Just a basic blog—snagging random stuff that catches our eye—nothing else, really...
Wednesday, April 30, 2014
Texas paid search firm $267K in Charlie Strong hiring | Battle Creek Enquirer | battlecreekenquirer.com
The executive search firm Korn/Ferry International billed Texas $250,000 for helping hire coach Charlie Strong in January
A History of Biological Warfare from 300 B.C.E. to the Present
Dire DJ, Long DA, Williams LD, Historical Aspects of Biological Warfare, Emedicine.
Tuesday, April 29, 2014
DJI Phantom 2 | Cannes DP Edition P2 Aerial Kit - DSLRPros | DSLR Rigs|Products|Dslrpros.com
"The Phantom 2 is unbelievably easy to fly. Combined with smooth, stabilized footage from the H3-2D gimbal, aerial cinematography and videography has never been easier."
'via Blog this'
Saturday, April 26, 2014
Here's How 'Big Data' Can Really Hurt The Poor
Everything We Know About What Data Brokers Know About You - ProPublica
Databases collect your personal information and invasion of privacy
Friday, April 25, 2014
Thursday, April 24, 2014
The Nine Basic Patterns of Cyber Threats
After analyzing 10 years of data, we realize most organizations cannot keep up with cybercrime – and the bad guys are winning.
Wednesday, April 23, 2014
Rules - 2014 - Rescheduling of Hydrocodone Combination Products From Schedule III to Schedule II
DEA wants to further restrict hydrocodone and public can comment.
http://www.deadiversion.usdoj.gov/fed_regs/rules/2014/fr0227.htm
Tuesday, April 22, 2014
AG Coakley Investigates Potential Data Breach Involving Major Credit Reporting Company
Ngo gained access to the personal information when he obtained an account with a U.S. company known as Court Ventures by posing as a private investigator from Singapore.
Monday, April 21, 2014
BBC News - Did removing lead from petrol spark a decline in crime?
So... did the lead that we added to our petrol do something so much worse? Was it the cause of a decades-long crime wave that is only now abating as the poisonous element is removed from our environment?
Sunday, April 20, 2014
Legal, Privacy, and Security | Tesla Motors
Tesla values the work done by security researchers in improving the security of our products and service offerings.
Saturday, April 19, 2014
Friday, April 18, 2014
Why is the controversy surrounding Safe Harbor making 2014 a crucial year? | Peak 10
The NSA/Snowden debacle was a tipping point. Outraged by the revelation, the European Commission issued 13 recommendations to improve the enforcement and adequacy of Safe Harbor, including proposals that the FTC should subject companies to independent compliance audits. The deadline for implementing these recommendations is summer 2014. Viviane Reding, European Commissioner, put it this way: "Safe Harbor has to be strengthened, or it will be suspended."
Guide to 24 medical marijuana strains | Northwest Leaf: The Patients voice
and the uniquely functional indica effect allows light intake to provide functional pain relieving effects and heavier intake to provide an excellent sleeping aid.
Http://www.thenorthwestleaf.com/pages/articles/post/guide-to-24-medical-marijuana-strains
Thursday, April 17, 2014
Here's how Android users can control their desktops with their devices - latimes.com
What could possibly go wrong!
Monday, April 14, 2014
Tax ID Fraud
Examples of Identity Theft Schemes - Fiscal Year 2014
Marketplace with Kai Ryssdal: The Road Show | Marketplace.org
To celebrate its 25th year of bringing economics to life, Marketplace� is hitting the road.
Strathmore - Events & Tickets - Calendar
Join Marketplace host Kai Ryssdal — plus reporters Adriene Hill, Stacey Vanek Smith, Lizzie O’Leary, Rob Schmitz and Paddy Hirsch — as they humanize the numbers. It’s an evening of radio, with sound elements, interviews and engaging storytelling. What Marketplace does best, but in person, on stage, and in your city.
Saturday, April 12, 2014
Coal and cyber
Friday, April 11, 2014
Self-Described Hacker Says He Warned Univ. Of Md. Before Data Breach « CBS Baltimore
"I went into the systems, I found how bad their security was and then I passed that information on to the university," said Helkowski.
http://baltimore.cbslocal.com/2014/04/10/whistleblower-says-he-warned-university-of-maryland-before-data-breach-2/From My iPhone
Keith Alexander Speaks: "The NSA Protects America's Privacy And Civil Liberties" | Zero Hedge
Our capabilities give us the power to change the narrative by making our networks more secure—and ensuring that cyberspace itself becomes a safer place for commerce, social interaction and the provision of public services. We want to take this opportunity to put these developments in historical context, and then explain why we as a nation must continue to build a cyberenterprise capable of guarding our critical infrastructure and population. We can and must do this while always protecting civil liberties, personal privacy and American values.
Has the NSA Been Using the Heartbleed Bug as an Internet Peephole? | Threat Level | WIRED
http://www.wired.com/2014/04/nsa-heartbleed/
From My iPhone
NSA monitors WiFi on US planes ‘in violation’ of privacy laws — RT USA
From My iPhone
Edward Snowden says the NSA ignored his formal complaints before he leaked classified documents - NY Daily News
http://m.nydailynews.com/1.1749916
From My iPhone
Poisoned | IDFA
'via Blog this'
Thursday, April 10, 2014
The Sins of Arrogance Bear Bitter Fruit | Michael Brenner
"Americans' abuse of drugs - rather than accepting the simple truth is that the causes lie in those features of American life that produce millions who crave addictive substances."
'via Blog this'
The Sins of Arrogance Bear Bitter Fruit | Michael Brenner
"Americans' abuse of drugs - rather than accepting the simple truth is that the causes lie in those features of American life that produce millions who crave addictive substances."
'via Blog this'
Wednesday, April 9, 2014
Jim's auto upholstery
Complete Auto Upholstery
When your car interior begins to look worn and outdated, Jim's Auto Upholstery will help! We offer an array of services to restore and upgrade your auto's seats and upholstery. From re-upholstery in a variety of styles and colors to replacing carpet, we offer complete auto upholstery services for all vehicle makes and models.
Tuesday, April 8, 2014
Most websites may already be completely pwned by the Heartbleed Bug
It is unknown if, or how often, this attack has been run in the wild. It is entirely possible that major players, like national intelligence services, may have known about this for some time, and could have been silently intercepting traffic to certain websites, potentially for over 2 years.
Heartbleed Bug
"We attacked ourselves from outside, without leaving a trace. Without using any privileged information or credentials we were able steal from ourselves the secret keys used for our X.509 certificates, user names and passwords, instant messages, emails and business critical documents and communication."
Ninja, Samurai, Shogun, and Ronin | Krypt3ia
" I am writing this post ... for those who wish to consider themselves Ninja as well as perhaps reach those defenders or "blue team" folks to understand the landscape here from a historical perspective as well as a tactical one. Given the nature of the threats today..."
http://krypt3ia.wordpress.com/2014/03/26/ninja-samurai-shogun-and-ronin/
Monday, April 7, 2014
DJI Phantom 2 | Cannes DP Edition P2 Aerial Kit - DSLRPros | DSLR Rigs|Products|Dslrpros.com
'via Blog this'
Sunday, April 6, 2014
Off the shelf, on the skin: Stick-on electronic patches for health monitoring -- ScienceDaily
Saturday, April 5, 2014
Oh, those charmers at seterus Mortgage
IBM Laying Off Workers At Seterus Beaverton Mortgage Division
IBM is relocating or laying off some its employees in Beaverton, according to two anonymous sources. The positions at stake were part of an IBM fully owned subsidiary, Seterus, which handles mortgages for clients like banks.
Thursday, April 3, 2014
RSA's Call to End Digital Wars Is Either Cynical Or Naive
Furthermore, the message of peace being pushed by RSA folks this week will only serve it well as the company looks to distance itself from the security world’s current b�te noire, the NSA. It has to push a positive message, it cannot simply fall on its sword. That’s why it presents itself as a digital peacenik, even if it is being disingenuous, and doesn’t really believe what it is saying.
Examples of Identity Theft Schemes - Fiscal Year 2013
The following examples of identity theft schemes are written from public record documents on file in the court records in the judicial district in which the cases were prosecuted.
Inside the NSA’s Secret Efforts to Hunt and Hack System Administrators - The Intercept
https://firstlook.org/theintercept/article/2014/03/20/inside-nsa-secret-efforts-hunt-hack-system-administrators/
From My iPhone