Just a basic blog—snagging random stuff that catches our eye—nothing else, really...
Tuesday, December 31, 2013
Jesse Willms, the Dark Lord of the Internet - Atlantic Mobile
Regulatory authorities like the FTC are undermanned; courts seem reluctant to punish offenders; and worse yet, even the sheriffs we believe are imposing order online—Google, Yahoo, Microsoft—often end up providing scammers with a platform for deception.
From My iPhone
Covert action in Colombia | The Washington Post
And, as a drug-trafficking organization, the FARC's status as a threat to U.S. national security had been settled years earlier with Reagan's counternarcotics finding. At the time, the crack cocaine epidemic was at its height, and the government decided that organizations that brought drugs to America's streets were a threat to national security.
From My iPhone
Sunday, December 29, 2013
This Flying Ambulance May Save Wounded Soldiers from Certain Death
The AirMule's fully-ducted fans make it unique among UAV's. Since the rotors are protected from obstacles and debris, the AirMule will be able to easily and safely operate within urban environments—something that neither traditional propeller or rotor-driven UAVs can do.
http://gizmodo.com/this-flying-ambulance-may-save-wounded-soldiers-from-ce-1484258226
Susan Rice: NSA Officials Didn’t Lie, They ‘Inadvertently Made False Representations’ | Mediaite
"There are many things we do in intelligence that, if revealed, would have the potential for all kinds of blowback," Clapper told a House panel on October
From My iPhone
Saturday, December 28, 2013
China jails World of Warcraft cybercrime group — RT News
A real prison term for selling gold and guns in the online game World of Warcraft? Easy answer: ten men have been sentenced to up to two years behind bars in China for taking over 11,500 World of Warcraft accounts.
From My iPhone
Friday, December 27, 2013
Weird link bill on cyber tools
(1) To identify the intelligence, law enforcement, and financial sanctions tools that can and should be used to suppress the trade in cyber tools and infrastructure that are or can be used for criminal, terrorist, or military activities while preserving the ability of governments and the private sector to use such tools for legitimate purposes of self-defense.
http://www.opencongress.org/bill/hr3304-113/text?version=enr&nid=t0:enr:3326
Thursday, December 26, 2013
Rep. Jack Kingston Proposes That Poor Students Sweep Floors In Exchange For Lunch
I had to watch the video to believe he is a real person who really said that and not a satirist.
http://www.huffingtonpost.com/2013/12/18/jack-kingston-school-lunch_n_4467711.html
Wednesday, December 25, 2013
CIA, FBI, NSA, differents agencies for an unique intent...global monitoring - Security Affairs
From May, 2012: The FBI has recently created a secret surveillance unit to project and develop technologic tools and software for Internet and wireless communications monitoring.
The National Security Agency’s oversharing problem | Ars Technica
Ars talks to an ex-NSA pro who filed unlawful sharing complaints—only to be shunned.
From My iPhoneSunday, December 22, 2013
Device Identification & Device Fingerprinting | iovation
https://www.iovation.com/risk-management/device-identification
WANT TO MEET A BILLION DEVICES?
We can already give you the lowdown on 1.5 billion of them. In many cases, what appears to be a new device to you is not a new device to iovation. In fact, we've already seen and re-recognized the originating device for 84 percent of all transactions deemed fraudulent at our customers' sites. And we're meeting more devices—and learning more about them—all the time
Counterfeit wine: A vintage crime - CBS News
He says he has spent $4.5 million on 421 bottles of wine that turned out to be counterfeit. "So it's a pretty big swindle."
Saturday, December 21, 2013
Friday, December 20, 2013
"what is an oyster flight" - Google Search
Seriously, am I the first person to ask this question?
From My iPhone
Meet the contractors analyzing your private data - Salon.com
Private companies are getting rich probing your personal information for the government. Call it Digital Blackwater
Looking back at NSA revelations since the Snowden leaks | PBS NewsHour | Dec. 12, 2013 | PBS
MARGARET WARNER: The boxy, one million-square-foot complex rising from the Utah desert outside Salt Lake City, ringed by heavy security and code-named Bumblehive, is the latest data mining center of the National Security Agency, or NSA.
From My iPhone
Business Insider
Seven months had passed since they'd launched an undercover operation against a suspected Chinese arms-trafficking network - one of scores operating in support of Beijing's ambitious military expansion into outer space.
From My iPhone
Custom Square Coated Board Coaster (16pt.) with Logo
PrintGlobe | Custom Beer Coasters | Branded Beer Coasters
Get your brand recognized at your next important event or function with custom beer coasters.
From My iPhone
Saab Wins $4.5 Billion Brazil Order as Spat Hurts Boeing - Bloomberg
From My iPhone
Wednesday, December 18, 2013
There is no freedom without freedom of movement - Estonian World
British prime minister David Cameron recently caused a furore when suggesting that in future, the immigration from poorer EU countries to the UK should be restricted, thus undermining and ignoring one of the fundamental EU principles – the free movement of workers. David Cameron also described the immigration from A8 (including Estonia) countries to the UK since 2004 as “a big mistake”. Adam Garrie argues why the prime minister is wrong on this.
Program for International Student Assessment (PISA) - Overview
Tuesday, December 17, 2013
A guide to enterprise iOS management: Features, devices and security
With the iPhone Configuration Utility, mobile device management (MDM) application program interfaces(APIs) for iOS, Apple Configurator and some new iOS 6 features that have IT in mind, iOS management is slowly getting easier. But it's not a breeze yet. Until the day that managing 1,000 iPads is a snap, consult this guide to enterprise iOS management.
From My iPhone
Monday, December 16, 2013
Se hela intervjun med Glenn Greenwald - Uppdrag Granskning | SVT.se
Glenn Greenwald: - Their goal, that they wake up every day to fulfill, is to ensure that all forms of human electronic communication, things that take place over the telephone, or over the internet, is collected by the NSA, and then stored, monitored and analyzed, so that there is no human communication that takes place, beyond the surveillance reach of the NSA. Ultimately that is the real revelation, of all of these documents.
From My iPhone
Coding Horror: Better Image Resizing
Bicubic image enlargement.
From My iPhone
MANHIGH II - (Simons) -1957-
During this flight, Simon's balloon achieved a world's altitude free balloon record of 101,516 feet (30,942 meters). For this achievement, he was awarded a certificate from the Federation Aeronautique Internationale. In 1962 Simons wrote a book about his experience entitled MANHIGH.
From My iPhone
Sunday, December 15, 2013
Leaked Documents Reveal Budget Breakdown Between CIA, NSA : NPR
Photo Enlargement
*limited only by computer memory
Saturday, December 14, 2013
hemochromatosis-fibromyalgia - Google Search
Prospective studies are needed to better understand the risk factors for FMS in such patients.
From My iPhone
High prevalence of fibromyalgia in pati - PubMed Mobile
CONCLUSIONS: This study reveals a high prevalence of FMS (43%) among subjects with HFE-related hemochromatosis. Prospective studies are needed to better understand the risk factors for FMS in such patients.
From My iPhone
Friday, December 13, 2013
Global Antivirus Software Package Market 2012-2016 with ESET LLC, Microsoft Corp., and... -- DUBLIN, Ireland, December 6, 2013 /PRNewswire/ --
Wednesday, December 11, 2013
Tuesday, December 10, 2013
Monday, December 9, 2013
On November 5, 1603, a man called Guy Fawkes
Killing off the leadership of a country is a classic tactic of extremists, fundamentalists, dictators, in short, anyone who wants to impose their agenda and belief system on a population. Examples from modern times include Khmer Rouge and the Nazis.
In recent years, in a massive collision
of irony and ignorance, some groups that advocate liberty and freedom have taken as their symbol a mask resembling guy Fawkes
From My iPhone
Sunday, December 8, 2013
Someone's Been Siphoning Data Through a Huge Security Hole in the Internet | Threat Level | Wired.com
UT Documents
Subsentio :: Home
Cryppies, Day Ladies, and Whiffling: The Just-Declassified Lingo of the NSA - Alexis C. Madrigal - The Atlantic
Saturday, December 7, 2013
SolarCity to Use Batteries From Tesla for Energy Storage - NYTimes.com
Compare to stop cap story on anti- solar Alec.
From My iPhone
Estonian Phrases and Common Sentences
http://linguanaut.com/english_estonian.htm
This page contains a table including the following: Estonian phrases, expressions and words in Estonian, conversation and idioms, Estonian greetings, and survival phrases. It also helps if you simply want to know what to say when chatting in Estonian!
Read more: http://linguanaut.com/english_estonian.htm#ixzz2mkKRLyVa
Thursday, December 5, 2013
Do Antivirus Companies Whitelist NSA Malware? - InformationWeek
I predict that in 2014 every major newspaper and magazine will perpetuate, to the detriment of data security and human understanding, the grossly erroneous notion that "for an antivirus firm to spot malware, it first needs to have seen the malware, recognized that it's malicious code, and written a corresponding virus signature for its products."
The fact that this is simply not true, and has not been true for many years, will not deter people from repeating it, over and over.
A bit like Autotrend saying that cars cannot be started without first engaging the crank handle.
Wall Street, investment bankers, and social good : The New Yorker
Wednesday, December 4, 2013
Tuesday, December 3, 2013
SkyJack - autonomous drone hacking
"Using a Parrot AR.Drone 2, a Raspberry Pi, a USB battery, an Alfa AWUS036H wireless transmitter, aircrack-ng, node-ar-drone, node.js, and my SkyJack software, I developed a drone that flies around, seeks the wireless signal of any other drone in the area..."
U.S. Loses Over $71 Billion in Religious Tax Exemptions | Center for Inquiry
http://www.centerforinquiry.net/newsroom/u.s._loses_over_71_billion_in_religious_tax_exemptions/
From My iPhone
Monday, December 2, 2013
Florida mom's photos used in more than 200 bogus Match.com profiles: $1.5 billion lawsuit - NY Daily News
Will of the WISP: Your company's Written Information Security Program
Here are some links to free information and samples that can help you tackle the WISP creation and implementation:
- Massachusetts Written Information Security Plan developed by Buchanan & Associates of Boston (.pdf)
- Common misconceptions about the Mass privacy law
- A Small Business Guide: Formulating A Comprehensive Written Information Security Program (.pdf)
- A Sample Information Security Policy from Advanced System Integrators (.pdf)
Edu: http://my.gwu.edu/files/policies/InformationSecurityPolicyFINAL.pdf
Most SMBs have no Information Security Policies
http://www.mass.gov/ocabr/docs/idtheft/sec-plan-smallbiz-guide.pdf
Information Security Policy and Procedures Manual
Information Security -�Office of Information Technology
Princeton University possesses information that is sensitive and valuable, e.g., personally identifiable information, financial data, building plans, research, and other information considered sensitive.
State Cyber and Information Security Policies
E.g. Alabama Department of Finance, Information Services Division
Information Security Policy
Saturday, November 30, 2013
A Letter From Concerned Scientists | Cyber War! | FRONTLINE | PBS
UT WILD Outdoor / Wilderness Black Utility Kilt - UT Kilts
Which Side of the Barricade Are You On? - Doug Sosnik - POLITICO Magazine
Thursday, November 28, 2013
Wednesday, November 27, 2013
Backlash by the Bay - Tech Riches Alter a City - NYTimes.com
'via Blog this'
Scotty Roberts on Eve's Secret Reptilian Descendants - JasonColavito.com
'via Blog this'
Academic Phrasebank
'via Blog this'
Monday, November 25, 2013
Hardware Encryption Market by Algorithms, Applications & Products - 2018 | MarketsandMarkets
Sunday, November 24, 2013
Saturday, November 23, 2013
Friday, November 22, 2013
What Is the Difference: Viruses, Worms, Trojans, and Bots? - Cisco Systems
Thursday, November 21, 2013
SilverSky’s Holiday Security Study: Can You Spot the Spoof? | SilverSky
Snowden leaks: NSA conducted 231 offensive cyber-ops in 2011, hailed as 'active defense' — RT USA
NSA failed to install anti-leak software at Snowden’s workplace - report — RT USA
EFF's guide to the NSA's official malware - Boing Boing
Tuesday, November 19, 2013
Holly Gilbert | Multimedia Journalist
'via Blog this'
Monday, November 18, 2013
One-quarter of mortgage settlement relief is from payments banks couldn’t collect, according to analysis - Capitol Report - MarketWatch
“This is a handout to the banks…Banks should never have been allowed to count deficiency judgment waivers or short sale forgiveness in non-recourse states. But they are, and they’re doing it in big numbers.”
FBI hacking squad used in domestic investigations, experts say - NBCNews.com
"It's hard for me to write a virus that will only capture your actions on a computer without also capturing your kids using it to do their homework or your daughter getting undressed in front of a Web camera," he said.
From My iPhone
Sunday, November 17, 2013
How to disarm an infrastructure hacker - E & T Magazine
Also, Bruce here:
http://www.networkworld.com/news/2012/061812-schneier-260303.html?page=2
and this
http://www.theregister.co.uk/2011/02/04/cyberwar_rules_of_engagement/
And
http://www.wired.com/threatlevel/2010/03/cyber-war-hype/
'via Blog this'
For Their Eyes Only: The Commercialization of Digital Spying
'via Blog this'
Think Again: Cyberwar - By Thomas Rid | Foreign Policy
'via Blog this'
Schneier on Security: The Threat of Cyberwar Has Been Grossly Exaggerated
'via Blog this'
Words Of War And Weakness: The Zero-Day Exploit Market
'via Blog this'
The Citizen Lab - University of Toronto
'via Blog this'
New Malware Brings Cyberwar One Step Closer | MIT Technology Review
'via Blog this'
The U.S. Senate Wants to Control Malware Like It's a Missile | Killer Apps
'via Blog this'
Japan develops malware cyberweapon | ZDNet
'via Blog this'
Cyber Weapon Friendly Fire: Chevron Stuxnet Fallout - Security -
'via Blog this'
Saturday, November 16, 2013
DHS-funded wi-fi devices used to collect personal data of Seattle residents - National Government | Examiner.com
Govt Documents Reveal DHS Domestic Spy Takeover Alex Jones' Infowars: There's a war on for your mind!
You Are a Rogue Device by Matt Fikse-Verkerk and Brendan Kiley - Seattle Features - The Stranger, Seattle's Only Newspaper
How the NSA and GCHQ Spied on OPEC - SPIEGEL ONLINE
NSA Still Not Sure What Snowden Took, But May Try To Pre-empt Future Leaks | Techdirt
Poll’s lesson for NSA: Show that surveillance programs actually combat terrorism - The Washington Post
Emerging DNA technology will impinge on privacy: civil liberties australia
Friday, November 15, 2013
Snowden, GCHQ and the launch of LCHR | Progress | News and debate from the progressive community
- See more at: http://www.progressonline.org.uk/2013/11/04/snowden-gchq-and-the-launch-of-lchr/#sthash.nSrlLqe9.dpuf
http://www.progressonline.org.uk/2013/11/04/snowden-gchq-and-the-launch-of-lchr/
From My iPhone
Germany challenges UK over legal basis of GCHQ mass monitoring of global internet traffic - Home News - UK - The Independent
"Let us be clear about it: in both our countries intelligence work takes place within a strong legal framework.
"We operate under the rule of law and are accountable for it. In some countries secret intelligence is used to control their people - in ours, it only exists to protect their freedoms."
From My iPhone
Thursday, November 14, 2013
Wednesday, November 13, 2013
Ian Stevenson’s Case for the Afterlife: Are We ‘Skeptics’ Really Just Cynics? | Bering in Mind, Scientific American Blog Network
Tuesday, November 12, 2013
Watch Episode 350: Active Defense | PaulDotCom Security Weekly TV Episodes | Tech & Gadgets Videos | Blip
'via Blog this'
Japan's Plan for 'Good Computer Virus' Sparks Debate | SecurityWeek.Com
Monday, November 11, 2013
Sunday, November 10, 2013
Saturday, November 9, 2013
Friday, November 8, 2013
Time for Internet Engineers to Fight Back Against the "Surveillance Internet" | MIT Technology Review
NSA Funding Bill Passed By Senate Intelligence Community Gives Agency Extra Cash To Hunt 'Insider Threats' | Techdirt Lite
Thursday, November 7, 2013
How to sign digital documents | Macworld
Launch Preview, open its preferences, and select the Signatures tab. Click the plus ( ) button at the bottom of the window.
Blogs | StaySafeOnline.org
Wednesday, November 6, 2013
Ian Stevenson’s Case for the Afterlife: Are We ‘Skeptics’ Really Just Cynics? | Bering in Mind, Scientific American Blog Network
Kaspersky Lab’s Policy on the Use of Software for the Purpose of State Surveillance | Kaspersky Lab US
Tuesday, November 5, 2013
Monday, November 4, 2013
Patent granted for Lit Motors C-1 gimbaled flywheel stabilization system - AutoblogGreen
From My iPhoneThis involves a pair of high-speed spinners that change speed and direction in response to what's happening with the vehicle.
Sunday, November 3, 2013
Saturday, November 2, 2013
Friday, November 1, 2013
Dear AV provider: Do you enable NSA spying? Yours, EFF | Ars Technica
The Electronic Frontier Foundation, security expert Bruce Schneier, and 23 others have called on antivirus providers around the world to protect their users against malware spawned by the National Security Agency and other groups that carry out government surveillance.
From My iPhone
MQ-1B crashes northwest of Holloman - Drones be crashing
Wednesday, October 30, 2013
8 fascinating trends in how American Jews think about Israel
• 40 percent of American Jews believe the land that is now Israel was given to the Jewish people by God.
Sunday, October 27, 2013
Time to End the 'War on Terror' (For Real) - James Fallows - The Atlantic
the reaction provoked by terrorist attacks was always more damaging than the original assault itself.
Thursday, October 24, 2013
Internet Security Essentials for Business 2.0 | U.S. Chamber of Commerce
Small businesses handle an array of sensitive information (e.g., customer data, financial records, and intellectual property) that warrants protection from bad actors. As larger companies improve their defenses and resilience against cyber threats, small businesses have become the low-hanging fruit for cyber criminals.
Tuesday, October 22, 2013
Lake Cuyamaca
ADP to Co-Host Second Annual Small Business Summit on Security, Privacy, and Trust | Small Business News, Tips, Advice - Small Business Trends
Amazon.com: Customer Reviews: Daiwa Mini System Minispin Ultralight Spinning Reel and Rod Combo in Hard Carry Case
On the lake. If you're fishing on a lake, take a clear plastic "bobber" and secure it to the end of the line with a swivel.
Monday, October 21, 2013
Take Action | newjimcrow.com
Sunday, October 20, 2013
Snowden left his NSA stockpile completely in the hands of journalists | The Verge
Survey: U.S. Students Aren't Being Guided Towards Cyber Security Careers - eSecurity Planet
Saturday, October 19, 2013
Perception Expression 11.5 Kayak with Skeg at REI.com
Designed for those ready to expand their skills, the Expression 11.5 effectively bridges the gap between a fun, maneuverable day-tripping kayak and a predictable touring model
Friday, October 18, 2013
World's most dramatic runways
All the more reason to book a flight touching down at one of these hairy or awesome air strips.
From My iPhone
Thursday, October 17, 2013
Tuesday, October 15, 2013
Study: Cybercrime Costs Grow 26%
"But a just-issued study on cybercrime by the Ponemon Institute provides a window into the cost of cybercrime."
'via Blog this'
Hotel SOLYMAR en J�vea / X�bia, Alicante en la Costa Blanca, Espa�a
the Hotel SOLYMAR is located in one of the most privileged areas of J�vea, in the Costa Blanca. It’s a small cosy and calm hotel. Situated at the first line of the beach of Javea and with the best views to enjoy of a lovely sunrise and dusk.
Monday, October 14, 2013
KDMS - Crawl out from under the rocks - Pastebin.com
'via Blog this'
Close encounter with Linux/Cdorked.A | Malware Reports | Stop Malvertising
Saturday, October 12, 2013
Friday, October 11, 2013
8 Apps and Gadgets to Keep Track of Your Child
"Parenting is tough to begin with, but add a smartphone-using, texting, emailing and Internet-surfing teen on top of that, and there's a whole new set of digital rules that apply."
'via Blog this'
Thursday, October 10, 2013
Open WhisperSystems >> Open WhisperSystems
Secure your communication with our mobile applications. It's that simple.
https://whispersystems.org/
From My iPhone
Tuesday, October 8, 2013
Cost of Cybercrime Escalates 78 Percent, Time to Resolve Attacks More Than Doubles
"2013 Cost of Cyber Crime Study found that the average annualized cost of cybercrime incurred by a benchmark sample of U.S. organizations was $11.56 million,"
'via Blog this'
Study: Cybercrime Costs Grow 26%
"A big challenge when attempting to drum up support for investments in information security is demonstrating the cost of data breaches and other cybercrimes. But because very few cyber-attack victims have revealed the costs involved, sizing up the potential financial impact is tough. And that can make it difficult to justify a hefty security investment."
'via Blog this'
ADP to Co-Host Second Annual Small Business Summit on Security, Privacy, and Trust | Small Business News, Tips, Advice - Small Business Trends
"The Summit, to be held from 8 a.m. to 1 p.m. EST on Wednesday, October 30, will take place at William Paterson University, 1600 Valley Road, Wayne, NJ."
'via Blog this'
Monday, October 7, 2013
Sunday, October 6, 2013
Thursday, October 3, 2013
Antivirus software often fails to thwart hackers
http://www.news-herald.com/general-news/20130930/antivirus-software-often-fails-to-thwart-hackers
From My iPhone
Tuesday, October 1, 2013
Monday, September 30, 2013
FireAMP Fights Malware with Big Data Analytics | PCWorld
In and of itself, FireAMP defies easy classification. It is a new type of security tool that does not fit easily into any standard categories like antivirus, or antispyware, or firewall. Yet, it seems to have some overlap with existing security tools to augment their capabilities.
Goodbye, Encryption; Hello, FOSS | Community | LinuxInsider
"I have a basic question: What is the privacy/security health of the Linux kernel (and indeed other FOSS OSes) given all the recent stories about the NSA going in and deliberately subverting various parts of the privacy/security sub-systems?"
US government is now the biggest buyer of malware, Reuters reports | The Verge
Former White House cybersecurity advisors Howard Schmidt and Richard Clarke say this move to "offensive" cybersecurity has left US companies and average citizens vulnerable, because it relies on the government collecting and exploiting critical vulnerabilities that have not been revealed to software vendors or the public.
Saturday, September 28, 2013
TAXII - News
MAEC - Use Cases
New MAPP Initiatives - Microsoft BlueHat Blog - Site Home - TechNet Blogs
Friday, September 27, 2013
Is the anti-virus industry in bed with the NSA – why do CIPAV, FinFisher and DaVinci still defeat AV? | Kevin Townsend
Without any evidence he says:
"Is the AV industry in bed with the NSA? The simple fact is that we just do not know. The industry itself denies it – but, well, it would, wouldn’t it? Statistically, since almost every other aspect of the security industry collaborates with or has been subverted by the NSA, my suspicion is that it is. At the very least, I suspect it engages in ‘tacit connivance’."
Gene Patent Ban Could Lead to More Genetic Tests - Alzheimer's Disease Center - Everyday Health
'via Blog this'
Impact of gene patents and licensing practices on ... [Genet Med. 2010] - PubMed - NCBI
'via Blog this'
Math Advances Raise the Prospect of an Internet Security Crisis | MIT Technology Review
'via Blog this'
Anti-Encryption Measures Free NSA to Access Web Data without Going to Providers | MIT Technology Review
'via Blog this'
The NSA Hasn’t “Cracked” Encryption—It’s Just Reminded Us of the Ways Around It | MIT Technology Review
'via Blog this'
Thursday, September 26, 2013
Former NSA chief: ‘Morally arrogant’ Snowden will probably become an alcoholic
"I welcome the debate, but I want the debate to be based on fact,"
Snowden Leaks, NSA Activities Complicate Push for Cybersecurity Law
“If we thought that information-sharing was moving slowly before, now it’s moving even more slowly,” a senior administration official said in an interview granted on condition of anonymity.
Gastromanagement Berlin | Lindenbr�u im Sony Center
Are you very hungry or do you have only appetite for something delicious – no problem - in our restaurant Lindenbr�u the cooking team offers a rich choice of regional dishes and Bavarian specialities
Grieving as an atheist: a surprising dilemma | Tiffany White | Comment is free | theguardian.com
"I started to realize that the life of an atheist was a tad bleak. The more I spoke, the darker the conversation became."
'via Blog this'
Empowering Information Sharing: Release of pyNSSFClient | CrowdStrike
One of the lesser-known facts about the computer security business is that vendors exchange malware samples with each other, often through mutual sharing arrangements.
Tuesday, September 24, 2013
Latest Stories | Columbia Journalism Review
http://m.cjr.org/303546/show/24bcfb1da2ce2373ce108861be3ea354/?
From My iPhone
Monday, September 23, 2013
Do Cyber Criminals target the Financial Services Industry? | BrightTALK
"Do Cyber Criminals target the Financial Services Industry?"
'via Blog this'
A unique approach to Advanced Threat Detection | Seculert
Because Seculert Echo is the only malware detection solution that intercepts and collects data from within live botnets. This unique approach has a number of advantages:
Singlemizer | Minimalist Duplicate Files Finder for OS X. Yet With Features
Singlemizer forms duplicates' list as files are identified. Feel free to work with the results while more files are being processed in background.
Sunday, September 22, 2013
UK's GCHQ blamed for cyber attack on Belgian telecoms company - Home News - UK - The Independent
Your Heartbeat Is Your New Password
Could New Tracking Codes on Medical Implants Save Lives?
Could New Tracking Codes on Medical Implants Save Lives?
From My iPhone
Saturday, September 21, 2013
Mobile malware no big deal
http://mobile.informationweek.com/80269/show/e0e19d5cb7eb6b93f9443236153da446/?
From My iPhone
Friday, September 20, 2013
Statistics about Business Size (including Small Business) from the U.S. Census Bureau
"Table includes both establishments with payroll and nonemployers. For descriptions of column headings and rows (industries), click on the appropriate underlined element in the table."
'via Blog this'
Advanced Malware Communications: What Every Security Professional Should Know | BrightTALK
The Story of Layla and Majnun - World Stories
Thursday, September 19, 2013
Stuxnet Expert Proposes New Framework For ICS/SCADA Security -- Dark
Wednesday, September 18, 2013
Monday, September 16, 2013
Sunday, September 15, 2013
FBI Admits It Controlled Tor Servers Behind Mass Malware Attack | Threat Level | Wired.com
Saturday, September 14, 2013
Friday, September 13, 2013
Defending Against DDoS Attacks | Security Management
READY OR NOT ? Twitter Instagrap Location app
GPGTools - It's worth protecting what you love
20 Euros via PayPal
Cost-Benefit Analysis Of NSA Surveillance Says It's Simply Not Worth It | Techdirt
NSA 'routinely' shares Americans' data with Israel - Snowden leak — RT News
The June 5 juggernaut rolls on...
Reading the Noises by William Finnegan | Byliner
Thursday, September 12, 2013
Wednesday, September 11, 2013
elliptic curves - Who uses Dual_EC_DRBG? - Cryptography Stack Exchange
Tuesday, September 10, 2013
Layla and Majnun
http://en.academic.ru/dic.nsf/enwiki/631424