CISA: the dirty deal between Google and the NSA that no one is talking about | TheHill

CISA: the dirty deal between Google and the NSA that no one is talking
about | TheHill

The reality is that both types of abuse are dangerous, and they work
hand in hand.

http://thehill.com/blogs/congress-blog/technology/249521-cisa-the-dirty-deal-between-google-and-the-nsa-that-no-one-is

PCI June 30 compliance deadline looms; big fines possible for retailers - FierceRetailIT

PCI June 30 compliance deadline looms; big fines possible for retailers - FierceRetailIT: "While many retailers are under the gun for the EMV liability shift deadline in October, there's an earlier cutoff on June 30 that may be just as important to meet: five mandatory changes in compliance for the Payment Card Industry Data Security Standard version 3.0."



'via Blog this'

Researcher says can hack GM's OnStar app, open vehicle, start engine | Reuters

Researcher says can hack GM's OnStar app, open vehicle, start engine | Reuters: "A researcher is advising drivers not to use a mobile app for General Motors Co's (GM.N) OnStar vehicle communications system, saying hackers can exploit a security flaw in the product to unlock cars and start engines remotely."



'via Blog this'

Wednesday, July 29, 2015

Tuesday, July 28, 2015

Beyond Malware: Detecting the Undetectable - DR - CrowdStrike

Beyond Malware: Detecting the Undetectable - DR - CrowdStrike: In an environment where 60 percent of attacks do not involve malware, it is clear that conventional malware-based protection is no longer sufficient for stopping the advanced techniques employed by today’s most sophisticated adversaries.

SecurityWatch NZ - ESET: How your business can recover from a hack

SecurityWatch NZ - ESET: How your business can recover from a hack

Here's what you can do to recover as fast as possible from a hack– and
with your dignity still intact.

http://securitywatch.co.nz/story/eset-how-your-business-can-recover-hack/

Monday, July 27, 2015

Chrysler Fiat vulnerability handling

ITEM # 1417 - RMISC-15V461-1264.pdf: A communications port was
unintentionally
left in an open condition allowing it to listen
to
and accept
commands from unauthenticated sources.

The Neanderthal Parallax - Robert J. Sawyer

The Neanderthal Parallax - Wikipedia, the free encyclopedia: "Barasts are dedicated hunter-gatherers, and have no developed concept of agriculture. Despite this, they are still technologically advanced, possessing quantum computers, helicopters, communications and biological recording instruments. They live in harmony with their environment, using clean energy, living homes, and keeping a constant population."



'via Blog this'

Small Business and PCI Cost vs. Benefit | PCI Compliance Guide

Small Business and PCI Cost vs. Benefit | PCI Compliance Guide: "Many small business owners wonder why they would ever need to comply with a security standard like the PCI DSS."



'via Blog this'

PCI DSS Self-Assessment Questionnaire (SAQ)

PCI DSS Self-Assessment Questionnaire (SAQ): "The PCI DSS SAQ is a validation tool for merchants and service providers that are not required to undergo an on-site data security assessment per the PCI DSS Security Assessment Procedures."



'via Blog this'

PCI June 30 compliance deadline looms; big fines possible for retailers - FierceRetailIT

PCI June 30 compliance deadline looms; big fines possible for retailers - FierceRetailIT: "Retailers who don't meet the compliance requirements and experience a data breach may be subject to heavy fines from $100,000 to $500,000 or more, according to information security company Trustwave."



'via Blog this'

Small Businesses Unprepared for EMV Compliance

"This tells us that SMBs can't afford not to upgrade to EMV. It's clear that there are opportunities for companies within the payments industry to educate and prepare small businesses ahead of the October deadline."

http://mobile.eweek.com/small-business/small-businesses-unprepared-for-emv-compliance.html

Monday, July 20, 2015

Car Manufacturers Want To Protect Your Data From Apple And Google But Money Talks : BIZ TECH : Tech Times

Car Manufacturers Want To Protect Your Data From Apple And Google But Money Talks : BIZ TECH : Tech Times: Carmakers want to prevent Apple and Google from gaining access to the driver data collected by in-car technology systems, and it's all about money.

Saturday, July 18, 2015

Automakers again at odds with cyber-security researchers

Arguments over whether cyber-security researchers should have the right to experiment on cars may not end when the US Copyright Office issues a key ruling expected later this month.

Http://www.autoblog.com/2015/07/15/automakers-isac-car-hack-cyber-security-congress/

As cars rely more heavily on computers, risk of hackers grows - The Washington Post

As cars rely more heavily on computers, risk of hackers grows - The Washington Post: The future of driving has been cast in terms of cars that talk to one another and eventually drive themselves, but all of that computer camaraderie on the roadways could fall prey to hackers unless the auto industry and regulators come up with stout defenses.

Finland enlists convicted Lizard Squad hacker to fight cyber crime

Finland enlists convicted Lizard Squad hacker to fight cyber crime: The extent of Kivimaki's punishment will be a two-year suspended sentence, the confiscation of his computer, and being made to return some €6,500 in profits earned from cyber crime

Vietnamese cops nab Chinese credit card hacker wanted for stealing nearly $4.9mln | Society | Thanh Nien Daily

Vietnamese cops nab Chinese credit card hacker wanted for stealing nearly $4.9mln | Society | Thanh Nien Daily: Zhu and his gang allegedly stole credit card details of many people, including South Koreans, to steal money. He then changed the money into digital money used in online games, before selling the digital one for real money, according to the Chinese police.

'Silk Road' Founder Is Given Life Prison Sentence

'Silk Road' Founder Is Given Life Prison Sentence: The mastermind behind the Silk Road, an underground online drug market, has been sentenced to life in prison.

How the feds brought down a notorious Russian hacker

How the feds brought down a notorious Russian hacker: Sasha Panin called himself "Gribodemon," and his evil works in the world of cybercrime have bedeviled millions.

Friday, July 17, 2015

Tannhäuser | Mesmerize Records

Tannhäuser | Mesmerize Records: ""Tannhäuser" is the debut album by experimental alt. rock band Electric Yakuza. Produced from the first note to the last detail by Tallulah MarsCat"



'via Blog this'

Thursday, July 16, 2015

Call Forwarding - AT&T Wireless

Call Forwarding - AT&T Wireless: All AT&T wireless and GoPhone voice plans include Call Forwarding.

Monday, July 13, 2015

14" Checkpoint Friendly Laptop Case - Case Logic

14" Checkpoint Friendly Laptop Case - Case Logic: On the contemporary side of polished professionalism, this case features logical organization for a laptop, iPad and other required business gear.

Sunday, July 12, 2015

Scientists say five-day fast-mimicking diet is safe - UPI.com

five days per month when participants caloric intake is cut to between 35 and 55 percent of normal, which allows the body to cleanse and rejuvenate, the researchers said.

http://www.upi.com/Health_News/2015/06/22/Scientists-say-five-day-fast-mimicking-diet-is-safe/9301435000614/

Monday, July 6, 2015

How to Reset a Dell BIOS Password

How to Reset a Dell BIOS Password: Christophe Grenier wrote a program that calculates the master BIOS password for Dell Latitudes from the Service Tag number. That program is available here.

Hacking Team sold spy software to blacklisted Sudan and 'stonewalled UN investigation'

Hacking Team sold spy software to blacklisted Sudan and 'stonewalled UN investigation': "a subsequent invoice for €480,000 dated July 2012 seems to prove that the Italian company was involved in selling surveillance software to Sudan."



'via Blog this'

OM-D E-M5 Mark II Digital Camera, Wi-Fi, Weatherproof System | Olympus

OM-D E-M5 Mark II Digital Camera, Wi-Fi, Weatherproof System | Olympus: "With a keen focus on an authentic feel, functional beauty and refinement, this is a very special OM-D – and just a small quantity is available worldwide."



'via Blog this'

Hacking Team hacked: firm sold spying tools to repressive regimes, documents claim | Technology | The Guardian

One invoice apparentlyreveals the company dealing with a private Brazilian firm, YasNiTech, to whom it sold three months access to its remote access tool, allowing the firm to hack in to Android and Blackberry phones, and Windows devices...

http://www.theguardian.com/technology/2015/jul/06/hacking-team-hacked-firm-sold-spying-tools-to-repressive-regimes-documents-claim

Sunday, July 5, 2015

SoylentNews Comments | Major Cyber Attack Will Cause Significant Loss of Life by 2025, Experts Predict

A major cyber attack will happen between now and 2025 and it will be large enough to cause "significant loss of life or property losses/damage/theft at the levels of tens of billions of dollars," according to more than 60 percent of technology experts interviewed by the Pew Internet and American Life Project.

https://soylentnews.org/comments.pl?sid=4632&cid=111929

The Purge (2013) - IMDb

The Purge (2013) - IMDb: In an America wracked by crime and overcrowded prisons, the government has sanctioned an annual 12-hour period in which any and all criminal activity-including murder-becomes legal. The police can't be called. Hospitals suspend help. It's one night when the citizenry regulates itself without thought of punishment.

Friday, July 3, 2015

Endnotes with square brackets

Endnotes with square brackets: "With your insertion point in the text box beside Find What:, choose the Format button and choose Style then choose Endnote Reference from the list and click OK.
Click in the text box beside Replace With: and type [^&]. Now click on the Replace All button. A message will pop up to tell you how many replacements were made. Click OK. All of your Endnote Reference numbers should now have square brackets around them."



'via Blog this'

Samsung S5 Heating issue

Thank you for your email. Your customer reference number is 211******3.

I apologise for the issues you are facing with your Samsung device after performing software update, In regard to your query I recommend performing a factory data reset.

A factory reset will erase all of the information stored on your device and will restore the software to original manufacturer settings. It will not remove software updates but it can undo any changes to settings that might be causing you problems.

This process will erase all of your data so a full back up using Samsung KIES is strongly advised before conducting a factory reset.

In order to back up your data, you will need to install KIES onto your PC. There are two versions of KIES: the one you need depends on what version of Android your Samsung device is using.

To check the Android version of your device, please follow these steps:

1. Go to your Apps
2. Then to Settings
3. Click on More
4. Click About Device
5. Here you will see your Android version
If your Android version is 4.3 or above, you will need to download KIES 3. If your Android version is below 4.3, please download KIES.

You can download both versions from this link: Samsung KIES

Once the correct version is installed, please follow these steps:

1. Connect your device to your computer using the Samsung USB Cable that came with your device (the charging cable with the plug head removed)
2. Open KIES and click the Back Up/Restore tab.
3. Click Data Backup
4. Mark the check box next to the content you want to back up. You can select all content by marking the check box next to Select all Items. Click Backup.
5. Click Complete when the backup is finished.
6. You can have KIES automatically back up your device every time it's connected by clicking the check box next to Automatically back up when USB connection is established.

To factory reset the device please follow the next steps:

1. From the Home Screen, tap the Applications menu item.
2. Tap on Settings.
3. Scroll down to Privacy and tap it.
4. Tap the Factory Data Reset menu item.
5. Tap the Reset phone button.
6. Tap the Erase Everything button.

Your phone will now reset and will begin the initial start-up process. Please ensure that you have your various accounts' details ready – e.g., Samsung account, email account, Wi-Fi.

If you have any more queries, please get in touch either by phone or email and I will be happy to help.

Kind regards,

Maneesha

Customer Service Representative

Wednesday, July 1, 2015

Bureau of Justice Statistics (BJS) - Criminal Victimization, 2013 (Revised)

Bureau of Justice Statistics (BJS) - Criminal Victimization, 2013 (Revised): "Presents 2013 estimates of rates and levels of criminal victimization in the United States. This bulletin includes violent victimization (rape or sexual assault, robbery, aggravated assault, and simple assault) and property victimization (burglary, motor vehicle theft, and property theft). It describes the annual change from 2012 and analyzes 10-year trends from 2004 through 2013."



'via Blog this'