Just a basic blog—snagging random stuff that catches our eye—nothing else, really...
Thursday, April 30, 2015
The 8 Creepiest Cases of Identity Theft of All Time | Cracked.com
'via Blog this'
http://www.cracked.com/article_19973_the-8-creepiest-cases-identity-theft-all-time.html
Center for Problem-Oriented Policing | Tool Guides | Analyzing Repeat Victimization
How to Root Your Android Device & Why You Might Want To
Some manufacturers assert that rooting voids your device's warranty. However, rooting will not actually damage your hardware. You can "unroot" your device and manufacturers won't be able to tell if it's been rooted.
http://www.howtogeek.com/115297/how-to-root-your-android-why-you-might-want-to/
Tuesday, April 28, 2015
Pitfalls of “don’t know/no opinion” answer options in surveys | CheckMarket
'via Blog this'
Export Violations - eCustoms Visual Compliance
'via Blog this'
Cyber Risk: A Multidimensional Approach
'via Blog this'
Call for Speakers: 2015 ISSA International Conference - Information Systems Security Association
'via Blog this'
Monday, April 27, 2015
Successful POS attacks are the result of poor security, researchers find
http://www.net-security.org/secworld.php?id=18313&utm_content=bufferc8793&utm_medium=social&utm_source=twitter.com&utm_campaign=buffer
From My iPhone
What is direct-to-consumer genetic testing? | Personal Genetics Education Project
http://www.pged.org/direct-to-consumer-genetic-testing/
From My iPhone
Saturday, April 25, 2015
Friday, April 24, 2015
Despite Increased Use of Electronic Medical Records, Fewer U.S. Doctors Believe It Improves Health Outcomes, Accenture Survey Shows | Business Wire
Code of Best Practices in Fair Use for Scholarly Research in Communication | Center for Media & Social Impact
Wednesday, April 22, 2015
Into the Woods: Protecting Our Youth from the Wolves of Cyberspace – Session – RSA Conference
Into the Woods: Protecting Our Youth from the Wolves of Cyberspace – Session – RSA Conference:
'via Blog this'
Monday, April 20, 2015
Sunday, April 19, 2015
Legal Week - Fear of cyber crime rise as nearly 80% believe their firm could be hit by web hack
'via Blog this'
Saturday, April 18, 2015
Digital Dao: AEI - Norse: Subverting Cyber Security Research For Political Fear-Mongering
'via Blog this'
Internet Security Threat Report 2015 | Symantec
'via Blog this'
Friday, April 17, 2015
▶ What if Your Hotel Bill Was Like a Hospital Bill? - YouTube
united nations cyber crime - Google Search
Throws up some interesting stuff...print out the big report?
'via Blog this'
Fighting the Industrialization of Cyber Crime | UN Chronicle
http://unchronicle.un.org/article/fighting-industrialization-cyber-crime/
The sophistication of this criminal business model is such that members of these networks are able to focus on specific tasks including producing malicious code or delivery mechanisms for attacks.
Cybersecurity: A global issue demanding a global approach | UN DESA | United Nations Department of Economic and Social Affairs
http://www.un.org/en/development/desa/news/ecosoc/cybersecurity-demands-global-approach.html
Cybercrime has now become a business which exceeds a trillion dollars a year in online fraud, identity theft, and lost intellectual property, affecting millions of people around the world, as well as countless businesses and the Governments of every nation.
Wednesday, April 15, 2015
xavier.edu XSS vulnerability - the Cross-Site Scripting Archive - XSSposed.org
'via Blog this'
Tuesday, April 14, 2015
7 Buzzwords to Watch at HIMSS 2015 - HIT Consultant
'via Blog this'
WEDI: Interoperability roadmap must 'better reflect' health IT realities - FierceHealthIT
"This is simply a flawed and misguided means of removing the current barriers to interoperability," AMA said in its comments. "This approach will not work.""
'via Blog this'
Monday, April 13, 2015
Latest version of Svpeng targets users in US - Securelist
https://securelist.com/blog/mobile/63746/latest-version-of-svpeng-targets-users-in-us/
From My iPhone
Sunday, April 12, 2015
Saturday, April 11, 2015
SD Card Formatter - SD Association
'via Blog this'
An Introduction to Tor on Chrome OS - OMG! Chrome!
'via Blog this'
4 Tools to Test and Detect Fake or Counterfeit USB Flash Drives • Raymond.CC
"it’s a good idea to check any flash device you purchase is the product you paid for."
'via Blog this'
Amazon.com: 64 GB micro Class 10 Card with SD card adapter: Computers & Accessories
"If you do buy a low-priced card, the first thing you should do is test the capacity using a utility called h2testw."
'via Blog this'
2012: Fear of cyber crime stops EU citizens doing business on the web
'via Blog this'
Check for newer versions of this study by EU.
http://ec.europa.eu/public_opinion/archives/ebs/ebs_423_en.pdf
Singtel Pays $810M For US Cybersecurity Firm - Law360
Singapore Telecom announced Wednesday it will acquire Chicago-based Trustwave Holdings Inc. for $810 million, in a move aimed at bolstering its cybersecurity offerings.
Friday, April 10, 2015
Lot of 56X Apple iMac 17" A1208 Core 2 Duo Computers Warranty | eBay
Up for sale is a lot of 56x Apple Imac 17" A1208 Core 2 Duo Computers.
All of these units have been fully tested and verified working.
Cross-platform RAT 'AlienSpy' targets Mac OS X, Windows and Android users - SC Magazine
'via Blog this'
Thursday, April 9, 2015
Hidden backdoor API to root privileges in Apple OS X |
https://truesecdev.wordpress.com/2015/04/09/hidden-backdoor-api-to-root-privileges-in-apple-os-x/
From My iPhone
How to Protect Against the Dangers of Public WiFi Abuse | Security Architects, LLC
'via Blog this'
Real costs of IRS budget cuts « Bankrate, Inc.
'via Blog this'
2014 Global Retail Theft Barometer finds slight decrease in shrink worldwide, increase in costs of retail crime in the U.S.
'via Blog this'
Fear of cyber crime stops EU citizens doing business on the web
'via Blog this'
Americans Fear Cybercrime More Than Being Killed | InSerbia News
'via Blog this'
BBC NEWS | UK | Queen opens new Heathrow terminal
"The pall of deceit and collusion will hang over the entire proceedings.""
'via Blog this'
e-Commerce Fraud: The Rapidly Growing Challenge for Retail Investigations | LP Magazine
'via Blog this'
Cyber Security Survey: Fear of cybercrime up 66 percent in US
'via Blog this'
US Cyber Security Survey: Fear of Cyber Crime Up 66 Percent -- DURHAM, N.C., Feb. 26, 2015 /PRNewswire/ --
'via Blog this'
How To Create a Full Android Phone or Tablet Backup Without Rooting or Unlocking Your Device
Android includes a built-in way to back up and restore the contents of your phone or tablet. All you need is a computer and a device running Android 4.0 (Ice Cream Sandwich) or newer.
Destructive hacking attempts target critical infrastructure in Americas: survey | Reuters
'via Blog this'
Destructive hacking attempts target critical infrastructure in Americas: survey | Reuters
'via Blog this'
" Examples of research using using thematic coding analysis (chapter 17 URL)
http://www.sagepub.com/upm-data/24614_01_Saldana_Ch_01.pdf
'via Blog this'
QDA Miner Lite - Free Qualitative Data Analysis Software
'via Blog this'
Thematic Coding | Better Evaluation
'via Blog this'
Destructive hacking attempts target critical infrastructure in Americas: survey | Reuters
'via Blog this'
Wednesday, April 8, 2015
CompTIA IT Fundamentals Jumpstarts Careers in High School – and Beyond
'via Blog this'
Chicago High School Offers Firsthand IT Training
'via Blog this'
▶ How to install Kali Linux on Android - No computer needed! - YouTube
Android hijacking bug may allow attackers to install password-stealers | Ars Technica
'via Blog this'
Android Installer Hijacking Bug Used as Lure for Malware
'via Blog this'
Tuesday, April 7, 2015
Elon Musk hires an F1 expert to revolutionize Tesla's pit stops
http://www.engadget.com/2015/04/06/elon-musk-hires-an-f1-expert-to-revolutionize-teslas-pit-stops/
From My iPhone
Monday, April 6, 2015
Antivirus doesn’t work. So why are you still using it? | Network World
http://www.networkworld.com/article/2905562/security0/antivirus-doesn-t-work-so-why-are-you-still-using-it.html
From My iPhone
How to Record Calls on Your iPhone | Page 2 | Digital Trends
As an added bonus, NoNotes also offers low-cost transcription services, which are ideal if you're recording an interview.
Read more: http://www.digitaltrends.com/mobile/how-to-record-calls-iphone/2/#ixzz3WVZ8qEAT
Follow us: @digitaltrends on Twitter | digitaltrendsftw on Facebook
http://www.digitaltrends.com/mobile/how-to-record-calls-iphone/2/
Sunday, April 5, 2015
Right-to-carry gun laws linked to increase in violent crime, Stanford research shows
http://news.stanford.edu/news/2014/november/donohue-guns-study-111414.html
From My iPhone
Wanted: Problem Solvers with Creativity | EdTech Magazine
http://www.edtechmagazine.com/higher/article/2015/02/wanted-problem-solvers-creativity
From My iPhone
Saturday, April 4, 2015
Canon U.S.A. : Support & Drivers : Color imageCLASS MF8580Cdw
and wish to continue with the download.
Friday, April 3, 2015
Stolen: Data on Thousands of Williamsport Area Dental Patients | WNEP.com
Advantage Dental reports data breach; Information on over 150,000 patients accessed; provider offers credit monitoring
And sometimes, not all computers equipped with antivirus are actually running it with the latest updates.