Just a basic blog—snagging random stuff that catches our eye—nothing else, really...
Thursday, March 31, 2016
Wednesday, March 30, 2016
Charity Scams | Consumer Information
Charity Scams | Consumer Information: If you’re thinking about giving to a charity, do your research to avoid fraudsters who try to take advantage of your generosity...
FTC, States Settle Claims Against Two Entities Claiming to Be Cancer Charities; Orders Require Entities to Be Dissolved and Ban Leader from Working for Non-Profits | Federal Trade Commission
FTC, States Settle Claims Against Two Entities Claiming to Be Cancer Charities; Orders Require Entities to Be Dissolved and Ban Leader from Working for Non-Profits | Federal Trade Commission: Reynolds and his family members that allegedly bilked more than $187 million from donors. CFA and CSS were responsible for more than $75 million of that amount.
Sunday, March 27, 2016
Friday, March 25, 2016
Sniffing Bluetooth Packets with Kismet and Wireshark in Ubuntu 12.04 » Ceres Controls
Sniffing Bluetooth Packets with Kismet and Wireshark in Ubuntu 12.04 » Ceres Controls: "Basically is an spectrum analyzer and development tool but with a few advantages like bluetooth sniffing… and in advanced options you can inject packets."
'via Blog this'
'via Blog this'
Getting Started · greatscottgadgets/ubertooth Wiki · GitHub
Getting Started · greatscottgadgets/ubertooth Wiki · GitHub: "Ubertooth One is a development platform. The true power of the device is best realized when you start writing your own software and adapting it to your needs."
'via Blog this'
'via Blog this'
Now I wanna sniff some Bluetooth: Sniffing and Cracking Bluetooth with the UbertoothOne — The Security Sleuth
Now I wanna sniff some Bluetooth: Sniffing and Cracking Bluetooth with the UbertoothOne — The Security Sleuth: "Recently I purchased the Ubertooth One to see how much Bluetooth sniffing has changed since my high school days, this post documents my first attempts at Bluetooth sniffing / cracking with the Ubertooth One."
'via Blog this'
'via Blog this'
iStumbler : Manual : Bluetooth
iStumbler : Manual : Bluetooth: "Shows the bluetooth devices which have been used with your computer."
'via Blog this'
'via Blog this'
Project Ubertooth - Ubertooth One
Project Ubertooth - Ubertooth One: "Ubertooth One is the next generation hardware platform of Project Ubertooth. It supersedes Ubertooth Zero and is currently the preferred platform."
'via Blog this'
'via Blog this'
IBM’s Terrorist-Hunting Software Raises Troubling Questions | Just Security
IBM’s Terrorist-Hunting Software Raises Troubling Questions | Just Security: "“IBM believes the tool could help governments separate real refugees from imposters, untangle terrorist cells, or even predict bomb attacks,” Patrick Tucker reports."
'via Blog this'
'via Blog this'
IBM's CEO On Hackers: 'Cyber Crime Is The Greatest Threat To Every Company In The World' - Forbes
IBM's CEO On Hackers: 'Cyber Crime Is The Greatest Threat To Every Company In The World' - Forbes: "The worldwide cybersecurity industry is defined by market sizing estimates that range from $77 billion in 2015 to $170 billion by 2020."
'via Blog this'
'via Blog this'
Cops are asking Ancestry.com and 23andMe for their customers’ DNA | Fusion
Cops are asking Ancestry.com and 23andMe for their customers’ DNA | Fusion: "“Your relative’s DNA could turn you into a suspect,” warns Wired, writing about a case from earlier this year, in which New Orleans filmmaker Michael Usry became a suspect in an unsolved murder case after cops did a familial genetic search using semen collected in 1996."
'via Blog this'
'via Blog this'
Should your board of directors include a cybersecurity expert? | CSO Online
Should your board of directors include a cybersecurity expert? | CSO Online
http://www.csoonline.com/article/3046520/it-careers/should-your-board-of-directors-include-a-cybersecurity-expert.html?google_editors_picks=true
http://www.csoonline.com/article/3046520/it-careers/should-your-board-of-directors-include-a-cybersecurity-expert.html?google_editors_picks=true
Attorney general and NSA director pitch cyber-security industry for cooperation | Network World
Attorney general and NSA director pitch cyber-security industry for
cooperation | Network World
http://www.networkworld.com/article/3040197/security/attorney-general-and-nsa-director-pitch-cyber-security-industry-for-cooperation.html
cooperation | Network World
http://www.networkworld.com/article/3040197/security/attorney-general-and-nsa-director-pitch-cyber-security-industry-for-cooperation.html
Overnight Cybersecurity: Critics fear indictments won't deter Iran's hackers | TheHill
Overnight Cybersecurity: Critics fear indictments won't deter Iran's
hackers | TheHill
http://thehill.com/policy/cybersecurity/overnights/272960-overnight-cybersecurity-conservatives-worried-hacking-indictments-wont
hackers | TheHill
http://thehill.com/policy/cybersecurity/overnights/272960-overnight-cybersecurity-conservatives-worried-hacking-indictments-wont
Wednesday, March 23, 2016
This bag of tricks may help stop a Locky ransomware infection | CSO Online
This bag of tricks may help stop a Locky ransomware infection | CSO Online
http://www.csoonline.com/article/3047167/security/this-bag-of-tricks-may-help-stop-a-locky-ransomware-infection.html#tk.rss_all?utm_source=twitterfeed&utm_medium=twitter
http://www.csoonline.com/article/3047167/security/this-bag-of-tricks-may-help-stop-a-locky-ransomware-infection.html#tk.rss_all?utm_source=twitterfeed&utm_medium=twitter
Suits and Spooks DC 2016: PANEL: The Evolution of The Daesh (ISIL)...
Best panel for some time...thanks to Killcullen for citing PIRA cells.
Consumer Financial Protection Bureau Enters the Cyber Regulatory Enforcement Arena - Data Protection Report
Consumer Financial Protection Bureau Enters the Cyber Regulatory Enforcement Arena - Data Protection Report: "Moreover, the CFPB determined that Dwolla transmitted personal information, including SSNs, financial account numbers and driver’s license numbers in clear text. Although Dwolla began implementing secure software development practices in 2012, its Dwollalabs division did not comply with Dwolla’s security practices, and the software developer leading the division had no data security training."
'via Blog this'
'via Blog this'
The Counter Terrorist – August/ September 2009 : IRA TECHNOLOGY
The Counter Terrorist – August/ September 2009 : IRA TECHNOLOGY: "Between 1970 and 2005, the IRA detonated a staggering 19,000 IEDs in the United Kingdom. That’s one every 17 hours—which makes this effort the biggest terrorist bombing campaign in history..."
Tuesday, March 22, 2016
Detect observation and evade theft of sensitive data - Help Net Security
Detect observation and evade theft of sensitive data - Help Net Security: "architectural tells that can be utilized to detect the presence of analysis tools, and offers practical tips for researchers."
'via Blog this'
'via Blog this'
Google, Microsoft, Yahoo, and others publish new email security standard | InfoWorld
Google, Microsoft, Yahoo, and others publish new email security
standard | InfoWorld
http://www.infoworld.com/article/3046850/security/google-microsoft-yahoo-and-others-publish-new-email-security-standard.html
standard | InfoWorld
http://www.infoworld.com/article/3046850/security/google-microsoft-yahoo-and-others-publish-new-email-security-standard.html
Data Security Still Hampered by Lack of Talent | Health Data Management
Data Security Still Hampered by Lack of Talent
Several recent studies predict that 2016 will be another tough year on the cyber defense front, and adding to the woes is a continued lack of IT security talent.
The Dicey Retirement Gamble Americans Are Making - Forbes
The Dicey Retirement Gamble Americans Are Making - Forbes
http://www.forbes.com/sites/nextavenue/2016/03/22/the-dicey-retirement-gamble-americans-are-making/#61413729239e
http://www.forbes.com/sites/nextavenue/2016/03/22/the-dicey-retirement-gamble-americans-are-making/#61413729239e
Cyber security firm probed over alleged lies about data breaches | Business Insurance
Cyber security firm probed over alleged lies about data breaches |
Business Insurance
http://www.businessinsurance.com/article/20160318/NEWS06/160319837/cyber-security-firm-tiversa-probed-over-alleged-lies-about-data?tags=%7C80%7C299%7C302
Business Insurance
http://www.businessinsurance.com/article/20160318/NEWS06/160319837/cyber-security-firm-tiversa-probed-over-alleged-lies-about-data?tags=%7C80%7C299%7C302
The States With The Most Gun Laws See The Fewest Gun-Related Deaths - The Atlantic
The States With The Most Gun Laws See The Fewest Gun-Related Deaths -
The Atlantic
http://www.theatlantic.com/politics/archive/2015/08/the-states-with-the-most-gun-laws-see-the-fewest-gun-related-deaths/448044/
The Atlantic
http://www.theatlantic.com/politics/archive/2015/08/the-states-with-the-most-gun-laws-see-the-fewest-gun-related-deaths/448044/
BAIA Model V-8 Regular 8mm Movie Editor & Splicer
...BAIA Model V-8 Regular 8mm Movie Editor & Splicer 7526 & Splices) at Daryls Clocks
"History of the Philippines (1521–1898)" on @Wikipedia:
"History of the Philippines (1521–1898)" on @Wikipedia:
505 years ago!
https://en.wikipedia.org/wiki/History_of_the_Philippines_(1521%E2%80%931898)?wprov=sfii1
505 years ago!
https://en.wikipedia.org/wiki/History_of_the_Philippines_(1521%E2%80%931898)?wprov=sfii1
Donald Trump cites dubious legend about Gen. Pershing, pig's blood and Muslims | PolitiFact
Donald Trump cites dubious legend about Gen. Pershing, pig's blood and
Muslims | PolitiFact
http://www.politifact.com/truth-o-meter/statements/2016/feb/23/donald-trump/donald-trump-cites-dubious-legend-about-gen-pershi/
Muslims | PolitiFact
http://www.politifact.com/truth-o-meter/statements/2016/feb/23/donald-trump/donald-trump-cites-dubious-legend-about-gen-pershi/
Saturday, March 19, 2016
Saturday, March 12, 2016
Friday, March 11, 2016
Thursday, March 10, 2016
Wednesday, March 9, 2016
Team 10: Ransomware attack on Apple Operating System - 10News.com KGTV ABC10 San Diego
Team 10: Ransomware attack on Apple Operating System - 10News.com KGTV ABC10 San Diego: According to security researchers, malicious software called “ransomware” has successfully targeted Apple computers for the first time.
Tuesday, March 8, 2016
Jamming Cell Phones and GPS Equipment is Against the Law | Federal Communications Commission
Jamming Cell Phones and GPS Equipment is Against the Law | Federal Communications Commission: "We remind and warn consumers that it is a violation of federal law to use a cell jammer or similar devices that intentionally block, jam, or interfere with authorized radio communications such as cell phones, police radar, GPS, and Wi-Fi."
'via Blog this'
'via Blog this'
TITAN all in one portable powerful jamming solution
TITAN all in one portable powerful jamming solution: " It’s able to jam all GSM frequencies…worldwide! You don’t need to mention your country of residence before placing an order with us, this jammer will disable all cell phone frequencies in absolutely all countries where the cellular network exist. It jams 3G (2100 MHz) frequencies as well."
'via Blog this'
'via Blog this'
Saturday, March 5, 2016
Nissan Leaf Cars Can Be Hacked - Information Security Buzz
Nissan Leaf Cars Can Be Hacked - Information Security Buzz
Mark James...
http://www.informationsecuritybuzz.com/hacker-news/nissan-leaf-cars-can-be-hacked/
Mark James...
http://www.informationsecuritybuzz.com/hacker-news/nissan-leaf-cars-can-be-hacked/
Security Pros Struggling with Increasing Workplace Pressure - Infosecurity Magazine
Security Pros Struggling with Increasing Workplace Pressure -
Infosecurity Magazine
Shortage City!
http://www.infosecurity-magazine.com/news/security-pros-struggling-with/#.Vry6K7fC6kE.twitter
Infosecurity Magazine
Shortage City!
http://www.infosecurity-magazine.com/news/security-pros-struggling-with/#.Vry6K7fC6kE.twitter
Thursday, March 3, 2016
Wednesday, March 2, 2016
Exclusive: NSA deploys game-changer against U.S. enemies - WTOP
Exclusive: NSA deploys game-changer against U.S. enemies - WTOP
http://wtop.com/j-j-green-national/2016/02/nsa-deploys-game-changer-u-s-enemies/
http://wtop.com/j-j-green-national/2016/02/nsa-deploys-game-changer-u-s-enemies/
Subscribe to:
Posts (Atom)