Just a basic blog—snagging random stuff that catches our eye—nothing else, really...
Monday, September 30, 2013
FireAMP Fights Malware with Big Data Analytics | PCWorld
FireAMP Fights Malware with Big Data Analytics | PCWorld:
In and of itself, FireAMP defies easy classification. It is a new type of security tool that does not fit easily into any standard categories like antivirus, or antispyware, or firewall. Yet, it seems to have some overlap with existing security tools to augment their capabilities.
In and of itself, FireAMP defies easy classification. It is a new type of security tool that does not fit easily into any standard categories like antivirus, or antispyware, or firewall. Yet, it seems to have some overlap with existing security tools to augment their capabilities.
Goodbye, Encryption; Hello, FOSS | Community | LinuxInsider
Goodbye, Encryption; Hello, FOSS | Community | LinuxInsider:
"I have a basic question: What is the privacy/security health of the Linux kernel (and indeed other FOSS OSes) given all the recent stories about the NSA going in and deliberately subverting various parts of the privacy/security sub-systems?"
"I have a basic question: What is the privacy/security health of the Linux kernel (and indeed other FOSS OSes) given all the recent stories about the NSA going in and deliberately subverting various parts of the privacy/security sub-systems?"
US government is now the biggest buyer of malware, Reuters reports | The Verge
US government is now the biggest buyer of malware, Reuters reports | The Verge:
Former White House cybersecurity advisors Howard Schmidt and Richard Clarke say this move to "offensive" cybersecurity has left US companies and average citizens vulnerable, because it relies on the government collecting and exploiting critical vulnerabilities that have not been revealed to software vendors or the public.
Former White House cybersecurity advisors Howard Schmidt and Richard Clarke say this move to "offensive" cybersecurity has left US companies and average citizens vulnerable, because it relies on the government collecting and exploiting critical vulnerabilities that have not been revealed to software vendors or the public.
Saturday, September 28, 2013
TAXII - News
TAXII - News: Microsoft Corporation announced on July 29, 2013 that it plans to support TAXII and Structured Threat Information Expression (STIX™) in an article entitled "New MAPP Initiatives" on Microsoft's "BlueHat Blog."
MAEC - Use Cases
MAEC - Use Cases: At its highest level, MAEC is a domain-specific language for non-signature based malware characterization.
New MAPP Initiatives - Microsoft BlueHat Blog - Site Home - TechNet Blogs
New MAPP Initiatives - Microsoft BlueHat Blog - Site Home - TechNet Blogs: Since the program launched, there has been little external change to how it operates. Internally, we have made slight adjustments to how the program is managed but by and large, it is the same program it was in 2008 and the same program our partners still say is essential to their operations.
Friday, September 27, 2013
Is the anti-virus industry in bed with the NSA – why do CIPAV, FinFisher and DaVinci still defeat AV? | Kevin Townsend
Is the anti-virus industry in bed with the NSA – why do CIPAV, FinFisher and DaVinci still defeat AV? | Kevin Townsend:
Without any evidence he says:
"Is the AV industry in bed with the NSA? The simple fact is that we just do not know. The industry itself denies it – but, well, it would, wouldn’t it? Statistically, since almost every other aspect of the security industry collaborates with or has been subverted by the NSA, my suspicion is that it is. At the very least, I suspect it engages in ‘tacit connivance’."
Without any evidence he says:
"Is the AV industry in bed with the NSA? The simple fact is that we just do not know. The industry itself denies it – but, well, it would, wouldn’t it? Statistically, since almost every other aspect of the security industry collaborates with or has been subverted by the NSA, my suspicion is that it is. At the very least, I suspect it engages in ‘tacit connivance’."
Gene Patent Ban Could Lead to More Genetic Tests - Alzheimer's Disease Center - Everyday Health
Gene Patent Ban Could Lead to More Genetic Tests - Alzheimer's Disease Center - Everyday Health: "With the lift on these gene patents could come a new wave of genetic testing, and the options for patients and doctors could increase dramatically."
'via Blog this'
'via Blog this'
Impact of gene patents and licensing practices on ... [Genet Med. 2010] - PubMed - NCBI
Impact of gene patents and licensing practices on ... [Genet Med. 2010] - PubMed - NCBI: "Patents cover the HFE gene, related proteins, screening methods, and testing kits. Most initial testing for hereditary hemochromatosis is biochemical, but HFE deoxyribonucleic acid testing or genotyping is used to confirm a diagnosis of inherited hemochromatosis."
'via Blog this'
'via Blog this'
Math Advances Raise the Prospect of an Internet Security Crisis | MIT Technology Review
Math Advances Raise the Prospect of an Internet Security Crisis | MIT Technology Review: "Academic advances suggest that the encryption systems that secure online communications could be undermined in just a few years."
'via Blog this'
'via Blog this'
Anti-Encryption Measures Free NSA to Access Web Data without Going to Providers | MIT Technology Review
Anti-Encryption Measures Free NSA to Access Web Data without Going to Providers | MIT Technology Review: "Leaked documents suggest that American spies can decrypt much of the data they collect by tapping into Internet service providers and telecommunications cables."
'via Blog this'
'via Blog this'
The NSA Hasn’t “Cracked” Encryption—It’s Just Reminded Us of the Ways Around It | MIT Technology Review
The NSA Hasn’t “Cracked” Encryption—It’s Just Reminded Us of the Ways Around It | MIT Technology Review: "However, cryptography experts tell MIT Technology Review that a close reading of last week’s report suggests the NSA has not broken the underlying mathematical operations that are used to cloak online banking or e-mail."
'via Blog this'
'via Blog this'
Thursday, September 26, 2013
Former NSA chief: ‘Morally arrogant’ Snowden will probably become an alcoholic
Former NSA chief: ‘Morally arrogant’ Snowden will probably become an alcoholic:
"I welcome the debate, but I want the debate to be based on fact,"
"I welcome the debate, but I want the debate to be based on fact,"
Snowden Leaks, NSA Activities Complicate Push for Cybersecurity Law
Snowden Leaks, NSA Activities Complicate Push for Cybersecurity Law:
“If we thought that information-sharing was moving slowly before, now it’s moving even more slowly,” a senior administration official said in an interview granted on condition of anonymity.
“If we thought that information-sharing was moving slowly before, now it’s moving even more slowly,” a senior administration official said in an interview granted on condition of anonymity.
Gastromanagement Berlin | Lindenbr�u im Sony Center
Gastromanagement Berlin | Lindenbr�u im Sony Center:
Are you very hungry or do you have only appetite for something delicious – no problem - in our restaurant Lindenbr�u the cooking team offers a rich choice of regional dishes and Bavarian specialities
Are you very hungry or do you have only appetite for something delicious – no problem - in our restaurant Lindenbr�u the cooking team offers a rich choice of regional dishes and Bavarian specialities
Grieving as an atheist: a surprising dilemma | Tiffany White | Comment is free | theguardian.com
Grieving as an atheist: a surprising dilemma | Tiffany White | Comment is free | theguardian.com:
"I started to realize that the life of an atheist was a tad bleak. The more I spoke, the darker the conversation became."
'via Blog this'
"I started to realize that the life of an atheist was a tad bleak. The more I spoke, the darker the conversation became."
'via Blog this'
Empowering Information Sharing: Release of pyNSSFClient | CrowdStrike
Empowering Information Sharing: Release of pyNSSFClient | CrowdStrike:
One of the lesser-known facts about the computer security business is that vendors exchange malware samples with each other, often through mutual sharing arrangements.
One of the lesser-known facts about the computer security business is that vendors exchange malware samples with each other, often through mutual sharing arrangements.
Tuesday, September 24, 2013
Latest Stories | Columbia Journalism Review
But this CEO, at least, is a buffoon.
http://m.cjr.org/303546/show/24bcfb1da2ce2373ce108861be3ea354/?
From My iPhone
http://m.cjr.org/303546/show/24bcfb1da2ce2373ce108861be3ea354/?
From My iPhone
Monday, September 23, 2013
Do Cyber Criminals target the Financial Services Industry? | BrightTALK
Do Cyber Criminals target the Financial Services Industry? | BrightTALK:
"Do Cyber Criminals target the Financial Services Industry?"
'via Blog this'
"Do Cyber Criminals target the Financial Services Industry?"
'via Blog this'
A unique approach to Advanced Threat Detection | Seculert
A unique approach to Advanced Threat Detection | Seculert:
Because Seculert Echo is the only malware detection solution that intercepts and collects data from within live botnets. This unique approach has a number of advantages:
Because Seculert Echo is the only malware detection solution that intercepts and collects data from within live botnets. This unique approach has a number of advantages:
Singlemizer | Minimalist Duplicate Files Finder for OS X. Yet With Features
Singlemizer | Minimalist Duplicate Files Finder for OS X. Yet With Features:
Singlemizer forms duplicates' list as files are identified. Feel free to work with the results while more files are being processed in background.
Singlemizer forms duplicates' list as files are identified. Feel free to work with the results while more files are being processed in background.
Sunday, September 22, 2013
UK's GCHQ blamed for cyber attack on Belgian telecoms company - Home News - UK - The Independent
UK's GCHQ blamed for cyber attack on Belgian telecoms company - Home News - UK - The Independent: British intelligence officers targeted Belgacom employees over a number of years with sophisticated malware to gain access to key infrastructure, including the company’s international router.
Your Heartbeat Is Your New Password
Your Heartbeat Is Your New Password: A wristband dubbed Nymi confirms a user’s identity via electrocardiogram (ECG) sensors that monitor the heartbeat and can authenticate a range of devices, from iPads to cars. Developers at Bionym, the Toronto-based company
Could New Tracking Codes on Medical Implants Save Lives?
Could New Tracking Codes on Medical Implants Save Lives?
From My iPhone
Saturday, September 21, 2013
Mobile malware no big deal
Oh that's a relief. Here I was worried about all those hacked phones, for nothing.
http://mobile.informationweek.com/80269/show/e0e19d5cb7eb6b93f9443236153da446/?
From My iPhone
http://mobile.informationweek.com/80269/show/e0e19d5cb7eb6b93f9443236153da446/?
From My iPhone
Friday, September 20, 2013
Statistics about Business Size (including Small Business) from the U.S. Census Bureau
Statistics about Business Size (including Small Business) from the U.S. Census Bureau:
"Table includes both establishments with payroll and nonemployers. For descriptions of column headings and rows (industries), click on the appropriate underlined element in the table."
'via Blog this'
"Table includes both establishments with payroll and nonemployers. For descriptions of column headings and rows (industries), click on the appropriate underlined element in the table."
'via Blog this'
Advanced Malware Communications: What Every Security Professional Should Know | BrightTALK
Advanced Malware Communications: What Every Security Professional Should Know | BrightTALK: By capturing details of both advanced and more generic malware attacks and monitoring callback activity, a great deal can be learned about an attacker’s intentions, interests and geographic location.
The Story of Layla and Majnun - World Stories
The Story of Layla and Majnun - World Stories: Overcome with regret and loss, Majnun retreated inside of himself entirely and vowed to live in the desert until his own death.
Thursday, September 19, 2013
Stuxnet Expert Proposes New Framework For ICS/SCADA Security -- Dark
Stuxnet Expert Proposes New Framework For ICS/SCADA Security -- Dark: The so-called Robust ICS Planning and Evaluation, or RIPE, framework takes a different approach to locking down plants, with more of a process-based approach than the risk-based NIST-led Cyber Security Framework.
Wednesday, September 18, 2013
Monday, September 16, 2013
Sunday, September 15, 2013
FBI Admits It Controlled Tor Servers Behind Mass Malware Attack | Threat Level | Wired.com
FBI Admits It Controlled Tor Servers Behind Mass Malware Attack | Threat Level | Wired.com: Court documents and FBI files released under the FOIA have described the CIPAV as software the FBI can deliver through a browser exploit to gather information from the target’s machine and send it to an FBI server in Virginia. The FBI has been using the CIPAV since 2002 against hackers, online sexual predators, extortionists, and others, primarily to identify suspects who are disguising their location using proxy servers or anonymity services, like Tor.
Saturday, September 14, 2013
Friday, September 13, 2013
Defending Against DDoS Attacks | Security Management
Defending Against DDoS Attacks | Security Management: Distributed denial of service (DDoS) attacks—in which a Web site is bombarded with such a volume of traffic that legitimate users can’t access it—are on the rise.
READY OR NOT ? Twitter Instagrap Location app
READY OR NOT ?: This app shows how people could use your social-media posts to find you in the physical world. It uses GPS data attached to Twitter and Instagram posts to create a map of where someone's been posting from recently.
GPGTools - It's worth protecting what you love
GPGTools - It's worth protecting what you love: Use GPG Suite to encrypt, decrypt, sign and verify files or messages. Manage your GPG Keychain with a few simple clicks and experience the full power of GPG easier than ever before.
20 Euros via PayPal
20 Euros via PayPal
Cost-Benefit Analysis Of NSA Surveillance Says It's Simply Not Worth It | Techdirt
Cost-Benefit Analysis Of NSA Surveillance Says It's Simply Not Worth It | Techdirt: A new study suggests that the direct losses to US tech companies from people and companies fleeing to other services (often overseas) is likely to be between $22 billion and $35 billion over just the next three years.
NSA 'routinely' shares Americans' data with Israel - Snowden leak — RT News
NSA 'routinely' shares Americans' data with Israel - Snowden leak — RT News: The NSA regularly shares raw US intelligence data with Israel without even removing information about American citizens, according to the latest revelation published by the Guardian. The report is based on a document leaked by Edward Snowden.
The June 5 juggernaut rolls on...
The June 5 juggernaut rolls on...
Reading the Noises by William Finnegan | Byliner
Reading the Noises by William Finnegan | Byliner: A friend writes: There are probably people who can identify all sorts of emergency vehicles simply by their sirens, cocking an ear and announcing “State Police” or “County Hospital,” the way bird-lovers can identify unseen birds by their cries.
Thursday, September 12, 2013
Wednesday, September 11, 2013
elliptic curves - Who uses Dual_EC_DRBG? - Cryptography Stack Exchange
elliptic curves - Who uses Dual_EC_DRBG? - Cryptography Stack Exchange: Even before the potential backdoor was discovered back in 2007, the Dual_EC_DRBG was known to be much slower and slightly more biased than all the other random number generators in NIST SP 800-90. To quote Bruce Schneier:
Tuesday, September 10, 2013
Layla and Majnun
Layla and Majnun: A scene from Nizami's adaptation of the story. Layla and Majnun meet for the last time before their deaths.
http://en.academic.ru/dic.nsf/enwiki/631424
http://en.academic.ru/dic.nsf/enwiki/631424
Monday, September 9, 2013
Mixon 619 232 8665
Deli breakfast / lunch menu for downtown San Diego businesses and tourists.: #7 BANKER'S SPECIAL: Roast Beef and cheddar with mayo, thousand island dressing, lettuce, tomatoes, and onions......$6.49
MUM Composers
MUM Composers: The guitarist's guitarist, Steve Donnelly is one of the great stylists of today on his instrument. Known for his eclectic styles on acoustic and electric, he has brought magic to recordings of many artists such as Sheryl Crow, Suzanne Vega, Elvis Costello, Mick Jagger, Tasmin Archer, Mitchell Froom, Nick Lowe, Katie Melua and Bonnie Raitt. He is also featured on Randy Newman's highly acclaimed latest album "Harps & Angels".
Sunday, September 8, 2013
How PatientSecure Works
How PatientSecure Works:
PatientSecure has been adopted primarily with palm vein recognition technology, which provides highly accurate patient identification that works by scanning the vein pattern of a patient’s palm.
PatientSecure has been adopted primarily with palm vein recognition technology, which provides highly accurate patient identification that works by scanning the vein pattern of a patient’s palm.
Saturday, September 7, 2013
“Hi Grandma” Scam Makes Blood Boil « BBB Consumer News and Opinion Blog
The Federal Trade Commission reports that 60,000 complaints about this type of fraud were filed last year.
http://www.bbb.org/blog/2012/07/hi-grandma-scam-makes-blood-boil/
From My iPhone
http://www.bbb.org/blog/2012/07/hi-grandma-scam-makes-blood-boil/
From My iPhone
Posting Personal Information Online Invites Scammers and ThievesAging Parents – Elder Care – Senior Homes – Caregiving
Another example granny or grandma scam:
http://m.agingcare.com/Articles/scammers-steal-elders-persional-information-online-146101.htm
From My iPhone
http://m.agingcare.com/Articles/scammers-steal-elders-persional-information-online-146101.htm
From My iPhone
Friday, September 6, 2013
Sweden sits on pipeline of intelligence 'gold' - The Local
Sweden sits on pipeline of intelligence 'gold' - The Local:
A Swedish expert said it's "quite likely" Sweden helps the NSA tap intelligence information flowing through underwater cables in the Baltic Sea, adding Sweden's government leaders certainly know about the operations.
A Swedish expert said it's "quite likely" Sweden helps the NSA tap intelligence information flowing through underwater cables in the Baltic Sea, adding Sweden's government leaders certainly know about the operations.
Thursday, September 5, 2013
USA: Draft Cybersecurity Framework raises privacy concerns | Privacy This Week | DataGuidance
USA: Draft Cybersecurity Framework raises privacy concerns | Privacy This Week | DataGuidance:
"The draft documents have raised privacy concerns about the Framework for both individuals and businesses, particularly in light of the National Security Administration (NSA)'s surveillance programmes."
'via Blog this'
"The draft documents have raised privacy concerns about the Framework for both individuals and businesses, particularly in light of the National Security Administration (NSA)'s surveillance programmes."
'via Blog this'
Java security sandbox tricked into granting full computer access to Applet
Java security sandbox tricked into granting full computer access to Applet:
A Java applet, code-signed to only run in the Java security sandbox, and run on one very particular web site -- can be repurposed and run with all-permissions from the local file system.
A Java applet, code-signed to only run in the Java security sandbox, and run on one very particular web site -- can be repurposed and run with all-permissions from the local file system.
N.S.A. Foils Much Internet Encryption - NYTimes.com
N.S.A. Foils Much Internet Encryption - NYTimes.com: The agency treats its recent successes in deciphering protected information as among its most closely guarded secrets, restricted to those cleared for a highly classified program code-named XXXXXX
"New NIST/NSA Revelations"
"New NIST/NSA Revelations": These disclosures are disturbing for two reasons. First, the process as revealed in the documents contravenes the intent of Congress embodied in the Computer Security Act of 1987.
Wednesday, September 4, 2013
Security Firms Warn Of Potential Banking Trojan Attacks
Security Firms Warn Of Potential Banking Trojan Attacks:
Citadel, a notorious botnet that was partially knocked down in June by legal action taken by Microsoft is resurfacing in Japan.
Citadel, a notorious botnet that was partially knocked down in June by legal action taken by Microsoft is resurfacing in Japan.
Complications from robotic surgery 'widely' underreported - FierceHealthIT
Complications from robotic surgery 'widely' underreported - FierceHealthIT:
Complications from robotic surgery are widely underreported, a new study published in the Journal for Healthcare Quality by researchers from Johns Hopkins University School of Medicine finds.
Complications from robotic surgery are widely underreported, a new study published in the Journal for Healthcare Quality by researchers from Johns Hopkins University School of Medicine finds.
Blood urea nitrogen (BUN) test: Results - MayoClinic.com
Blood urea nitrogen (BUN) test: Results - MayoClinic.com: Results of the blood urea nitrogen test are measured in milligrams per deciliter (mg/dL) in the United States and in millimoles per liter (mmol/L) internationally.
9/3/13
9/3/13
BUN | 27 mg/dl | 7-22 |
Hegelian News & Reviews: Hegel in Berlin (Part One)
Hegelian News & Reviews: Hegel in Berlin (Part One):
"This post is the first of several, dealing with Hegel's time in Berlin from 1818 to 1831. The material is drawn from Karl Rosenkranz's Life of Hegel (1844), the first biography of Hegel."
'via Blog this'
"This post is the first of several, dealing with Hegel's time in Berlin from 1818 to 1831. The material is drawn from Karl Rosenkranz's Life of Hegel (1844), the first biography of Hegel."
'via Blog this'
Dorotheenstadt cemetery - Wikipedia, the free encyclopedia
Dorotheenstadt cemetery - Wikipedia, the free encyclopedia: "The Dorotheenstadt cemetery, officially the "Cemetery of the Dorotheenstadt and Friedrichswerder Parishes", is a landmarked Protestant burial ground located in the Berlin district of Mitte which dates to the late 18th century. The entrance to the 17,000 m2 plot is at 126 Chaussee Straße (next door to the Brecht House, where Bertolt Brecht and Helene Weigel spent their last years, at 125 Chaussee Straße). It is also directly adjacent to the French cemetery (also known as the cemetery of the Huguenots), established in 1780, and is sometimes confused with it."
'via Blog this'
'via Blog this'
Tuesday, September 3, 2013
IOActive Labs Research: Emulating binaries to discover vulnerabilities in industrial devices
IOActive Labs Research: Emulating binaries to discover vulnerabilities in industrial devices: Emulating an industrial device in a controlled environment is a really helpful security tool. You can gain a better knowledge of how it works, identify potential attack vectors, and verify the vulnerabilities you discovered using static methods.
Monday, September 2, 2013
Subscribe to:
Posts (Atom)