Just a basic blog—snagging random stuff that catches our eye—nothing else, really...
Friday, July 31, 2015
So how do we identify phishing emails? - ITsecurityITsecurity
http://itsecurity.co.uk/2015/07/so-how-do-we-identify-phishing-emails/
network security Articles : United Airlines hacked by same group that breached Anthem and OPM
breached Anthem and OPM
http://www.rightrelevance.com/search/articles/hero?article=9c56b03b9fc031076bc273d6c75b2a50083bc700&query=network%20security&taccount=networksecurr
CISA: the dirty deal between Google and the NSA that no one is talking about | TheHill
about | TheHill
The reality is that both types of abuse are dangerous, and they work
hand in hand.
http://thehill.com/blogs/congress-blog/technology/249521-cisa-the-dirty-deal-between-google-and-the-nsa-that-no-one-is
PCI June 30 compliance deadline looms; big fines possible for retailers - FierceRetailIT
'via Blog this'
Chris Valasek on Car Hacking | Threatpost | The first stop for security news
https://threatpost.com/chris-valasek-on-car-hacking/113917
Researcher says can hack GM's OnStar app, open vehicle, start engine | Reuters
'via Blog this'
Thursday, July 30, 2015
CISA: the dirty deal between Google and the NSA that no one is talking about | TheHill
about | TheHill
http://thehill.com/blogs/congress-blog/technology/249521-cisa-the-dirty-deal-between-google-and-the-nsa-that-no-one-is
Wednesday, July 29, 2015
Tuesday, July 28, 2015
Beyond Malware: Detecting the Undetectable - DR - CrowdStrike
SecurityWatch NZ - ESET: How your business can recover from a hack
Here's what you can do to recover as fast as possible from a hack– and
with your dignity still intact.
http://securitywatch.co.nz/story/eset-how-your-business-can-recover-hack/
Monday, July 27, 2015
Chrysler Fiat vulnerability handling
unintentionally
left in an open condition allowing it to listen
to
and accept
commands from unauthenticated sources.
The Neanderthal Parallax - Robert J. Sawyer
'via Blog this'
Small Business and PCI Cost vs. Benefit | PCI Compliance Guide
'via Blog this'
PCI DSS Self-Assessment Questionnaire (SAQ)
'via Blog this'
PCI June 30 compliance deadline looms; big fines possible for retailers - FierceRetailIT
'via Blog this'
Sunday, July 26, 2015
Small Businesses Unprepared for EMV Compliance
"This tells us that SMBs can't afford not to upgrade to EMV. It's clear that there are opportunities for companies within the payments industry to educate and prepare small businesses ahead of the October deadline."
http://mobile.eweek.com/small-business/small-businesses-unprepared-for-emv-compliance.html
Friday, July 24, 2015
Oracle ID Graph Helps Marketers Target Customers Anywhere - InformationWeek
What could possibly go wrong?
http://www.informationweek.com/software/enterprise-applications/oracle-id-graph-helps-marketers-target-customers-anywhere/d/d-id/1319726
FBI Reportedly Makes Arrests in Massive JPMorgan Hack - Tech Trends on CIO Today
http://www.cio-today.com/article/index.php?story_id=113003N00QQV
Wednesday, July 22, 2015
Digital Misfits Link JPMorgan Hack to Pump-and-Dump Fraud - Bloomberg Business
http://www.bloomberg.com/news/articles/2015-07-21/fbi-israel-make-securities-fraud-arrests-tied-to-jpmorgan-hack
Monday, July 20, 2015
Car Manufacturers Want To Protect Your Data From Apple And Google But Money Talks : BIZ TECH : Tech Times
Saturday, July 18, 2015
Automakers again at odds with cyber-security researchers
Arguments over whether cyber-security researchers should have the right to experiment on cars may not end when the US Copyright Office issues a key ruling expected later this month.
Http://www.autoblog.com/2015/07/15/automakers-isac-car-hack-cyber-security-congress/
As cars rely more heavily on computers, risk of hackers grows - The Washington Post
Finland enlists convicted Lizard Squad hacker to fight cyber crime
Vietnamese cops nab Chinese credit card hacker wanted for stealing nearly $4.9mln | Society | Thanh Nien Daily
Vietnamese hacker sentenced to 13 years in prison for stealing 200m US identities | Daily Mail Online
13 years for stealing identities of 200 million Americans in mass hacking theft scheme
'Silk Road' Founder Is Given Life Prison Sentence
How the feds brought down a notorious Russian hacker
Friday, July 17, 2015
Tannhäuser | Mesmerize Records
'via Blog this'
Thursday, July 16, 2015
Call Forwarding - AT&T Wireless
iPhone 5 Sleep/Wake Button Replacement Program - Apple Support
https://www.apple.com/support/iphone5-sleepwakebutton/
Mass Loaded Vinyl Barrier, Noise Barriers, Acoustic Barriers
http://www.acousticalsurfaces.com/noise_barrier/vinylbar.htm
Ovum research shows privileged users are highest risk to data for 54 percent of IT decision makers (ITDMs) in European organisations - IT SECURITY GURU
percent of IT decision makers (ITDMs) in European organisations - IT
SECURITY GURU
http://www.itsecurityguru.org/2015/06/17/ovum-research-shows-privileged-users-are-highest-risk-to-data-for-54-percent-of-it-decision-makers-itdms-in-european-organisations/
Wednesday, July 15, 2015
Monday, July 13, 2015
14" Checkpoint Friendly Laptop Case - Case Logic
Car Manufacturers Want To Protect Your Data From Apple And Google But Money Talks : BIZ TECH : Tech Times
Money Talks : BIZ TECH : Tech Times
http://www.techtimes.com/articles/68130/20150713/car-manufacturers-want-to-protect-your-data-from-apple-and-google-but-money-talks.htm
Sunday, July 12, 2015
SiteGround WordPress Hosting - Full Feature List
Friday, July 10, 2015
Tuesday, July 7, 2015
Scientists say five-day fast-mimicking diet is safe - UPI.com
five days per month when participants caloric intake is cut to between 35 and 55 percent of normal, which allows the body to cleanse and rejuvenate, the researchers said.
Monday, July 6, 2015
How to Reset a Dell BIOS Password
Hacking Team sold spy software to blacklisted Sudan and 'stonewalled UN investigation'
'via Blog this'
OM-D E-M5 Mark II Digital Camera, Wi-Fi, Weatherproof System | Olympus
'via Blog this'
Hacking Team hacked: firm sold spying tools to repressive regimes, documents claim | Technology | The Guardian
One invoice apparentlyreveals the company dealing with a private Brazilian firm, YasNiTech, to whom it sold three months access to its remote access tool, allowing the firm to hack in to Android and Blackberry phones, and Windows devices...
Sunday, July 5, 2015
SoylentNews Comments | Major Cyber Attack Will Cause Significant Loss of Life by 2025, Experts Predict
A major cyber attack will happen between now and 2025 and it will be large enough to cause "significant loss of life or property losses/damage/theft at the levels of tens of billions of dollars," according to more than 60 percent of technology experts interviewed by the Pew Internet and American Life Project.
Pre-Installed ‘Bloatware’ Proves to be the Achilles’ heel for Samsung and Oppo | Uncover California
and Oppo | Uncover California
http://uncovercalifornia.com/content/25144-pre-installed-bloatware-proves-be-achilles-heel-samsung-and-oppo
The Dark Side of Computing: SRI International and the Study of Computer Crime
http://www.computer.org/csdl/mags/an/2007/01/man2007010003-abs.html
Saturday, July 4, 2015
cultural theory and perceived risk of crime - Google Scholar
https://scholar.google.com/scholar?q=cultural+theory+and+perceived+risk+of+crime&hl=en&as_sdt=0&as_vis=1&oi=scholart&sa=X&ei=L1uYVbGXB82YyAT0ooHQBw&ved=0CBkQgQMwAA
The Purge (2013) - IMDb
How much does cybercrime cost? | University of Cambridge
AV $$ 😃
http://www.cam.ac.uk/research/news/how-much-does-cybercrime-cost
Crooks Use Hacked Routers to Aid Cyberheists — Krebs on Security
http://krebsonsecurity.com/2015/06/crooks-use-hacked-routers-to-aid-cyberheists/?utm_source=dlvr.it&utm_medium=twitter
Friday, July 3, 2015
Endnotes with square brackets
Click in the text box beside Replace With: and type [^&]. Now click on the Replace All button. A message will pop up to tell you how many replacements were made. Click OK. All of your Endnote Reference numbers should now have square brackets around them."
'via Blog this'
The One Attitude Every Successful Person Has | Jeff Haden | LinkedIn
https://www.linkedin.com/pulse/one-attitude-every-successful-person-has-jeff-haden
Samsung S5 Heating issue
Thank you for your email. Your customer reference number is 211******3.
I apologise for the issues you are facing with your Samsung device after performing software update, In regard to your query I recommend performing a factory data reset.
A factory reset will erase all of the information stored on your device and will restore the software to original manufacturer settings. It will not remove software updates but it can undo any changes to settings that might be causing you problems.
This process will erase all of your data so a full back up using Samsung KIES is strongly advised before conducting a factory reset.
In order to back up your data, you will need to install KIES onto your PC. There are two versions of KIES: the one you need depends on what version of Android your Samsung device is using.
To check the Android version of your device, please follow these steps:
1. Go to your Apps
2. Then to Settings
3. Click on More
4. Click About Device
5. Here you will see your Android version
If your Android version is 4.3 or above, you will need to download KIES 3. If your Android version is below 4.3, please download KIES.
You can download both versions from this link: Samsung KIES
Once the correct version is installed, please follow these steps:
1. Connect your device to your computer using the Samsung USB Cable that came with your device (the charging cable with the plug head removed)
2. Open KIES and click the Back Up/Restore tab.
3. Click Data Backup
4. Mark the check box next to the content you want to back up. You can select all content by marking the check box next to Select all Items. Click Backup.
5. Click Complete when the backup is finished.
6. You can have KIES automatically back up your device every time it's connected by clicking the check box next to Automatically back up when USB connection is established.
To factory reset the device please follow the next steps:
1. From the Home Screen, tap the Applications menu item.
2. Tap on Settings.
3. Scroll down to Privacy and tap it.
4. Tap the Factory Data Reset menu item.
5. Tap the Reset phone button.
6. Tap the Erase Everything button.
Your phone will now reset and will begin the initial start-up process. Please ensure that you have your various accounts' details ready – e.g., Samsung account, email account, Wi-Fi.
If you have any more queries, please get in touch either by phone or email and I will be happy to help.
Kind regards,
Maneesha
Customer Service Representative
Wednesday, July 1, 2015
Bureau of Justice Statistics (BJS) - Criminal Victimization, 2013 (Revised)
'via Blog this'