Just a basic blog—snagging random stuff that catches our eye—nothing else, really...
Friday, February 28, 2014
FTC: Identity theft is the plague of the country - Network World
And for the 14th consecutive year the winner, or loser really, for 2013 was identity theft, receiving over 290,000 or 14% of the agency’s 2 million overall complaints. Thirty percent of these incidents were tax- or wage-related, which continues to be the largest category within identity theft complaints, the FTC stated.
FBI expects to roll out malware-analysis system to help businesses identify attacks - Network World
The director of the Federal Bureau of Investigation (FBI) said this week his agency plans to introduce a malware-analysis system later this year that will let businesses and the public, report newly identified malware attacks, upload malware samples and receive reports on them.
Thursday, February 27, 2014
New Push to Boost Numbers of Minority STEM Ph.D.s | Inside Higher Ed
California Institute of Technology, Stanford University, and the University of California campuses at Berkeley and Los Angeles jointly announced a new effort Thursday to increase the number of minority Ph.D.s in science, mathematics and technology fields.
Increased sensitivity to low frequency vibration found in people with inherited hearing loss
according to Gary Lewin and Thomas Jentsch. "The skin has several different types of mechanoreceptors, which respond to different qualities of stimuli, especially to different frequency ranges. The interaction of different receptor classes is important for the touch sensation. Although the receptors we studied became more sensitive due to the loss of the potassium channel, this may be outweighed by the disadvantage of the wrong 'tuning to other frequencies'. With KCNQ4 we have for the first time identified a human gene that changes the traits of the touch sensation."
White Ops -- Cool stuff
Our deterministic, real time technology detects the most sophisticated nonhuman or remotely controlled traffic that affects everything from advertising campaigns, exchanges and publishers to enterprise systems, e-commerce transactions, online finance portals, and beyond.
Daylight Saving Time Around the World 2014
This page displays a brief (but not complete) overview over which countries and territories that plan to observe DST during . Note that the list might not be final - countries, territories and states sometimes make adjustments that are announced just days or weeks ahead of the change.
Wednesday, February 26, 2014
ChannelnomicsRSA: Too Much Spent on Antivirus Tech
"We aren't even close to antivirus being old technology," said McAfee president Michael DeCesare. "De Walt makes this noise constantly that the antivirus industry is dead, but show me one single company that has de-installed antivirus because they have FireEye."
From My iPhone
Tuesday, February 25, 2014
FBI — Carlsbad Credit Repair ‘Predator’ Receives Prison Sentence
"Phillips claimed that Georggin Law could file lawsuits in small claims courts and have prior short sales and foreclosures removed from clients' credit reports. In addition to lying about his history and qualifications,"
http://m.fbi.gov/#http://www.fbi.gov/sandiego/press-releases/2014/carlsbad-credit-repair-predator-receives-prison-sentence
From My iPhone
Monday, February 24, 2014
Saturday, February 22, 2014
The day we fought back | TheHill
Now the USA FREEDOM Act stands poised to begin its march towards passage this winter and spring...
From My iPhone
Following the Wh1t3 Rabbit - A Security blog by Rafal Los: Entry level hiring in InfoSec - the comedy of errors
Is creationism compatible with science? The evidence says yes.
They back up the hypothesis that you can be a perfectly good engineer while believing nonsense about the origins of life. We can't wave that evidence away, any more than we can wave away fossils.
From My iPhone
Leonard Nimoy & Wingz 1987 on Vimeo
It's 1987 and the exhibit caused a ruckus on the show floor, a little leaked news item suggested that Leonard Nimoy would be there.
Thursday, February 20, 2014
Breaches: Avoiding Legal Woes - HealthcareInfoSecurity
Healthcare organizations can take several key steps to help avoid the scrutiny of their state's attorney general and defend against possible class action lawsuits in the aftermath of data breaches, says privacy attorney David Navetta.
From My iPhoneWednesday, February 19, 2014
Production firms stir suspicion among networks, would-be clients - The Washington Post
The program, he told her last month, would be hosted by actor Martin Sheen and shown on PBS stations.
How to handle noisy neighbors - MSN Real Estate
Insulation is put between the walls to absorb the echo. And in front of the new exterior wallboard is placed either a barrier, such as mass-loaded vinyl, or a damping agent, such as the popular Green Glue. Some wallboard, such as QuietRock, has damping materials inside.
http://realestate.msn.com/article.aspx?cp-documentid=13108380&page=2
Tuesday, February 18, 2014
2014 Science And Engineering Indicators: 90 Percent Of Americans Respect Scientists
According to the survey, more than 90 percent of Americans think scientists are "helping to solve challenging problems" and are "dedicated people who work for the good of humanity."
From My iPhone
Monday, February 17, 2014
“Consumers for Paper Options” wants the government to push more paper | Ars Technica
Paper industry-funded lobby group restored Social Security paper statements.
From My iPhoneReview of America Unearthed S02E12 "Lincoln's Secret Assassins" - JasonColavito.com
From My iPhone
With Chromebooks A Success, Google Adds Focus On Chromeboxes | TechCrunch
Google is clearly starting to position the Chromebox as a platform.
From My iPhone
Sunday, February 16, 2014
Anita Borg Institute
We connect, inspire, and guide women in computing and organizations that view technology innovation as a strategic imperative.
New Push to Boost Numbers of Minority STEM Ph.D.s | Inside Higher Ed
InfoSec Handlers Diary Blog - More on HNAP - What is it, How to Use it, How to Find it
The protocol was patented originally by Pure Networks, but the protocol is now owned by and the implementation has been carried forward by Cisco.
From My iPhone
Saturday, February 15, 2014
Commissioner Jessica Rosenworcel | FCC.gov
How Loon Works – Project Loon – Google
Each balloon can provide connectivity to a ground area about 40 km in diameter at speeds comparable to 3G. For balloon-to-balloon and balloon-to-ground communications, the balloons use antennas equipped with specialized radio frequency technology. Project Loon currently uses ISM bands (specifically 2.4 and 5.8 GHz bands) that are available for anyone to use.
Create a Long-Distance Wi-Fi Link
But what about beaming a signal 5, 10, 20 miles, or more? Wireless is a natural replacement for land lines, T1s, DSL, and other high-speed data when needed in a remote location.
FCC Certifies Carlson Wireless Technologies TV White Space Radio
The Federal Communications Commission (FCC) has certified the company’s RuralConnect TV white space (TVWS) radio system for use with the Spectrum Bridge TV white spaces database. This certification brings to market the world’s first affordable long-distance, non-line-of-site (NLOS) fixed wireless broadband system.
RuralConnect | TV White Spaces Radio
By making wireless connectivity possible in areas previously difficult or prohibitively expensive to reach, the RuralConnect launches a new era of opportunity for rural communities demanding high-speed internet.
PCI DSS Compliance is No Security Guarantee | The State of Security
A common theme is that many organizations may have passed their assessment at a point in time, but failed to sustain it.
From My iPhone
Why Bitcoin Matters - NYTimes.com
What technology am I talking about? Personal computers in 1975, the Internet in 1993, and – I believe – Bitcoin in 2014.
From My iPhoneFriday, February 14, 2014
Endpoint Security | Malware Detection Remediation | Detect Targeted Attacks
identifies breaches, provides actionable analysis, stops the attack and repairs the machine - in real-time.
Antivirus Software: No Match For Potential Cybercrime | WebProNews
one criminal customer managed to rake in $3.2 million in half a year via the virus.
From My iPhone
Thursday, February 13, 2014
Endpoint Security | Malware Detection Remediation | Detect Targeted Attacks
Triumfant identifies breaches, provides actionable analysis, stops the attack and repairs the machine - in real-time.
Monday, February 10, 2014
Healthcare Information Security: Still No Respect - InformationWeek
From My iPhone
The Buck Stops At BYOC - InformationWeek
Red Or Blue, I'm Usually The Only Woman On The Team -- Dark Reading
Richest 1 Percent Hold 46 Percent Of The World's Wealth
How the NSA Almost Killed the Internet | Threat Level | Wired.com
Tutorial: Deploying a WordPress Blog on Your Amazon EC2 Windows Instance - Amazon Elastic Compute Cloud
Choose your wallet - Bitcoin
Protecting Your Enterprise From DNS Threats -- Dark Reading
DNS clients have to trust the information they receive, but when DNS was designed back in the '80s, scalability and availability were the key goals. Little attention was given to security.
How Hackers Target and Hack Your Site - InfoSec Institute
Our aim in this article to show you the techniques most used by hackers in targeting and hacking your Wordpress site!
Want to Predict the Future of Surveillance? Ask Poor Communities.
Sunday, February 9, 2014
How Big Pharma Brainwashes Americans into Believing They're Sick
Unbranded advertising, however, is much more insidious. Instead of selling a drug, it sells the disease driving the drug sales and sometimes doesn't mention the drug at all.
The Way of Mrs. Cosmopilite - Discworld & Terry Pratchett Wiki
Saturday, February 8, 2014
FSB's Olympic Spying | Opinion | The Moscow Times
Russian intelligence agencies are violating the law when they gather metadata on citizens without a court order.
Privacy roadmap
http://data-security.co3sys.com/security-breach-regulation-roadmap/?source=adwords
From My iPhone
Friday, February 7, 2014
Our Best Weapon Against Revenge Porn: Copyright Law? - Atlantic Mobile
http://m.theatlantic.com/technology/archive/2014/02/our-best-weapon-against-revenge-porn-copyright-law/283564/?google_editors_picks=true
From My iPhone
Thursday, February 6, 2014
FSB Makes Eavesdropping an Olympic Event | Opinion | The Moscow Times
Rossiiskaya Gazeta published a government decree signed by Prime Minister Dmitry Medvedev that effectively announced plans to collect metadata from all Olympics participants, including athletes, event judges and journalists.
Wednesday, February 5, 2014
Public Records - Florida Division of Elections - Department of State
http://election.dos.state.fl.us/voting/public.shtml
This information can find its way onto the Internet or websites by individuals or entities that obtain public records from the State. A website may offer you the option to remove your information for a fee. Please be advised that it will only apply to that particular website.
Multiple States Deny Parents the Right to Opt a Child Out of SLDS Tracking | COMMON CORE
So, the “Bureau Chief” of the PK20 Florida Data Warehouse informed the Florida parent that he was “unable to identify opt out provisions to PK2O Education Data Warehouse.”
Also see:
http://election.dos.state.fl.us/pdf/webappform.pdf
and
http://flvoters.com/by_number/1010/29773.html
Once filed, all information including your phone number and email address as provided
become public record...
Tuesday, February 4, 2014
Sunday, February 2, 2014
Hackers exploit SCADA holes to take full control of critical infrastructure | Computerworld Blogs
http://m.blogs.computerworld.com/cybercrime-and-hacking/23402/hackers-exploit-scada-holes-take-full-control-critical-infrastructure?mm_ref=http%3A%2F%2Ft.co%2Fkg1mf393Wt
From My iPhone
BBC News - The upside to being let go by Nokia
From My iPhone
Johnson & Johnson Will Release Clinical Data to Researchers : News : Counsel & Heal
http://www.counselheal.com/articles/8514/20140201/johnson-johnson-will-release-clinical-data-to-researchers.htm
From My iPhone
BBC News - Drug trafficking is speeding deforestation in Central America
Remote forests in Honduras and Guatemala are being cut down to facilitate landing strips for the transportation of narcotics.
From My iPhone