Tuesday, January 29, 2013

Setting Up a Firewall: Mac OS X 10.6.x and above

Setting Up a Firewall: Mac OS X 10.6.x and above: This basic firewall closes off unused network service ports, but lets you create exceptions for specific programs running on your computer.

Friday, January 25, 2013

10 Tips To Protect Your Webcam From Being Hacked

10 Tips To Protect Your Webcam From Being Hacked: For Peeping opposite sex and taking compromising pictures of them. Then later use it for blackmailing or lust purpose. They are infamously called as “Peeping Toms”

A Giant Statistical Round-up of the Income Inequality Crisis in 16 Charts - Derek Thompson - The Atlantic

A Giant Statistical Round-up of the Income Inequality Crisis in 16 Charts - Derek Thompson - The Atlantic: The middle class crisis -- and its resulting income inequality -- is the most important economic story of our time. There are a million ways to tell it, and here's another: an annotated slide show, culled from the amazing 2012 edition of the State of Working America from EPI.

Thursday, January 24, 2013

How to Keep Your Webcam Secure - Popular Mechanics

How to Keep Your Webcam Secure - Popular Mechanics: But, Cobb says, if you’re not willing to stay on the lookout for news of security failures, you should cover up the cam when it might pick up something personal.

Web server hackers install rogue Apache modules and SSH backdoors, researchers say - intrusion, security, Access control and authentication, Sucuri, software, Web servers, spyware, malware - CIO

Web server hackers install rogue Apache modules and SSH backdoors, researchers say - intrusion, security, Access control and authentication, Sucuri, software, Web servers, spyware, malware - CIO: A group of hackers that are infecting Web servers with rogue Apache modules are also backdooring their Secure Shell (SSH) services in order to steal login credentials from administrators and users.

BLANK SHIRTS - Wholesale Apparel and Accessories

BLANK SHIRTS - Wholesale Apparel and Accessories: We offer discounts based on the total quantity of all of the items on your order. Our competitors only offer discounts on orders of dozens or full cases of one size and color.

Wednesday, January 23, 2013

BAE Systems Detica Security Research Blog: botCloud – an emerging platform for cyber-attacks

BAE Systems Detica Security Research Blog: botCloud – an emerging platform for cyber-attacks: During the execution of the test cases, although we were expecting responses from Cloud providers, our observations on the five tested Cloud providers showed that:

Dutch Publication on Hemochromatosis

Dutch Publication on Hemochromatosis

http://www.hemochromatose.nl/documents/pdf-bestanden/zorgboek.pdf

10 Reasons Enterprises Should Rethink Endpoint Security

10 Reasons Enterprises Should Rethink Endpoint Security: "Each day enterprises around the world are confronted with a growing number of sophisticated attacks on information systems and infrastructure that can evade firewalls, network protection devices and antivirus software"

'via Blog this'

Cybercrime attacks on business bank accounts are dropping

Cybercrime attacks on business bank accounts are dropping: "Attacks by cybercriminals to steal funds electronically from commercial bank accounts appear to be less successful of late than in previous years, according to a survey of 100 large and small financial institutions."

'via Blog this'

'Rogue clouds' giving IT staffs nightmares

'Rogue clouds' giving IT staffs nightmares: ""Rogue clouds" occur if sales and marketing people, for example, order up Salesforce.com without bothering to consult IT or set up Dropbox with outside vendors to share sensitive information. It's happening to three-quarters of those using cloud, according to the survey, and it occurs more in large enterprises (83%) than in small to midsize ones (70%)."

'via Blog this'

Sunday, January 20, 2013

Friday, January 18, 2013

Security Events | RSA Conference 2013

Security Events | RSA Conference 2013: RSA Conference is helping drive the information security agenda worldwide with annual industry events in the U.S., Europe and Asia.

Recording the Dream | History Today

Recording the Dream | History Today: One such gap in the literature concerns King’s relationship with the recording industry, and in particular with two resourceful and intensely ambitious black record label owners, Dootsie Williams and Berry Gordy.

Thursday, January 17, 2013

Catfish | Netflix

Catfish | Netflix: "When gifted 8-year-old artist Abby contacts young photographer Nev through Facebook, he's intrigued."

'via Blog this'

Tuesday, January 15, 2013

stratBLOG - stratsec security research: botCloud – an emerging platform for cyber-attacks

stratBLOG - stratsec security research: botCloud – an emerging platform for cyber-attacks: The objective of this research was to investigate the security posture of Cloud providers in protecting against malicious usage (the security point of view), as well as assessing the effectiveness of such CPs for launching malicious activities (the attacker point of view).

Maker of Smart-Grid Control Software Hacked | Threat Level | Wired.com

Maker of Smart-Grid Control Software Hacked | Threat Level | Wired.com:

The maker of an industrial control system designed to be used with so-called smart grid networks disclosed to customers last week that hackers had breached its network and accessed project files related to a control system used in portions of the electrical grid.

Designing reliable and secure cloud solutions - Cloud Computing | Microsoft Trustworthy Computing Blog - Site Home - TechNet Blogs

Designing reliable and secure cloud solutions - Cloud Computing | Microsoft Trustworthy Computing Blog - Site Home - TechNet Blogs: "Cloud computing and cloud services are emerging as new solutions for many organizations seeking to reduce costs and increase productivity. It’s an exciting and challenging time for the services industry as more and more organizations move their applications and IT services to the cloud."

'via Blog this'

Going Clear: Scientology, Hollywood, and the Prison of Belief: Lawrence Wright: Amazon.com: Kindle Store

Going Clear: Scientology, Hollywood, and the Prison of Belief: Lawrence Wright: Amazon.com: Kindle Store: "A clear-sighted revelation, a deep penetration into the world of Scientology "

'via Blog this'

Monday, January 14, 2013

Alg�rie - FBI : Un hacker alg�rien arr�t�en Tha�lande - YouTube

Alg�rie - FBI : Un hacker alg�rien arr�t�en Tha�lande - YouTube: Traqu�par le FBI pour avoir vol�des millions de dollars, un hacker alg�rien arr�t�en Tha�lande

HIPAA Business Associate: IIHI and PHI

HIPAA Business Associate: It is unclear why the regulators chose to split hairs and did not simply use one comprehensive definition, but that is what we got and we have to live with. PHI is essentially IIHI with a few exceptions.

Sunday, January 13, 2013

Wednesday, January 9, 2013

Adobe releases Creative Suite 2 for free [Update]

Adobe releases Creative Suite 2 for free [Update]

Multiple vulnerabilities in parameter parsing in Action Pack (CVE-2013-0156) - Google Groups

Multiple vulnerabilities in parameter parsing in Action Pack (CVE-2013-0156) - Google Groups: There are multiple weaknesses in the parameter parsing code for Ruby on Rails which allows attackers to bypass authentication systems, inject arbitrary SQL, inject and execute arbitrary code, or perform a DoS attack on a Rails application. This vulnerability has been assigned the CVE identifier CVE-2013-0156.

2013 Security New Years Resolutions

2013 Security New Years Resolutions: related reminders to keep you and yours safe and out of the low-hanging fruit category.

Tuesday, January 8, 2013

Text Message Privacy Depends on How You Send Your Missives - Hit & Run : Reason.com

Text Message Privacy Depends on How You Send Your Missives - Hit & Run : Reason.com: As it turns out, not all text-messaging services are created equal.

Mountain lion wifi problems: Apple Support Communities

Mountain lion wifi problems: Apple Support Communities: This is a bit geeky but bare with us: MTU stands for Maximum Transmission Unit and controls the largest packet size allowed for transmission over the network. If this setting is greater than network capacity, the computer will experience packet loss and dropped connections.

Oracle, Xerox, Dell, CSC, Symantec accused of paying ZERO UK tax • The Channel

Oracle, Xerox, Dell, CSC, Symantec accused of paying ZERO UK tax • The Channel: Tech giants Oracle, Xerox, Dell, CSC and Symantec paid no corporate tax in the UK last year despite pocketing nearly �500m from public-sector IT contracts,

Can an Ex Collect from His Older Ex-Wife When She Hits 66? | The Business Desk with Paul Solman | PBS NewsHour | PBS

Can an Ex Collect from His Older Ex-Wife When She Hits 66? | The Business Desk with Paul Solman | PBS NewsHour | PBS: Jorge Villar: I am 64, retired from the federal government and missing six quarters to qualify for Social Security. Can I use my ex-wife's work to meet requirement?

US-CERT Tip ST04-002 - Choosing and Protecting Passwords

US-CERT Tip ST04-002 - Choosing and Protecting Passwords: Passwords are the most common means of authentication, but if you don't choose good passwords or keep them confidential, they're almost as ineffective as not having any password at all. Many systems and services have been successfully broken into due to the use of insecure and inadequate passwords, and some viruses and worms have exploited systems by guessing weak passwords.

Health Care Data Breaches Highlight Need for Security Investment - Health Care IT - News & Reviews - eWeek.com

Health Care Data Breaches Highlight Need for Security Investment - Health Care IT - News & Reviews - eWeek.com:

On March 30, a weak password enabled an Eastern Europe cyber-attacker to hack into a server at the Utah Department of Technology Services. Of the compromised records, about 280,000 included Social Security numbers and about 500,000 included a name, date of birth and address.

4 Best Practices: Combat Health Data Breaches - Healthcare - Security

4 Best Practices: Combat Health Data Breaches - Healthcare - Security: Recently, the American Hospital Association brought together five senior executives to discuss security, compliance, and legal issues regarding best practices and how to create a culture of organizational compliance

Data breaches cost healthcare billions each year

Data breaches cost healthcare billions each year:

Earlier in 2012, the Alaska Department of Health and Human Services was fined by the federal OCR $1.7 million when a USB drive went missing, the article stated.

HHS announces first settlement in smaller data breach | Modern Healthcare

HHS announces first settlement in smaller data breach | Modern Healthcare: n less than three years, around 60,500 "smaller" healthcare data breaches—each affecting the records of fewer than 500 individuals—occurred across the country, and the federal government is setting its sights on providers implicated in these incidents.

Little progress made in the prevention of medical data breaches - Lexology

Little progress made in the prevention of medical data breaches - Lexology: Since stricter regulations were imposed in 2009, the healthcare industry’s track record on patient data protection and security has made very little improvement according to the latest study from Health Information Trust Alliance

Apple Products Are A Favorite Among Identity Thieves

Apple Products Are A Favorite Among Identity Thieves: The bill was a result of identity theft -- a crime that affects about 8 million to 12 million people every year and cost $18 billion last year, according to federal government statistics and studies by the firm Javelin Strategy & Research.

ICS-CERT Warns of Serious Flaws in Tridium Niagara Software | threatpost

ICS-CERT Warns of Serious Flaws in Tridium Niagara Software | threatpost: The DHS and ICS-CERT are warning users of some popular Tridium Niagara AX industrial control system software about a series of major vulnerabilities in the applications that are remotely exploitable and could be used to take over vulnerable systems.

Monday, January 7, 2013

New Ponemon Institute Study Finds Data Breaches Cost Hospitals $6 Billion | ID Experts

New Ponemon Institute Study Finds Data Breaches Cost Hospitals $6 Billion | ID Experts: Healthcare data breaches have become an everyday disaster. Ninety-four percent of healthcare organizations surveyed in the newly released Ponemon Institute study, Third Annual Benchmark Study on Patient Privacy & Data Security, suffered at least one data breach during the past two years.

2013 State of the Endpoint - News and Press Releases

2013 State of the Endpoint - News and Press Releases: This study reveals that the state of endpoint risk is not improving. One of the top concerns is the proliferation of personally owned mobile devices in the workplace such as smart phones and iPads.

Friday, January 4, 2013

(92) I am using an unsecured Wifi from a neighbor - Quora

(92) I am using an unsecured Wifi from a neighbor. - Quora: what happened when the cops showed up at the house of a guy to ask him about all the kiddie porn his computer was accessing. And then discovered that it wasn't him, but rather his unsecured WiFi router. And then what happened to the neighbor who was freeloading...

How to Wipe Your Kindle Fire - Glydecast

How to Wipe Your Kindle Fire - Glydecast:

Read on to learn how to wipe your personal data from your tablet so it’s ready to sell.