Just a basic blog—snagging random stuff that catches our eye—nothing else, really...
Tuesday, September 30, 2014
10.9.5 update stalled at 'Completing Installati... | Apple Support Communities
'via Blog this'
Power Your Wireless Sensors For 40 Years | Power content from Electronic Design
Short-range wireless sensors are experiencing rapid growth in wide range of applications: RFID to GPS tracking, traditional automatic meter reading (AMR) plus advanced metering infrastructure (AMI), mesh networks, system control and data acquisition (SCADA), data loggers, measurement while drilling, oceanography, environmental systems, emergency/safety systems, military/aerospace systems, and more.
http://m.electronicdesign.com/power/power-your-wireless-sensors-40-years
Energy Harvesting And Wireless Sensor Networks Drive Industrial Applications | Power content from Electronic Design
The industrial sector is keen on using electronics for greater capabilities and higher efficiencies and productivity. Smaller and smarter sensors, ultra-low-power IC devices, energy harvesting performance advances, and better wireless sensor network protocols are spurring this trend.
Monday, September 29, 2014
Software Defined Radio: A Hacker’s Dream
'via Blog this'
Great Scott Gadgets - HackRF One
'via Blog this'
NooElec - HackRF One Software Defined Radio: Bundle
'via Blog this'
How to Make a $19 Police Radio Scanner
'via Blog this'
How to Make a $19 Police Radio Scanner
'via Blog this'
Sunday, September 28, 2014
Apple Store Favorite IZON Cameras Riddled With Security Holes | The Security Ledger
... administrative credentials for Amazon's S3 cloud service hard coded into the IZON mobile application, which suggests that Stem is using the same credentials for every customer account.
DEFCON 22: Hack All the Things
"Secure" baby monitoring device according to their marketing. There is a hard coded username and password for uploading firmware.
http://hackaday.com/2014/08/09/defcon-22-hack-all-the-things/
Saturday, September 27, 2014
Thursday, September 25, 2014
Industrial Wireless Sensor Networks | Mouser
Friday, September 19, 2014
Tinba Trojan targets major US banks
Thursday, September 18, 2014
October 2015: The End of the Swipe-and-Sign Credit Card - Corporate Intelligence - WSJ
'via Blog this'
FBI — Two Men Plead Guilty in International Stolen Car and Identity Theft Internet Scam
'via Blog this'
An Up-To-Date Layman's Guide To Accessing The Deep Web ⚙ Co.Labs ⚙ code + community
'via Blog this'
JOTS v32n1 - Technology-enabled Crime, Policing and Security
Wednesday, September 17, 2014
Tuesday, September 16, 2014
FloCon 2015 (Portland, Oregon, January 12-15, 2015)
"FloCon is an open network security conference that takes place in Portland, Oregon on January 12-15, 2015 at the Hilton Portland & Executive Tower."
'via Blog this'
Monday, September 15, 2014
Wednesday, September 10, 2014
Keeping Oracle Java updated continues to be high security ROI - Microsoft Security Blog - Site Home - TechNet Blogs
'via Blog this'
Monday, September 8, 2014
Wednesday, September 3, 2014
Why hackers may be stealing your credit card numbers for years | Network World
http://www.networkworld.com/article/2600921/why-hackers-may-be-stealing-your-credit-card-numbers-for-years.html?source=NWWNLE_nlt_security_2014-09-02#tk.rss_security
From My iPhone
Tuesday, September 2, 2014
Genetics in Medicine - HFE-associated hereditary hemochromatosis
New! Supply Chain Risk Management Standard
...a practitioner's guide to SCRM and associated processes for the management of risks within the organization and its end-to-end supply chain.
Monday, September 1, 2014
More Workers Are Claiming ‘Wage Theft’ - NYTimes.com
'via Blog this'
Evidence Grows That Online Social Networks Have Insidious Negative Effects | MIT Technology Review
'via Blog this'