Just a basic blog—snagging random stuff that catches our eye—nothing else, really...
Tuesday, March 26, 2013
Speedtest.net - The Global Broadband Speed Test
Speedtest.net - The Global Broadband Speed Test: Are you getting the speed you pay for? Our Promise Index™ and Speedtest.net help keep your ISP honest!
Tuesday, March 19, 2013
Hotel Casa Natalia - Location - Welcome - San Jose del Cabo, Mexico
Hotel Casa Natalia - Location - Welcome - San Jose del Cabo, Mexico: Chic and unpretentious, Casa Natalia embraces the most charming aspects of Mexican culture
Monday, March 18, 2013
What do Win32/Redyms and TDL4 have in common?
What do Win32/Redyms and TDL4 have in common?: Deeper analysis shows blog.eset.com
Sunday, March 17, 2013
Social Media, Common Sense, and the Law
Social Media, Common Sense, and the Law: And then, down the road, you discover that this person you’ve been having work-related conversations with is not really your customer but someone who has stolen your client’s identity
Nerd Chick Adventures: Be on lookout for these social media scams � Redding Record Searchlight
Nerd Chick Adventures: Be on lookout for these social media scams � Redding Record Searchlight: Don’t fall victim. Here’s how to identify and avoid the most common social media ploys.
Internet, social media least trusted industries for privacy | Security & Privacy - CNET News
Internet, social media least trusted industries for privacy | Security & Privacy - CNET News: Internet and social media ranked at the bottom on a list of the most trusted industries for privacy, according to the Ponemon Institute.
Twitter Hacks Force Companies to Confront Security on Social Media - NYTimes.com
Twitter Hacks Force Companies to Confront Security on Social Media - NYTimes.com: What happened to Burger King — and, a day later, to Jeep — is every brand manager’s nightmare.
What you 'Like' in Facebook can come back to haunt you - CSO Online - Security and Risk
What you 'Like' in Facebook can come back to haunt you - CSO Online - Security and Risk: "Commercial companies, governmental institutions, or even one's Facebook friends could use software to infer attributes such as intelligence, sexual orientation
Thursday, March 14, 2013
Sicherheitstacho.eu Attack Map
Sicherheitstacho.eu: Overview of current cyber attacks (logged by 97 Sensors )
Wednesday, March 13, 2013
HolisticInfoSec: toolsmith: Redline, APT1, and you – we’re all owned
We are in an exciting time for computer security, and I look forward to seeing Redline help new users dive headfirst into computer security awareness.
From My iPhone
Intelligence Official Warns Congress That Cyberattacks Pose Threat to U.S. - NYTimes.com
a cyberattack could cripple America's infrastructure and economy and suggested that such attacks pose the most dangerous immediate threat to the United States,
From My iPhone
Tuesday, March 12, 2013
Scammers’ new target: your cell phone - Jennifer Waters's Consumer Confidential - MarketWatch
Scammers’ new target: your cell phone - Jennifer Waters's Consumer Confidential - MarketWatch: If you’ve got a mobile phone that receives text messages, chances are you’ve been hit with the latest scam from the bad guys: smishing
RSA 2013: Security wonks debate whether China will get the message to stop hacking - SC Magazine
RSA 2013: Security wonks debate whether China will get the message to stop hacking - SC Magazine: The jury is out on whether China will scale down its cyber espionage activity after the country was called out in a well-publicized report on a military hacking unit
HP Launches Big Data Security Products, Threat Research - Security -
HP Launches Big Data Security Products, Threat Research - Security -: HP this week released new big data tools designed to provide businesses with better information security intelligence gathering capabilities, and launched a new information security research group that's been tasked with providing better threat intelligence for HP's own security products.
Changes to cookies on our website - ICO
Changes to cookies on our website - ICO: The aim is to help us collect reliable information to make our website better, while remaining compliant with the rules on cookies and our own guidance.
Changes to cookies on our website - ICO
Changes to cookies on our website - ICO: The aim is to help us collect reliable information to make our website better, while remaining compliant with the rules on cookies and our own guidance.
Thursday, March 7, 2013
Wealth Inequality in America
I thought graphic illustration of the distribution of wealth in America quite shocking. It makes me think of Czarist Russia, before the revolution. Is that where we are heading?
When the middle class are hardly better off than the poor, and the richest people are 300 times better off than the middle class, it becomes blatantly obvious that this situation cannot last. My only questions are:
1) How long will this situation last?
and
2) What is going to be the "last straw" that brings on the revolution?
How Safe Is Your Phone From Hackers | NBC 7 San Diego
How Safe Is Your Phone From Hackers | NBC 7 San Diego:
Phones with popular operating systems may be more susceptible to hackers.
Phones with popular operating systems may be more susceptible to hackers.
Subscribe to:
Posts (Atom)