Just a basic blog—snagging random stuff that catches our eye—nothing else, really...
Tuesday, January 29, 2013
Setting Up a Firewall: Mac OS X 10.6.x and above
Setting Up a Firewall: Mac OS X 10.6.x and above: This basic firewall closes off unused network service ports, but lets you create exceptions for specific programs running on your computer.
Friday, January 25, 2013
10 Tips To Protect Your Webcam From Being Hacked
10 Tips To Protect Your Webcam From Being Hacked: For Peeping opposite sex and taking compromising pictures of them. Then later use it for blackmailing or lust purpose. They are infamously called as “Peeping Toms”
A Giant Statistical Round-up of the Income Inequality Crisis in 16 Charts - Derek Thompson - The Atlantic
A Giant Statistical Round-up of the Income Inequality Crisis in 16 Charts - Derek Thompson - The Atlantic: The middle class crisis -- and its resulting income inequality -- is the most important economic story of our time. There are a million ways to tell it, and here's another: an annotated slide show, culled from the amazing 2012 edition of the State of Working America from EPI.
Thursday, January 24, 2013
How to Keep Your Webcam Secure - Popular Mechanics
How to Keep Your Webcam Secure - Popular Mechanics: But, Cobb says, if you’re not willing to stay on the lookout for news of security failures, you should cover up the cam when it might pick up something personal.
Web server hackers install rogue Apache modules and SSH backdoors, researchers say - intrusion, security, Access control and authentication, Sucuri, software, Web servers, spyware, malware - CIO
Web server hackers install rogue Apache modules and SSH backdoors, researchers say - intrusion, security, Access control and authentication, Sucuri, software, Web servers, spyware, malware - CIO: A group of hackers that are infecting Web servers with rogue Apache modules are also backdooring their Secure Shell (SSH) services in order to steal login credentials from administrators and users.
BLANK SHIRTS - Wholesale Apparel and Accessories
BLANK SHIRTS - Wholesale Apparel and Accessories: We offer discounts based on the total quantity of all of the items on your order. Our competitors only offer discounts on orders of dozens or full cases of one size and color.
Wednesday, January 23, 2013
BAE Systems Detica Security Research Blog: botCloud – an emerging platform for cyber-attacks
BAE Systems Detica Security Research Blog: botCloud – an emerging platform for cyber-attacks: During the execution of the test cases, although we were expecting responses from Cloud providers, our observations on the five tested Cloud providers showed that:
10 Reasons Enterprises Should Rethink Endpoint Security
10 Reasons Enterprises Should Rethink Endpoint Security: "Each day enterprises around the world are confronted with a growing number of sophisticated attacks on information systems and infrastructure that can evade firewalls, network protection devices and antivirus software"
'via Blog this'
'via Blog this'
Cybercrime attacks on business bank accounts are dropping
Cybercrime attacks on business bank accounts are dropping: "Attacks by cybercriminals to steal funds electronically from commercial bank accounts appear to be less successful of late than in previous years, according to a survey of 100 large and small financial institutions."
'via Blog this'
'via Blog this'
'Rogue clouds' giving IT staffs nightmares
'Rogue clouds' giving IT staffs nightmares: ""Rogue clouds" occur if sales and marketing people, for example, order up Salesforce.com without bothering to consult IT or set up Dropbox with outside vendors to share sensitive information. It's happening to three-quarters of those using cloud, according to the survey, and it occurs more in large enterprises (83%) than in small to midsize ones (70%)."
'via Blog this'
'via Blog this'
Sunday, January 20, 2013
Cyber Security - identify, manage and respond to data security risks
Cyber Security - identify, manage and respond to data security risks: nformation security issues—such as data breaches or employee misconduct—are a constant challenge for organizations
Friday, January 18, 2013
Security Events | RSA Conference 2013
Security Events | RSA Conference 2013: RSA Conference is helping drive the information security agenda worldwide with annual industry events in the U.S., Europe and Asia.
Recording the Dream | History Today
Recording the Dream | History Today: One such gap in the literature concerns King’s relationship with the recording industry, and in particular with two resourceful and intensely ambitious black record label owners, Dootsie Williams and Berry Gordy.
Thursday, January 17, 2013
Catfish | Netflix
Catfish | Netflix: "When gifted 8-year-old artist Abby contacts young photographer Nev through Facebook, he's intrigued."
'via Blog this'
'via Blog this'
Tuesday, January 15, 2013
stratBLOG - stratsec security research: botCloud – an emerging platform for cyber-attacks
stratBLOG - stratsec security research: botCloud – an emerging platform for cyber-attacks: The objective of this research was to investigate the security posture of Cloud providers in protecting against malicious usage (the security point of view), as well as assessing the effectiveness of such CPs for launching malicious activities (the attacker point of view).
Maker of Smart-Grid Control Software Hacked | Threat Level | Wired.com
Maker of Smart-Grid Control Software Hacked | Threat Level | Wired.com:
The maker of an industrial control system designed to be used with so-called smart grid networks disclosed to customers last week that hackers had breached its network and accessed project files related to a control system used in portions of the electrical grid.
The maker of an industrial control system designed to be used with so-called smart grid networks disclosed to customers last week that hackers had breached its network and accessed project files related to a control system used in portions of the electrical grid.
Designing reliable and secure cloud solutions - Cloud Computing | Microsoft Trustworthy Computing Blog - Site Home - TechNet Blogs
Designing reliable and secure cloud solutions - Cloud Computing | Microsoft Trustworthy Computing Blog - Site Home - TechNet Blogs: "Cloud computing and cloud services are emerging as new solutions for many organizations seeking to reduce costs and increase productivity. It’s an exciting and challenging time for the services industry as more and more organizations move their applications and IT services to the cloud."
'via Blog this'
'via Blog this'
Going Clear: Scientology, Hollywood, and the Prison of Belief: Lawrence Wright: Amazon.com: Kindle Store
Going Clear: Scientology, Hollywood, and the Prison of Belief: Lawrence Wright: Amazon.com: Kindle Store: "A clear-sighted revelation, a deep penetration into the world of Scientology "
'via Blog this'
'via Blog this'
Monday, January 14, 2013
Alg�rie - FBI : Un hacker alg�rien arr�t�en Tha�lande - YouTube
Alg�rie - FBI : Un hacker alg�rien arr�t�en Tha�lande - YouTube: Traqu�par le FBI pour avoir vol�des millions de dollars, un hacker alg�rien arr�t�en Tha�lande
HIPAA Business Associate: IIHI and PHI
HIPAA Business Associate: It is unclear why the regulators chose to split hairs and did not simply use one comprehensive definition, but that is what we got and we have to live with. PHI is essentially IIHI with a few exceptions.
Sunday, January 13, 2013
Sit4Less - Herman Miller®, Aeron®, Eames®, Celle™, Mirra®, Humanscale chairs
Sit4Less - Herman Miller®, Aeron®, Eames®, Celle™, Mirra®, Humanscale chairs:
"Sit4Less.com is an e-tailer of upscale ergonomic office seating found in Fortune 500 offices - Delivered to the home and small office customer."
'via Blog this'
"Sit4Less.com is an e-tailer of upscale ergonomic office seating found in Fortune 500 offices - Delivered to the home and small office customer."
'via Blog this'
Wednesday, January 9, 2013
Multiple vulnerabilities in parameter parsing in Action Pack (CVE-2013-0156) - Google Groups
Multiple vulnerabilities in parameter parsing in Action Pack (CVE-2013-0156) - Google Groups: There are multiple weaknesses in the parameter parsing code for Ruby on Rails which allows attackers to bypass authentication systems, inject arbitrary SQL, inject and execute arbitrary code, or perform a DoS attack on a Rails application. This vulnerability has been assigned the CVE identifier CVE-2013-0156.
2013 Security New Years Resolutions
2013 Security New Years Resolutions: related reminders to keep you and yours safe and out of the low-hanging fruit category.
Tuesday, January 8, 2013
Text Message Privacy Depends on How You Send Your Missives - Hit & Run : Reason.com
Text Message Privacy Depends on How You Send Your Missives - Hit & Run : Reason.com: As it turns out, not all text-messaging services are created equal.
Mountain lion wifi problems: Apple Support Communities
Mountain lion wifi problems: Apple Support Communities: This is a bit geeky but bare with us: MTU stands for Maximum Transmission Unit and controls the largest packet size allowed for transmission over the network. If this setting is greater than network capacity, the computer will experience packet loss and dropped connections.
Oracle, Xerox, Dell, CSC, Symantec accused of paying ZERO UK tax • The Channel
Oracle, Xerox, Dell, CSC, Symantec accused of paying ZERO UK tax • The Channel: Tech giants Oracle, Xerox, Dell, CSC and Symantec paid no corporate tax in the UK last year despite pocketing nearly �500m from public-sector IT contracts,
Can an Ex Collect from His Older Ex-Wife When She Hits 66? | The Business Desk with Paul Solman | PBS NewsHour | PBS
Can an Ex Collect from His Older Ex-Wife When She Hits 66? | The Business Desk with Paul Solman | PBS NewsHour | PBS: Jorge Villar: I am 64, retired from the federal government and missing six quarters to qualify for Social Security. Can I use my ex-wife's work to meet requirement?
US-CERT Tip ST04-002 - Choosing and Protecting Passwords
US-CERT Tip ST04-002 - Choosing and Protecting Passwords: Passwords are the most common means of authentication, but if you don't choose good passwords or keep them confidential, they're almost as ineffective as not having any password at all. Many systems and services have been successfully broken into due to the use of insecure and inadequate passwords, and some viruses and worms have exploited systems by guessing weak passwords.
Health Care Data Breaches Highlight Need for Security Investment - Health Care IT - News & Reviews - eWeek.com
Health Care Data Breaches Highlight Need for Security Investment - Health Care IT - News & Reviews - eWeek.com:
On March 30, a weak password enabled an Eastern Europe cyber-attacker to hack into a server at the Utah Department of Technology Services. Of the compromised records, about 280,000 included Social Security numbers and about 500,000 included a name, date of birth and address.
On March 30, a weak password enabled an Eastern Europe cyber-attacker to hack into a server at the Utah Department of Technology Services. Of the compromised records, about 280,000 included Social Security numbers and about 500,000 included a name, date of birth and address.
4 Best Practices: Combat Health Data Breaches - Healthcare - Security
4 Best Practices: Combat Health Data Breaches - Healthcare - Security: Recently, the American Hospital Association brought together five senior executives to discuss security, compliance, and legal issues regarding best practices and how to create a culture of organizational compliance
Data breaches cost healthcare billions each year
Data breaches cost healthcare billions each year:
Earlier in 2012, the Alaska Department of Health and Human Services was fined by the federal OCR $1.7 million when a USB drive went missing, the article stated.
Earlier in 2012, the Alaska Department of Health and Human Services was fined by the federal OCR $1.7 million when a USB drive went missing, the article stated.
HHS announces first settlement in smaller data breach | Modern Healthcare
HHS announces first settlement in smaller data breach | Modern Healthcare: n less than three years, around 60,500 "smaller" healthcare data breaches—each affecting the records of fewer than 500 individuals—occurred across the country, and the federal government is setting its sights on providers implicated in these incidents.
Little progress made in the prevention of medical data breaches - Lexology
Little progress made in the prevention of medical data breaches - Lexology: Since stricter regulations were imposed in 2009, the healthcare industry’s track record on patient data protection and security has made very little improvement according to the latest study from Health Information Trust Alliance
Apple Products Are A Favorite Among Identity Thieves
Apple Products Are A Favorite Among Identity Thieves: The bill was a result of identity theft -- a crime that affects about 8 million to 12 million people every year and cost $18 billion last year, according to federal government statistics and studies by the firm Javelin Strategy & Research.
ICS-CERT Warns of Serious Flaws in Tridium Niagara Software | threatpost
ICS-CERT Warns of Serious Flaws in Tridium Niagara Software | threatpost: The DHS and ICS-CERT are warning users of some popular Tridium Niagara AX industrial control system software about a series of major vulnerabilities in the applications that are remotely exploitable and could be used to take over vulnerable systems.
Monday, January 7, 2013
New Ponemon Institute Study Finds Data Breaches Cost Hospitals $6 Billion | ID Experts
New Ponemon Institute Study Finds Data Breaches Cost Hospitals $6 Billion | ID Experts: Healthcare data breaches have become an everyday disaster. Ninety-four percent of healthcare organizations surveyed in the newly released Ponemon Institute study, Third Annual Benchmark Study on Patient Privacy & Data Security, suffered at least one data breach during the past two years.
2013 State of the Endpoint - News and Press Releases
2013 State of the Endpoint - News and Press Releases: This study reveals that the state of endpoint risk is not improving. One of the top concerns is the proliferation of personally owned mobile devices in the workplace such as smart phones and iPads.
Friday, January 4, 2013
(92) I am using an unsecured Wifi from a neighbor - Quora
(92) I am using an unsecured Wifi from a neighbor. - Quora: what happened when the cops showed up at the house of a guy to ask him about all the kiddie porn his computer was accessing. And then discovered that it wasn't him, but rather his unsecured WiFi router. And then what happened to the neighbor who was freeloading...
How to Wipe Your Kindle Fire - Glydecast
How to Wipe Your Kindle Fire - Glydecast:
Read on to learn how to wipe your personal data from your tablet so it’s ready to sell.
Read on to learn how to wipe your personal data from your tablet so it’s ready to sell.
Subscribe to:
Posts (Atom)