Monday, September 30, 2013

FireAMP Fights Malware with Big Data Analytics | PCWorld

FireAMP Fights Malware with Big Data Analytics | PCWorld:

In and of itself, FireAMP defies easy classification. It is a new type of security tool that does not fit easily into any standard categories like antivirus, or antispyware, or firewall. Yet, it seems to have some overlap with existing security tools to augment their capabilities.

Goodbye, Encryption; Hello, FOSS | Community | LinuxInsider

Goodbye, Encryption; Hello, FOSS | Community | LinuxInsider:

"I have a basic question: What is the privacy/security health of the Linux kernel (and indeed other FOSS OSes) given all the recent stories about the NSA going in and deliberately subverting various parts of the privacy/security sub-systems?"

US government is now the biggest buyer of malware, Reuters reports | The Verge

US government is now the biggest buyer of malware, Reuters reports | The Verge:

Former White House cybersecurity advisors Howard Schmidt and Richard Clarke say this move to "offensive" cybersecurity has left US companies and average citizens vulnerable, because it relies on the government collecting and exploiting critical vulnerabilities that have not been revealed to software vendors or the public.

Saturday, September 28, 2013

TAXII - News

TAXII - News: Microsoft Corporation announced on July 29, 2013 that it plans to support TAXII and Structured Threat Information Expression (STIX™) in an article entitled "New MAPP Initiatives" on Microsoft's "BlueHat Blog."

MAEC - Use Cases

MAEC - Use Cases: At its highest level, MAEC is a domain-specific language for non-signature based malware characterization.

New MAPP Initiatives - Microsoft BlueHat Blog - Site Home - TechNet Blogs

New MAPP Initiatives - Microsoft BlueHat Blog - Site Home - TechNet Blogs: Since the program launched, there has been little external change to how it operates. Internally, we have made slight adjustments to how the program is managed but by and large, it is the same program it was in 2008 and the same program our partners still say is essential to their operations.

Friday, September 27, 2013

Is the anti-virus industry in bed with the NSA – why do CIPAV, FinFisher and DaVinci still defeat AV? | Kevin Townsend

Is the anti-virus industry in bed with the NSA – why do CIPAV, FinFisher and DaVinci still defeat AV? | Kevin Townsend:

Without any evidence he says:

"Is the AV industry in bed with the NSA? The simple fact is that we just do not know. The industry itself denies it – but, well, it would, wouldn’t it? Statistically, since almost every other aspect of the security industry collaborates with or has been subverted by the NSA, my suspicion is that it is. At the very least, I suspect it engages in ‘tacit connivance’."

Gene Patent Ban Could Lead to More Genetic Tests - Alzheimer's Disease Center - Everyday Health

Gene Patent Ban Could Lead to More Genetic Tests - Alzheimer's Disease Center - Everyday Health: "With the lift on these gene patents could come a new wave of genetic testing, and the options for patients and doctors could increase dramatically."

'via Blog this'

Impact of gene patents and licensing practices on ... [Genet Med. 2010] - PubMed - NCBI

Impact of gene patents and licensing practices on ... [Genet Med. 2010] - PubMed - NCBI: "Patents cover the HFE gene, related proteins, screening methods, and testing kits. Most initial testing for hereditary hemochromatosis is biochemical, but HFE deoxyribonucleic acid testing or genotyping is used to confirm a diagnosis of inherited hemochromatosis."

'via Blog this'

Math Advances Raise the Prospect of an Internet Security Crisis | MIT Technology Review

Math Advances Raise the Prospect of an Internet Security Crisis | MIT Technology Review: "Academic advances suggest that the encryption systems that secure online communications could be undermined in just a few years."

'via Blog this'

Anti-Encryption Measures Free NSA to Access Web Data without Going to Providers | MIT Technology Review

Anti-Encryption Measures Free NSA to Access Web Data without Going to Providers | MIT Technology Review: "Leaked documents suggest that American spies can decrypt much of the data they collect by tapping into Internet service providers and telecommunications cables."

'via Blog this'

The NSA Hasn’t “Cracked” Encryption—It’s Just Reminded Us of the Ways Around It | MIT Technology Review

The NSA Hasn’t “Cracked” Encryption—It’s Just Reminded Us of the Ways Around It | MIT Technology Review: "However, cryptography experts tell MIT Technology Review that a close reading of last week’s report suggests the NSA has not broken the underlying mathematical operations that are used to cloak online banking or e-mail."

'via Blog this'

Thursday, September 26, 2013

Former NSA chief: ‘Morally arrogant’ Snowden will probably become an alcoholic

Former NSA chief: ‘Morally arrogant’ Snowden will probably become an alcoholic:

"I welcome the debate, but I want the debate to be based on fact,"

Snowden Leaks, NSA Activities Complicate Push for Cybersecurity Law

Snowden Leaks, NSA Activities Complicate Push for Cybersecurity Law:

“If we thought that information-sharing was moving slowly before, now it’s moving even more slowly,” a senior administration official said in an interview granted on condition of anonymity.

Gastromanagement Berlin | Lindenbr�u im Sony Center

Gastromanagement Berlin | Lindenbr�u im Sony Center:

Are you very hungry or do you have only appetite for something delicious – no problem - in our restaurant Lindenbr�u the cooking team offers a rich choice of regional dishes and Bavarian specialities

Grieving as an atheist: a surprising dilemma | Tiffany White | Comment is free | theguardian.com

Grieving as an atheist: a surprising dilemma | Tiffany White | Comment is free | theguardian.com:

"I started to realize that the life of an atheist was a tad bleak. The more I spoke, the darker the conversation became."

'via Blog this'

RSA, Oracle Tools Help Businesses Manage Qualys Vulnerability Data | Qualys Technology | Qualys Community

https://community.qualys.com/blogs/qualys-tech/2013/09/24/rsa-oracle-tools-help-businesses-manage-qualys-vulnerability-data


From My iPhone

Empowering Information Sharing: Release of pyNSSFClient | CrowdStrike

Empowering Information Sharing: Release of pyNSSFClient | CrowdStrike:

One of the lesser-known facts about the computer security business is that vendors exchange malware samples with each other, often through mutual sharing arrangements.

Monday, September 23, 2013

Friday, September 20, 2013

Statistics about Business Size (including Small Business) from the U.S. Census Bureau

Statistics about Business Size (including Small Business) from the U.S. Census Bureau:

"Table includes both establishments with payroll and nonemployers. For descriptions of column headings and rows (industries), click on the appropriate underlined element in the table."

'via Blog this'

Cigarette pack computer

custom_fag_pack.png (PNG Image, 500�נ373 pixels)

Advanced Malware Communications: What Every Security Professional Should Know | BrightTALK

Advanced Malware Communications: What Every Security Professional Should Know | BrightTALK: By capturing details of both advanced and more generic malware attacks and monitoring callback activity, a great deal can be learned about an attacker’s intentions, interests and geographic location.

The Story of Layla and Majnun - World Stories

The Story of Layla and Majnun - World Stories: Overcome with regret and loss, Majnun retreated inside of himself entirely and vowed to live in the desert until his own death.

Sunday, September 15, 2013

FBI Admits It Controlled Tor Servers Behind Mass Malware Attack | Threat Level | Wired.com

FBI Admits It Controlled Tor Servers Behind Mass Malware Attack | Threat Level | Wired.com: Court documents and FBI files released under the FOIA have described the CIPAV as software the FBI can deliver through a browser exploit to gather information from the target’s machine and send it to an FBI server in Virginia. The FBI has been using the CIPAV since 2002 against hackers, online sexual predators, extortionists, and others, primarily to identify suspects who are disguising their location using proxy servers or anonymity services, like Tor.

Leaked FinFisher presentation details toolkit's spying capabilities

http://www.net-security.org/malware_news.php?id=2575

Seriously?

Errata Security: NSA's Fort Belvoir and Star Trek

http://blog.erratasec.com/2013/09/nsas-fort-belvoir-and-star-trek.html#.UjYj3ZDn_0x

The NRO - Its Mission, History, and People

http://www.theblackvault.com/m/articles/view/The-NRO-Its-Mission-History-and-People#.UjYjnJDn_0w

Gone Phishing: How Major Websites Get Hacked

http://news.nationalgeographic.com/news/2013/08/130828-new-york-times-hacked-syrian-electronic-army-twitter-phishing/


From My iPhone

Breaking My Silence | The Nation

Inspiring stuff:

http://www.thenation.com/article/176030/breaking-my-silence#


From My iPhone

Chris Stringer on the Origins and Rise of Modern Humans - NYTimes.com

http://www.nytimes.com/2012/07/17/science/chris-stringer-on-the-origins-and-rise-of-modern-humans.html?pagewanted=all&_r=3&


From My iPhone

Faxaway's Internet Fax Service.

http://faxaway.com/


From My iPhone

Friday, September 13, 2013

Defending Against DDoS Attacks | Security Management

Defending Against DDoS Attacks | Security Management: Distributed denial of service (DDoS) attacks—in which a Web site is bombarded with such a volume of traffic that legitimate users can’t access it—are on the rise.

READY OR NOT ? Twitter Instagrap Location app

READY OR NOT ?: This app shows how people could use your social-media posts to find you in the physical world. It uses GPS data attached to Twitter and Instagram posts to create a map of where someone's been posting from recently.

GPGTools - It's worth protecting what you love

GPGTools - It's worth protecting what you love: Use GPG Suite to encrypt, decrypt, sign and verify files or messages. Manage your GPG Keychain with a few simple clicks and experience the full power of GPG easier than ever before.

20 Euros via PayPal

Cost-Benefit Analysis Of NSA Surveillance Says It's Simply Not Worth It | Techdirt

Cost-Benefit Analysis Of NSA Surveillance Says It's Simply Not Worth It | Techdirt: A new study suggests that the direct losses to US tech companies from people and companies fleeing to other services (often overseas) is likely to be between $22 billion and $35 billion over just the next three years.

NSA 'routinely' shares Americans' data with Israel - Snowden leak — RT News

NSA 'routinely' shares Americans' data with Israel - Snowden leak — RT News: The NSA regularly shares raw US intelligence data with Israel without even removing information about American citizens, according to the latest revelation published by the Guardian. The report is based on a document leaked by Edward Snowden.

The June 5 juggernaut rolls on...

Reading the Noises by William Finnegan | Byliner

Reading the Noises by William Finnegan | Byliner: A friend writes: There are probably people who can identify all sorts of emergency vehicles simply by their sirens, cocking an ear and announcing “State Police” or “County Hospital,” the way bird-lovers can identify unseen birds by their cries.

Wednesday, September 11, 2013

elliptic curves - Who uses Dual_EC_DRBG? - Cryptography Stack Exchange

elliptic curves - Who uses Dual_EC_DRBG? - Cryptography Stack Exchange: Even before the potential backdoor was discovered back in 2007, the Dual_EC_DRBG was known to be much slower and slightly more biased than all the other random number generators in NIST SP 800-90. To quote Bruce Schneier:

Tuesday, September 10, 2013

Layla and Majnun

Layla and Majnun: A scene from Nizami's adaptation of the story. Layla and Majnun meet for the last time before their deaths.

http://en.academic.ru/dic.nsf/enwiki/631424

Monday, September 9, 2013

Mixon 619 232 8665

Deli breakfast / lunch menu for downtown San Diego businesses and tourists.: #7 BANKER'S SPECIAL: Roast Beef and cheddar with mayo, thousand island dressing, lettuce, tomatoes, and onions......$6.49

MUM Composers

MUM Composers: The guitarist's guitarist, Steve Donnelly is one of the great stylists of today on his instrument. Known for his eclectic styles on acoustic and electric, he has brought magic to recordings of many artists such as Sheryl Crow, Suzanne Vega, Elvis Costello, Mick Jagger, Tasmin Archer, Mitchell Froom, Nick Lowe, Katie Melua and Bonnie Raitt. He is also featured on Randy Newman's highly acclaimed latest album "Harps & Angels".

Sunday, September 8, 2013

How PatientSecure Works

How PatientSecure Works:

PatientSecure has been adopted primarily with palm vein recognition technology, which provides highly accurate patient identification that works by scanning the vein pattern of a patient’s palm.

Saturday, September 7, 2013

"Grandma Scams" on the Rise in California | NBC Southern California

California cases

http://www.nbclosangeles.com/news/local/Grandma-Scams-on-the-Rise-in-California-131487628.html


From My iPhone

Popular scam takes 'go ask grandma' to new level | HamptonRoads.com | PilotOnline.com

Small town coverage.

http://hamptonroads.com/2013/07/popular-scam-takes-go-ask-grandma-new-level


From My iPhone

“Hi Grandma” Scam Makes Blood Boil « BBB Consumer News and Opinion Blog

The Federal Trade Commission reports that 60,000 complaints about this type of fraud were filed last year.

http://www.bbb.org/blog/2012/07/hi-grandma-scam-makes-blood-boil/


From My iPhone

Posting Personal Information Online Invites Scammers and ThievesAging Parents – Elder Care – Senior Homes – Caregiving

Another example granny or grandma scam:

http://m.agingcare.com/Articles/scammers-steal-elders-persional-information-online-146101.htm


From My iPhone

Seal Beach Grandma Scammed out of $30K; Man Sought - Police & Fire - Los Alamitos-Seal Beach, CA Patch

Need to raise awareness

http://losalamitos.patch.com/groups/police-and-fire/p/police-seek-scammer-who-stole-30k-from-seal-beach-grac753915c0c


From My iPhone

'Lone Survivors' -- Why we are the only 'humans' on earth

http://www.allvoices.com/contributed-news/15428955-lone-survivor-why-we-are-the-only-humans-on-earth


From My iPhone

Friday, September 6, 2013

Sweden sits on pipeline of intelligence 'gold' - The Local

Sweden sits on pipeline of intelligence 'gold' - The Local:

A Swedish expert said it's "quite likely" Sweden helps the NSA tap intelligence information flowing through underwater cables in the Baltic Sea, adding Sweden's government leaders certainly know about the operations.

Thursday, September 5, 2013

USA: Draft Cybersecurity Framework raises privacy concerns | Privacy This Week | DataGuidance

USA: Draft Cybersecurity Framework raises privacy concerns | Privacy This Week | DataGuidance:

"The draft documents have raised privacy concerns about the Framework for both individuals and businesses, particularly in light of the National Security Administration (NSA)'s surveillance programmes."

'via Blog this'

Java security sandbox tricked into granting full computer access to Applet

Java security sandbox tricked into granting full computer access to Applet:

A Java applet, code-signed to only run in the Java security sandbox, and run on one very particular web site -- can be repurposed and run with all-permissions from the local file system.

N.S.A. Foils Much Internet Encryption - NYTimes.com

N.S.A. Foils Much Internet Encryption - NYTimes.com: The agency treats its recent successes in deciphering protected information as among its most closely guarded secrets, restricted to those cleared for a highly classified program code-named XXXXXX

"New NIST/NSA Revelations"

"New NIST/NSA Revelations": These disclosures are disturbing for two reasons. First, the process as revealed in the documents contravenes the intent of Congress embodied in the Computer Security Act of 1987.

Wednesday, September 4, 2013

Security Firms Warn Of Potential Banking Trojan Attacks

Security Firms Warn Of Potential Banking Trojan Attacks:

Citadel, a notorious botnet that was partially knocked down in June by legal action taken by Microsoft is resurfacing in Japan.

Complications from robotic surgery 'widely' underreported - FierceHealthIT

Complications from robotic surgery 'widely' underreported - FierceHealthIT:

Complications from robotic surgery are widely underreported, a new study published in the Journal for Healthcare Quality by researchers from Johns Hopkins University School of Medicine finds.

Blood urea nitrogen (BUN) test: Results - MayoClinic.com

Blood urea nitrogen (BUN) test: Results - MayoClinic.com: Results of the blood urea nitrogen test are measured in milligrams per deciliter (mg/dL) in the United States and in millimoles per liter (mmol/L) internationally.

9/3/13
BUN27 mg/dl7-22

Hegelian News & Reviews: Hegel in Berlin (Part One)

Hegelian News & Reviews: Hegel in Berlin (Part One):

"This post is the first of several, dealing with Hegel's time in Berlin from 1818 to 1831. The material is drawn from Karl Rosenkranz's Life of Hegel (1844), the first biography of Hegel."

'via Blog this'

Dorotheenstadt cemetery - Wikipedia, the free encyclopedia

Dorotheenstadt cemetery - Wikipedia, the free encyclopedia: "The Dorotheenstadt cemetery, officially the "Cemetery of the Dorotheenstadt and Friedrichswerder Parishes", is a landmarked Protestant burial ground located in the Berlin district of Mitte which dates to the late 18th century. The entrance to the 17,000 m2 plot is at 126 Chaussee Straße (next door to the Brecht House, where Bertolt Brecht and Helene Weigel spent their last years, at 125 Chaussee Straße). It is also directly adjacent to the French cemetery (also known as the cemetery of the Huguenots), established in 1780, and is sometimes confused with it."

'via Blog this'