Just a basic blog—snagging random stuff that catches our eye—nothing else, really...
Friday, May 30, 2014
JONESBORO, Ark.: Data breach reported in Arkansas State department | Technology | Columbus Ledger Enquirer
Thursday, May 29, 2014
Unencrypted USB drive stolen, 3,000 Humana members in Atlanta impacted - SC Magazine
Privacy International probes GCHQ's mouse fetish • The Register
Wednesday, May 28, 2014
Only 51% of anti-virus scanners detect zero-day malware | Myce.com
VirusTotal uses dozens of virus scanners which scan uploaded files. The
website is mainly intended to be a second opinion and is according to
the developers not usable for testing and rating anti-virus software.
VirusTotal uses the command line version of virus scanners which can
differ from the desktop version used by most consumers.
What To Do If Your iPhone Is Hacked And Remotely Locked
Microsoft Identifies New Malware Dropping Sefnit Botnet | Threatpost | The first stop for security news
Researchers find large global botnet of infected PoS systems - PC World Magazine New Zealand
NTLM security flaws show attackers don't need latest malware to thrive
Tuesday, May 27, 2014
Appeals Court Rules California Hospital Not Liable for Data Breach - California Healthline
AVAST Shuts Down Forum Following Data Breach | SecurityWeek.Com
Monday, May 26, 2014
CDCA - Centro di Documentazione sui Conflitti Ambientali
Citizens exposed to fumigation reported the following complaints: nausea, vomiting, fever, skin rushes, respiratory problems, abdominal pains, headaches, eye infections, genital irritation, birth defects, a higher number of miscarriages, etc.;
Friday, May 23, 2014
Developers, ask your users about data privacy | ZDNet
Now Silicon Valley does tend to try solving social problems by throwing technology at them — when all you have is a hammer, as they say — but Dennedy says that "privacy engineering" isn't like that.
http://www.zdnet.com/developers-ask-your-users-about-data-privacy-7000029795/From My iPhone
Thursday, May 22, 2014
Nevada Massachusetts and Beyond Complying with Personal ID Encryption Mandates
'via Blog this'
Guard your Grindr: the best antivirus software you need | Gay Star News
ESET can put all your Internet security fears to rest. They provide the very best antivirus software at a range of packages to suit everyone.
- See more at: http://www.gaystarnews.com/article/guard-your-grindr-best-antivirus-software-you-need200514#sthash.GYvdziYi.dpufFrom My iPhone
Everyone should know just how much the government lied to defend the NSA | Trevor Timm | Commentisfree | The Guardian
From My iPhone
Giving NSA the boot – California bids to end spying on its citizens — RT USA
http://rt.com/usa/160104-nsa-spying-california-snowden/
From My iPhone
Wednesday, May 21, 2014
backup - Does an equivalent of Time Machine exist for Windows? - Super User
SoHo Routers Hacked by ISE
OIL AND GAS: Spills up 17 percent in U.S. in 2013 -- Monday, May 12, 2014 -- www.eenews.net
Some of the biggest jumps were in the booming Bakken Shale. North Dakota,
From My iPhone
Tuesday, May 20, 2014
US Homes Surpass 500 Million Internet-Connected Devices, 5.7 Each
'via Blog this'
New Malware Targeting Syrian Activists Uses Blackshades Commercial Trojan | Electronic Frontier Foundation
What To Do If Your MacBook Battery Won't Charge | PCMag.com
Monday, May 19, 2014
Friday, May 16, 2014
Tallinn Hotel - Luxury Hotel Tallinn - Swissotel Tallinn
Use Google Forms to create a survey - TechRepublic
Thursday, May 15, 2014
Psychology of Intelligence Analysis
- Once an experienced analyst has the minimum information necessary to make an informed judgment, obtaining additional information generally does not improve the accuracy of his or her estimates. Additional information does, however, lead the analyst to become more confident in the judgment, to the point of overconfidence.
From My iPhone
Monday, May 12, 2014
Tim Danahey and Chris Mitchell Talk Muni's | community broadband networks
Tim Danahey recently brought Chris Mitchell on his show to talk about municipal networks and their role in preserving network neutrality. Tim is a fan of the Institute for Local Self-Reliance and our work.
http://muninetworks.org/content/tim-danahey-and-chris-mitchell-talk-munisFrom My iPhone
Saturday, May 10, 2014
Bible in high-school studies is part of Hobby Lobby president's evangelization push - Dallas News, Sports, Weather and Traffic from The Dallas Morning News
http://www.dallasnews.com/news/local-news/20140507-bible-in-high-school-studies-is-part-of-hobby-lobby-president-s-evangelization-push.ece
From My iPhone
NSA's Prism Could Cost U.S. Cloud Companies $45 Billion - InformationWeek
'via Blog this'
Friday, May 9, 2014
NSA and British counterpart GCHQ seek ways of monitoring airplane passenger communication: Greenwald - NY Daily News
Entrevista a Stephen Cobb de ESET Norte América - YouTube
De modo que aprovechamos la ocasión y lo entrevistamos, especialmente para hablar sobre algunas cuestiones vinculadas a la privacidad en Internet y las tendencias mundiales en malware.
"
'via Blog this'
Nevada Massachusetts and Beyond Complying with Personal ID Encryption Mandates
'via Blog this'
Thursday, May 8, 2014
Other Agencies Clamor for Data N.S.A. Compiles - NYTimes.com
The NSA is giving your phone records to the DEA. And the DEA is covering it up.
Snowden confirms NSA created Stuxnet with Israeli aid — RT News
NSA malware turns your iPhone into a spy device, obliterating your privacy | Privacy SOS
BBC News - NSA 'infected' 50,000 networks with malware
The NSA Reportedly Infected 50,000 Computer Networks With Malware -- Are You Affected?
NSA's TURBINE robot can pump 'malware into MILLIONS of PCs' • The Register
NSA posed as Facebook to infect computers with malware - Los Angeles Times
NSA reportedly intercepting laptops purchased online to install spy malware | The Verge
How the NSA Plans to Infect 'Millions' of Computers with Malware - The Intercept
IDC Forecasts Worldwide Public IT Cloud Services Spending to Reach Nearly $108 Billion by 2017 as Focus Shifts from Savings to Innovation - prUS24298013
Thales and Ponemon Institute study shows increased use of encryption and further key management challenges | Thales Group
NSA denies report it exploited Heartbleed for years
'via Blog this'
Has the NSA Been Using the Heartbleed Bug as an Internet Peephole? | Threat Level | WIRED
'via Blog this'
The NSA's Heartbleed problem is the problem with the NSA | Julian Sanchez | Technology | theguardian.com
'via Blog this'
Wednesday, May 7, 2014
sysdig | Home
Think of it as strace tcpdump lsof awesome sauce.
Tuesday, May 6, 2014
Monday, May 5, 2014
Sunday, May 4, 2014
Saturday, May 3, 2014
How I Learned to Stop Being a Literary Snob and Love Romance | Book Reviews & Recommendations | Bookish.com
Northrop CEO urges Congress to pass cybersecurity legislation - The West Australian
https://au.news.yahoo.com/thewest/news/a/22724341/northrop-ceo-urges-congress-to-pass-cybersecurity-legislation/
From My iPhone
BMW 120d - Mini Test Road Test - Car Reviews - Car and Driver
http://www.caranddriver.com/reviews/bmw-120d-mini-test-road-test
From My iPhone
Tax fraud and identity theft reported among employees of Portland Archdiocese | Local & Regional | KATU.com - Portland News, Sports, Traffic Weather and Breaking News - Portland, Oregon
http://www.katu.com/news/local/members-of-the-archdiocese-of-portland-possibly-targeted-by-tax-fraud-scheme.html?mobile=y
From My iPhone
Friday, May 2, 2014
Why Perimeter Defenses Are No Longer Enough - Dark Reading
Millions of dollars in security tool spend, tens of security team members. Strong leading-edge tools like FireEye in place. Yet, how did that work out for them?
Hospital medical errors now the third leading cause of death in the U.S. - FierceHealthcare
Read more: Hospital medical errors now the third leading cause of death in the U.S. - FierceHealthcarehttp://www.fiercehealthcare.com/story/hospital-medical-errors-third-leading-cause-death-dispute-to-err-is-human-report/2013-09-20#ixzz30ZowHGBA
Subscribe at FierceHealthcare
From My iPhone
Thursday, May 1, 2014
University guide 2014: league table for social policy and administration | Education | theguardian.com
University of Leicester #13 among UK universities. And in UK top 3 for social policy and administration (criminology).
The University of Leicester was awarded the prestigous title of University of the Year 2008/09 by the Times Higher Education magazine.
Leicester is ranked top after Oxbridge in the 2011 National Student Survey amongst 120 mainstream public universities in the UK. Leicester's levels of student satisfaction have been consistently in the top-10 since the annual survey commenced in 2005.
'via Blog this'