Cobb history updated.
Just a basic blog—snagging random stuff that catches our eye—nothing else, really...
Friday, January 30, 2015
Examples of Identity Theft Schemes - Fiscal Year 2014
'via Blog this'
Thursday, January 29, 2015
U.S. spy program has financial, security impacts, says Snowden | Computerworld
http://www.computerworld.com/article/2874934/us-spy-program-has-financial-security-impacts-says-snowden.html
From My iPhone
Wednesday, January 28, 2015
Real estate ripoff
New York state alone, this year, is getting out of its bank settlements with Wall Street a windfall of $5 billion.
Tuesday, January 27, 2015
Saturday, January 24, 2015
William Blake - The Marriage of Heaven and Hell
Thursday, January 22, 2015
Ubertooth One – HakShop
Parents in danger of having six-year-old daughter taken away for letting her walk to their local post office on her own - Boing Boing
NSA Details Chinese Cyber Theft of F-35, Military Secrets | Washington Free Beacon
In "Byzantine Candor" cyber attacks, the Chinese used Facebook as a command and control point for planting malware. One NSA slide showed that victims who unwittingly accessed a Facebook page through an email would end up with their computers under the remote control of the Chinese.
http://freebeacon.com/national-security/nsa-details-chinese-cyber-theft-of-f-35-military-secrets/
Hackers create USB stick inspired by NSA's Cottonmouth-I surveillance kit | Daily Mail Online
The device was designed to also be able to control the malware, even on so-called 'airgapped' computers.
NSA secretly uses scapegoats, data mules and innocent victims' PCs for botnets | Computerworld
'via Blog this'
Mass surveillance doesn't stop terrorism: Snowden - Xinhua | English.news.cn
'via Blog this'
How Apple Pay Affects Online Security - Lifelock
http://www.lifelock.com/education/smartphones/how-Apple-Pay-affects-online-security/?cid=con_contently_smartphones_taboola_-_-_004_-_auto&utm_source=taboola&utm_medium=referral
From My iPhone
‘Blackhat’ Review: Chris Hemsworth Makes an Implausible Hacker | Variety
Tuesday, January 20, 2015
Monday, January 19, 2015
Attack Surface Reduction – Chapter 4 - InfoSec Institute
'via Blog this'
TEOS, the Trusted Email Open Standard
https://books.google.com/books?id=Ykf6-nhW_CwC&pg=PA65&lpg=PA65&dq=teos+trusted+email+open+standard&source=bl&ots=ApQGsp604W&sig=gW6SJ7OyOJBag9oJGG7oPirqvas&hl=en&sa=X&ei=QuKqVK6wMse3oQSAq4L4Dg&ved=0CFAQ6AEwCg#v=onepage&q=teos%20trusted%20email%20open%20standard&f=false
'via Blog this'
Is Anybody HomeKit? Apple Wants To Make Your House Smarter | Fast Company | Business + Innovation
'via Blog this'
The Internet of Things Is Poised to Change Everything, Says IDC | Business Wire
'via Blog this'
The Rise of the Hyper Educated Poor | Julia Meszaros
'via Blog this'
Smart Home Devices Will Need Smarter Security | MIT Technology Review
'via Blog this'
New Atheism's Islam-obsessed rape and rescue fantasy | Middle East Eye
Wikipedia defines New Atheism as a "social and political movement" that advocates the view that religion should not be tolerated. The Internet Encyclopedia of Philosophy says it's specifically the anti-religious views ascribed by Richard Dawkins, Sam Harris and Christopher Hitchens.
From My iPhone
Sunday, January 18, 2015
Tax Time Identity Theft, Protect My ID
Saturday, January 17, 2015
With crypto in UK crosshairs, secret US report says it’s vital | Ars Technica
The 2009 document, from the US National Intelligence Council, said encryption was the "best defense" for protecting private data, according to an article published Thursday by the newspaper. Airing of the five-year forecast came the same day Cameron embarked on a US trip to convince President Obama to place pressure on Apple, Google, and Facebook to curtail their rollout of stronger encryption technologies in e-mail and messaging communications. According to Thursday's report:
Parents investigated for neglect after letting kids walk home alone
Maryland parents are under investigation by Children's Protective Services (CPS) for allowing their 10-year-old daughter and 6-year-old son to walk from a local park to their home through a suburban community.
Thursday, January 15, 2015
How IoT big data will transform manufacturing automation - TechRepublic
Wednesday, January 14, 2015
Privacy and Data Protection by Design — ENISA
This report contributes to bridging the gap between the legal framework and the available technolog-ical implementation measures by providing an inventory of existing approaches, privacy design strat-egies, and technical building blocks of various degrees of maturity from research and development.
Tuesday, January 13, 2015
SECURING CYBERSPACE - President Obama Announces New Cybersecurity Legislative Proposal and Other Cybersecurity Efforts | The White House
Sunday, January 11, 2015
Barack Obama and David Cameron to promise joint crack down on ''cyber terrorists'' - Mirror Online
four out of five large UK companies reported some form of security breach in 2014, costing between £600,000 and £1.5m.
http://www.mirror.co.uk/news/uk-news/barack-obama-david-cameron-promise-4956902
Friday, January 9, 2015
FBI Sony statements could put government in a bind - SFGate
Lawsuits against Sony Pictures could test employer responsibility for data breaches - The Washington Post
http://www.washingtonpost.com/blogs/the-switch/wp/2014/12/19/lawsuits-against-sony-pictures-could-test-employer-responsibility-for-data-breaches/
From My iPhone
Thursday, January 8, 2015
Insider Threat | The CERT Division
Malicious insider threat to an organization is a current or former employee, contractor, or other business partner who has or had authorized access to an organization's network, system, or data and intentionally exceeded or misused that access in a manner that negatively affected the confidentiality, integrity, or availability of the organization's information or information systems.
Wednesday, January 7, 2015
Commenti: The future and present of work in ICT
Tuesday, January 6, 2015
Your medical record is worth more to hackers than your credit card | Reuters
Cyberattacks are on the rise. And health-care data is the biggest target. - The Washington Post
GCHQ's 'spook first' programme to train Britain's most talented tech entrepreneurs - News - Gadgets and Tech - The Independent
US sanctions North Korea over Sony hack and classifies attack evidence | Ars Technica
Monday, January 5, 2015
Marijuana's downside - LA Times
http://www.latimes.com/opinion/op-ed/la-oe-shapiro-marijuana-danger-20150104-story.html?utm_content=bufferb129f&utm_medium=social&utm_source=twitter.com&utm_campaign=buffer
From My iPhone
Sunday, January 4, 2015
Top Cybercrime Trends and Predictions for 2015: ESET | Technuter
summary of the top cybercrime trends and predictions for 2015.
http://www.technuter.com/breaking-news/top-cybercrime-trends-and-predictions-for-2015-eset.html
Saturday, January 3, 2015
Unified Security – A Vision Of The Future | Symantec Connect
'via Blog this'
Why Educators Should Take the Digital Skills Gap Seriously - Hootsuite Social Media Management
A Theory of Cyber Deterrence | Georgetown Journal of International Affairs
A Hacker's Hit List of American Infrastructure - The Atlantic
Friday, January 2, 2015
JPMorgan Chase hack due to missing 2-factor authentication on one server | Ars Technica
http://arstechnica.com/security/2014/12/jpmorgan-chase-hack-because-of-missing-2-factor-auth-on-one-server/
From My iPhone
Neglected Server Provided Entry for JPMorgan Hackers - NYTimes.com
Ingredients for Architecting the Security of Things
But the storage of security data at scale isn't the most interesting aspect of the data problem.