff that catches our eye—nothing else, really...
Tuesday, October 30, 2012
Sunday, October 28, 2012
Infosecurity - Consumer loyalty depends on privacy and data security, survey finds
Infosecurity - Consumer loyalty depends on privacy and data security, survey finds:
Consumers are taking privacy and security into account more often when making purchasing decisions, would consider leaving companies in the wake of a data breach incident, and measure corporate reputation based on these issues, according to a survey by public relations firm Edelman.
Consumers are taking privacy and security into account more often when making purchasing decisions, would consider leaving companies in the wake of a data breach incident, and measure corporate reputation based on these issues, according to a survey by public relations firm Edelman.
Wednesday, October 24, 2012
IRS policies help fuel tax refund fraud, officials say - CNN.com
IRS policies help fuel tax refund fraud, officials say - CNN.com:
"It's like the federal government is putting crack cocaine in candy machines," said Detective Craig Catlin of the North Miami Beach, Florida, Police Department. "It's that easy."
"It's like the federal government is putting crack cocaine in candy machines," said Detective Craig Catlin of the North Miami Beach, Florida, Police Department. "It's that easy."
Tuesday, October 23, 2012
Chrome Web Store - PhishAri
Chrome Web Store - PhishAri:
PhishAri is a Twitter application which detects phishing tweets in realtime.
PhishAri is a Twitter application which detects phishing tweets in realtime.
Paterva / Maltego
Paterva / Maltego:
Maltego is a unique platform developed to deliver a clear threat picture to the environment that an organization owns and operates.
Maltego is a unique platform developed to deliver a clear threat picture to the environment that an organization owns and operates.
Monday, October 22, 2012
Presentations by CAIDA
Presentations by CAIDA:
Awesome collection of research: Presentations by CAIDA personnel and collaborators are available for download below (UCSD)
Awesome collection of research: Presentations by CAIDA personnel and collaborators are available for download below (UCSD)
3 Tools to Scan the File System With Custom Malware Signatures
3 Tools to Scan the File System With Custom Malware Signatures:
ClamAV is a free antivirus engine. Its Unix version allows the user to create custom signatures for files based not only on their cryptographic hash, but also to fingerprint file sections, match specific byte sequences, use wildcards, and combine signatures according to Boolean rules.
ClamAV is a free antivirus engine. Its Unix version allows the user to create custom signatures for files based not only on their cryptographic hash, but also to fingerprint file sections, match specific byte sequences, use wildcards, and combine signatures according to Boolean rules.
yara-project - A malware identification and classification tool - Google Project Hosting
yara-project - A malware identification and classification tool - Google Project Hosting:
YARA is a tool aimed at helping malware researchers to identify and classify malware samples. With YARA you can create descriptions of malware families based on textual or binary patterns contained on samples of those families
YARA is a tool aimed at helping malware researchers to identify and classify malware samples. With YARA you can create descriptions of malware families based on textual or binary patterns contained on samples of those families
Google And Android To Move From Running Your Mobile Devices To Driving Your Cars? - Tapscape
Google And Android To Move From Running Your Mobile Devices To Driving Your Cars? - Tapscape:
Google isn’t just interested in dominating the information super highway by having a tight grip on the internet and the mobile device market via their Android devices. They also want to rule actual concrete-and-asphalt roads by filling them with Google driverless cars running on a combination of existing sensor technology and several homegrown platforms.
Google isn’t just interested in dominating the information super highway by having a tight grip on the internet and the mobile device market via their Android devices. They also want to rule actual concrete-and-asphalt roads by filling them with Google driverless cars running on a combination of existing sensor technology and several homegrown platforms.
Many Android apps from Google Play security-challenged
Many Android apps from Google Play security-challenged:
German university researchers have found hundreds of popular Android apps in the Google Play market that leave 10s of millions of users vulnerable to attackers looking to steal banking credentials, credit card numbers and other personal information.
German university researchers have found hundreds of popular Android apps in the Google Play market that leave 10s of millions of users vulnerable to attackers looking to steal banking credentials, credit card numbers and other personal information.
IRS pays billions in refunds to identity thieves - Aug. 2, 2012
IRS pays billions in refunds to identity thieves - Aug. 2, 2012:
IRS attributed the increase in tax fraud to a number of issues, including an increase in electronic filing, higher dollar amounts of refundable credits and a growing number of people using debit cards to receive refunds.
IRS attributed the increase in tax fraud to a number of issues, including an increase in electronic filing, higher dollar amounts of refundable credits and a growing number of people using debit cards to receive refunds.
IRS pays billions in refunds to identity thieves - Aug. 2, 2012
IRS pays billions in refunds to identity thieves - Aug. 2, 2012:
It attributed the increase in tax fraud to a number of issues, including an increase in electronic filing, higher dollar amounts of refundable credits and a growing number of people using debit cards to receive refunds.
It attributed the increase in tax fraud to a number of issues, including an increase in electronic filing, higher dollar amounts of refundable credits and a growing number of people using debit cards to receive refunds.
China cracks hacking syndicate | ZDNet
China cracks hacking syndicate | ZDNet:
Chinese police have detained a gang of hackers, certificate forgers, and personal data collectors, believed to be responsible for attacks on 185 government Web sites to manufacture and sell fake certificates ranging from medical care to financial services.
Chinese police have detained a gang of hackers, certificate forgers, and personal data collectors, believed to be responsible for attacks on 185 government Web sites to manufacture and sell fake certificates ranging from medical care to financial services.
6 Ways to Add Twitter to Your WordPress Site
6 Ways to Add Twitter to Your WordPress Site:
This article will cover various ways to merge your Twitter presence with your website, and thus, maximize opportunities to relate to your web audience.
This article will cover various ways to merge your Twitter presence with your website, and thus, maximize opportunities to relate to your web audience.
Sabu - The FBI's most valuable hacker — RT
Sabu - The FBI's most valuable hacker — RT:
In the nine months since the FBI busted the hacker known as Sabu for his roles with LulzSec and Anonymous, authorities say he worked all hours of the night to help them nab others within the group.
In the nine months since the FBI busted the hacker known as Sabu for his roles with LulzSec and Anonymous, authorities say he worked all hours of the night to help them nab others within the group.
25% of Americans Were Victims of Security Breaches in Past Year
25% of Americans Were Victims of Security Breaches in Past Year:
One in four consumers in the United States had personal identification lost or stolen due to a data breach in the past year, a new study suggests.
One in four consumers in the United States had personal identification lost or stolen due to a data breach in the past year, a new study suggests.
Officials say Chinese spies have targeted every sector of the U.S. economy - Rock Center with Brian Williams
Officials say Chinese spies have targeted every sector of the U.S. economy - Rock Center with Brian Williams:
The Chinese are playing dirty in the international spy game, according to current and former intelligence officials at the highest levels of government.
The Chinese are playing dirty in the international spy game, according to current and former intelligence officials at the highest levels of government.
China busts 700 cybercriminal gangs | ZDNet
China busts 700 cybercriminal gangs | ZDNet:
A country-wide Web policing campaign led by China's Ministry of Public Security has dealt a blow to 700 cybercriminal gangs in the country.
A country-wide Web policing campaign led by China's Ministry of Public Security has dealt a blow to 700 cybercriminal gangs in the country.
U.K. to probe Huawei, BT relationship over security concerns | ZDNet
U.K. to probe Huawei, BT relationship over security concerns | ZDNet:
The relationship between embattled Chinese telecoms equipment maker Huawei, and the U.K.'s largest telecoms company British Telecom (BT) will be investigated by the U.K. Parliament's intelligence and security committee.
The relationship between embattled Chinese telecoms equipment maker Huawei, and the U.K.'s largest telecoms company British Telecom (BT) will be investigated by the U.K. Parliament's intelligence and security committee.
Common WordPress Malware Infections — Smashing WordPress
Common WordPress Malware Infections — Smashing WordPress:
WordPress security is serious business. Exploits of vulnerabilities in WordPress’ architecture have led to mass compromises of servers through cross-site contamination.
WordPress security is serious business. Exploits of vulnerabilities in WordPress’ architecture have led to mass compromises of servers through cross-site contamination.
Friday, October 19, 2012
Ranking America
Ranking America: "According to UNICEF, 23.1% of American children under the age of seventeen live in poverty, which makes the United States rank second out of thirty-five economically advanced countries ranked in that category. Romania ranks first, with 25.5% of children living in poverty."
'via Blog this'
'via Blog this'
Billing Records Mixed with Recyclables Causes Breach - HDM Latest News Article
Billing Records Mixed with Recyclables Causes Breach - HDM Latest News Article:
A mix-up by a janitorial services firm has resulted in a major data breach at a 19-member radiology group practice in Springfield, Mo.
A mix-up by a janitorial services firm has resulted in a major data breach at a 19-member radiology group practice in Springfield, Mo.
Snooping Gets Employees Fired at Akron General - HDM Latest News Article
Snooping Gets Employees Fired at Akron General - HDM Latest News Article:
Akron General Medical Center in Ohio has terminated a “few” employees for snooping in the electronic health records system following the shooting death
Akron General Medical Center in Ohio has terminated a “few” employees for snooping in the electronic health records system following the shooting death
Thursday, October 18, 2012
Free Online Tools for Looking Up Potentially Malicious Websites
Free Online Tools for Looking Up Potentially Malicious Websites:
"Several organizations offer free on-line tools for looking up a potentially malicious website."
'via Blog this'
"Several organizations offer free on-line tools for looking up a potentially malicious website."
'via Blog this'
Wednesday, October 17, 2012
Respondents were asked if they kept PII in a secure location
Demographics-Study.pdf (application/pdf Object)
http://www.laresinstitute.com/wp-content/uploads/2011/09/Demographics-Study.pdf
Respondents were asked if they kept PII in a secure location in their home, and overall 76% did,
and 24% did not, and interestingly, people with no college degree were more likely to keep their
information in a secure location than those that had a college or post-graduate degree.
http://www.laresinstitute.com/wp-content/uploads/2011/09/Demographics-Study.pdf
Respondents were asked if they kept PII in a secure location in their home, and overall 76% did,
and 24% did not, and interestingly, people with no college degree were more likely to keep their
information in a secure location than those that had a college or post-graduate degree.
Follow-Up Test: 1999 BMW 323i Sport
Follow-Up Test: 1999 BMW 323i Sport
The new 3 Series upholds the BMW tradition of stellar handling and makes a strong argument for the inherent balance of a finely tuned rear-drive car.
The new 3 Series upholds the BMW tradition of stellar handling and makes a strong argument for the inherent balance of a finely tuned rear-drive car.
Sunday, October 14, 2012
House Is Gone but the Debt Lives On - WSJ.com
House Is Gone but the Debt Lives On - WSJ.com:
The result was a foreclosure hangover that homeowners rarely anticipate but increasingly face: a "deficiency judgment."
The result was a foreclosure hangover that homeowners rarely anticipate but increasingly face: a "deficiency judgment."
Saturday, October 13, 2012
Tuesday, October 9, 2012
Successful cyberattacks driving up cost of cybercrime, study finds
Successful cyberattacks driving up cost of cybercrime, study finds
Cyberattacks on organizations have more than doubled over a three-year period, driving up the costs associated with fallout from the attacks, according to a new study conducted by the Ponemon Institute.
Cyberattacks on organizations have more than doubled over a three-year period, driving up the costs associated with fallout from the attacks, according to a new study conducted by the Ponemon Institute.
Cyber crime costs UK organisations Q2.1m a year
Cyber crime costs UK organisations Q2.1m a year:
Cyber crime costs UK organisations an average of Q2.1m a year each, according to the 2012 Cost of Cyber Crime study by the Ponemon Institute.
Cyber crime costs UK organisations an average of Q2.1m a year each, according to the 2012 Cost of Cyber Crime study by the Ponemon Institute.
New Research Shows Cybercrime Costs Have Increased Nearly 40 Percent - HotHardware
New Research Shows Cybercrime Costs Have Increased Nearly 40 Percent - HotHardware:
The third-annual Cost of Cyber Crime Study shows the occurrence of cyberattacks has more than doubled since 2010. The cost of the attacks has increased by nearly 40 percent over the same three year period.
The third-annual Cost of Cyber Crime Study shows the occurrence of cyberattacks has more than doubled since 2010. The cost of the attacks has increased by nearly 40 percent over the same three year period.
Monday, October 8, 2012
Lit Motors Will Shake Up The Electric Vehicle Market With Its Two-Wheeled, Untippable C-1 | TechCrunch
Lit Motors Will Shake Up The Electric Vehicle Market With Its Two-Wheeled, Untippable C-1 | TechCrunch: What you get is Lit Motors‘ C-1, the world’s first gyroscopically stabilized, two-wheeled all-electric vehicle,
Subscribe to:
Posts (Atom)