Just a basic blog—snagging random stuff that catches our eye—nothing else, really...
Wednesday, May 31, 2017
Tuesday, May 30, 2017
Wally Rebounder Ping Pong Partner Table Tennis Trainer | Wally Rebounder Table Tennis Trainer
Wally Rebounder Ping Pong Partner Table Tennis Trainer | Wally Rebounder Table Tennis Trainer
http://www.wallyrebounder.com/
http://www.wallyrebounder.com/
Cycon | Live Stream of CyCon 2017 Keynotes
Cycon | Live Stream of CyCon 2017 Keynotes: "The 9th International Conference on Cyber Conflict, CyCon 2017, brings key experts and decision-makers of the global cyber defence community to Tallinn from May 30th to June 2nd.
Selected Cycon 2017 Keynotes listed below are broadcast live on the news portal of Estonian national broadcaster ERR http://www.err.ee/598943/kaks-paeva-otseulekandeid-kuberjulgeoleku-konverentsilt
We invite you to share the link! "
'via Blog this'
Selected Cycon 2017 Keynotes listed below are broadcast live on the news portal of Estonian national broadcaster ERR http://www.err.ee/598943/kaks-paeva-otseulekandeid-kuberjulgeoleku-konverentsilt
We invite you to share the link! "
'via Blog this'
Monday, May 29, 2017
Sunday, May 28, 2017
Friday, May 26, 2017
Free online word cloud generator and tag cloud creator - WordClouds.com
Free online word cloud generator and tag cloud creator - WordClouds.com: "Wordclouds.com is a free online word cloud generator and tag cloud creator. "
'via Blog this'
'via Blog this'
Swapping DNA for Lower Insurance Costs Is One Wellness Step Too Far – Workforce Magazine
Swapping DNA for Lower Insurance Costs Is One Wellness Step Too Far – Workforce Magazine: The solution to cutting employers' health care spend is not asking employees to sacrifice their personal privacy in exchange for lower premiums, as is the push from HR 1313.
New Wellness Bill HR 1313 Gets Flak for Genetic Privacy Concerns – Workforce Magazine
New Wellness Bill HR 1313 Gets Flak for Genetic Privacy Concerns – Workforce Magazine: The Preserving Employee Wellness Programs Act has received criticism for potentially coercing employees to reveal personal genetic information to their employers.
Thursday, May 25, 2017
Wednesday, May 24, 2017
Encryption: Vital to the Founding Fathers, Vital to Modern America | RealClearTechnology
Encryption: Vital to the Founding Fathers, Vital to Modern America | RealClearTechnology: "However, the issues at stake today are not fundamentally different from those present at America’s founding."
'via Blog this'
'via Blog this'
Encryption to come under renewed fire from European Commission in June
Encryption to come under renewed fire from European Commission in June: "Encryption will face a make it or break it moment in June when the European Commission lays out new options for forcing internet companies to hand over the keys."
'via Blog this'
'via Blog this'
At Crypto Hearing, Best Arguments Against Backdoor Mandates Come from Members of Congress Themselves
At Crypto Hearing, Best Arguments Against Backdoor Mandates Come from Members of Congress Themselves: "“I have three general concerns about Director Comey’s proposal. First, it’s impossible to build just a backdoor for just the good guys… j"
'via Blog this'
'via Blog this'
Encryption Workarounds by Orin S. Kerr, Bruce Schneier :: SSRN
Encryption Workarounds by Orin S. Kerr, Bruce Schneier :: SSRN: "The remainder of the essay develops lessons about encryption workarounds and the broader public debate about encryption in criminal investigations. "
'via Blog this'
'via Blog this'
Tuesday, May 23, 2017
Evilginx - Advanced Phishing with Two-factor Authentication Bypass
Evilginx - Advanced Phishing with Two-factor Authentication Bypass
https://breakdev.org/evilginx-advanced-phishing-with-two-factor-authentication-bypass/
https://breakdev.org/evilginx-advanced-phishing-with-two-factor-authentication-bypass/
Monday, May 22, 2017
My Blogger Buzz: How to Upload Files For Download in Blogger
My Blogger Buzz: How to Upload Files For Download in Blogger: "In this tutorial I am going to show you how to upload files to download in Blogger."
Sunday, May 21, 2017
NSA feared its hacking tool would get loose — then it did – The Denver Post
NSA feared its hacking tool would get loose — then it did – The Denver Post
http://www.denverpost.com/2017/05/17/nsa-hacking-tool-loose/
http://www.denverpost.com/2017/05/17/nsa-hacking-tool-loose/
GAO Finds Information Security, Privacy Key IoT Challenges
GAO Finds Information Security, Privacy Key IoT Challenges
http://healthitsecurity.com/news/gao-finds-information-security-privacy-key-iot-challenges?utm_content=buffer02d88&utm_medium=social&utm_source=twitter.com&utm_campaign=buffer
http://healthitsecurity.com/news/gao-finds-information-security-privacy-key-iot-challenges?utm_content=buffer02d88&utm_medium=social&utm_source=twitter.com&utm_campaign=buffer
Saturday, May 20, 2017
New SMB Worm Uses Seven NSA Hacking Tools. WannaCry Used Just Two
New SMB Worm Uses Seven NSA Hacking Tools. WannaCry Used Just Two
https://www.bleepingcomputer.com/news/security/new-smb-worm-uses-seven-nsa-hacking-tools-wannacry-used-just-two/
https://www.bleepingcomputer.com/news/security/new-smb-worm-uses-seven-nsa-hacking-tools-wannacry-used-just-two/
Friday, May 19, 2017
Genetic Information Nondiscrimination Act of 2008 - National Human Genome Research Institute (NHGRI)
Genetic Information Nondiscrimination Act of 2008 - National Human Genome Research Institute (NHGRI)
https://www.genome.gov/24519851/?WT.qs_osrc=fxb-167656810
https://www.genome.gov/24519851/?WT.qs_osrc=fxb-167656810
Thursday, May 18, 2017
WannaCrypt Hackers May Have A Hard Time Claiming That Ransom Without Getting Caught
WannaCrypt Hackers May Have A Hard Time Claiming That Ransom Without Getting Caught: Though bitcoin’s anonymity makes it popular, hackers may find it impossible to collect the $70,000 collected so far without leaving a trail behind them.
Chainalysis – Blockchain analysis
Chainalysis – Blockchain analysis: Train your analysts to be able to spot emerging threats from the deep web and investigate ransomware or extortion notes in-house.
New York's New Cybersecurity Regulations: The Good, The Bad And The Ugly - Security - United States
New York's New Cybersecurity Regulations: The Good, The Bad And The Ugly - Security - United States: The first foray into comprehensive state regulation of business data protection practices, and arguably the most stringent, is New York's Cybersecurity Requirements for Financial Services Companies, to be found at 23 NYCRR 500.
Study finds cybersecurity pros are hiding breaches, bypassing protocols, and paying ransoms - TechRepublic
Study finds cybersecurity pros are hiding breaches, bypassing protocols, and paying ransoms - TechRepublic
http://www.techrepublic.com/article/study-finds-cybersecurity-pros-are-hiding-breaches-bypassing-protocols-and-paying-ransoms/
http://www.techrepublic.com/article/study-finds-cybersecurity-pros-are-hiding-breaches-bypassing-protocols-and-paying-ransoms/
Wednesday, May 17, 2017
About - Cymmetria | Cyber deception
About - Cymmetria | Cyber deception: Cymmetria is a cyber deception startup focused on changing the asymmetry of cybersecurity, tilting the traditional security odds so that hackers are the ones who are left vulnerable.
Tuesday, May 16, 2017
Embracing Uncertainty for Better Decision-Making | Society for Decision Making Under Deep Uncertainty
The World Bank Group has been at the forefront of mainstreaming new methods to deal with uncertainties. In fact, you may not know this, but the World Bank is one of the founding members of the Society for Decision Making Under Deep Uncertainty.
Monday, May 15, 2017
Hackers use tools stolen from NSA in worldwide cyber attack
Hackers used cyberweapons stolen from the US National Security Agency to strike organisations across the globe on Friday, from the UK's National Health Service to European telecoms company Telefónica and FedEx of the US,
Sunday, May 14, 2017
Microsoft to spooks: WannaCrypt was inevitable, quit hoarding • The Register
Microsoft to spooks: WannaCrypt was inevitable, quit hoarding • The Register
https://www.theregister.co.uk/2017/05/14/microsoft_to_spooks_wannacrypt_was_inevitable_quit_hoarding/
https://www.theregister.co.uk/2017/05/14/microsoft_to_spooks_wannacrypt_was_inevitable_quit_hoarding/
Saturday, May 13, 2017
The high stakes of the Comey controversy - CNNPolitics.com
The high stakes of the Comey controversy - CNNPolitics.com
http://www.cnn.com/2017/05/13/politics/donald-trump-james-comey-russia-week/index.html
http://www.cnn.com/2017/05/13/politics/donald-trump-james-comey-russia-week/index.html
The high stakes of the Comey controversy - CNNPolitics.com
http://www.cnn.com/2017/05/13/politics/donald-trump-james-comey-russia-week/index.html
http://www.cnn.com/2017/05/13/politics/donald-trump-james-comey-russia-week/index.html
Benefits, Women Key to Filling Cyber-Worker Gap in Federal Agencies - Infosecurity Magazine
Benefits, Women Key to Filling Cyber-Worker Gap in Federal Agencies - Infosecurity Magazine
https://www.infosecurity-magazine.com/news/benefits-women-key-to-filling/
https://www.infosecurity-magazine.com/news/benefits-women-key-to-filling/
Friday, May 12, 2017
Tuesday, May 9, 2017
Trump extends Obama executive order on cyberattacks | PCWorld
Trump extends Obama executive order on cyberattacks | PCWorld: Executive Order 13694 was introduced on April 1, 2015, and was due to expire on Saturday, but the president sent a letter to Congress on Wednesday evening informing it of his plans to keep it active.
Monday, May 8, 2017
Wanna Know If Someone Planted Spyware on Your Computer? - Motherboard
Wanna Know If Someone Planted Spyware on Your Computer? - Motherboard: "Figuring out whether someone has installed malware on your computer can be tricky. Specifically, victims of domestic abuse and surveillance often don't know what sort of software has been used to monitor them."
'via Blog this'
'via Blog this'
Sunday, May 7, 2017
Teenage hacker jailed for masterminding attacks on Sony and Microsoft
UK Teenage hacker jailed for masterminding attacks on Sony and Microsoft
https://www.theguardian.com/technology/2017/apr/25/teenage-hacker-adam-mudd-jailed-masterminding-attacks-sony-microsoft?CMP=Share_iOSApp_Other
https://www.theguardian.com/technology/2017/apr/25/teenage-hacker-adam-mudd-jailed-masterminding-attacks-sony-microsoft?CMP=Share_iOSApp_Other
Saturday, May 6, 2017
Space, the Final Frontier for Cybersecurity? | Chatham House
Space, the Final Frontier for Cybersecurity? | Chatham House
https://www.chathamhouse.org/publication/space-final-frontier-cybersecurity#
https://www.chathamhouse.org/publication/space-final-frontier-cybersecurity#
Friday, May 5, 2017
Wednesday, May 3, 2017
Tuesday, May 2, 2017
Home Router Botnet Shut Down in Past 72 Hours. Who did it?
Home Router Botnet Shut Down in Past 72 Hours. Who did it?: "Yesterday morning we noticed that there was a rapid drop-off in attacks from the ISPs we identified 3 weeks ago, that had targeted WordPress websites."
'via Blog this'
'via Blog this'
Dan Geer: Cybersecurity, Humanity's Future "Conjoined" | Threatpost | The first stop for security news
Dan Geer: Cybersecurity, Humanity's Future "Conjoined" | Threatpost | The first stop for security news
https://threatpost.com/dan-geer-cybersecurity-humanitys-future-conjoined/125316/
https://threatpost.com/dan-geer-cybersecurity-humanitys-future-conjoined/125316/
Subscribe to:
Posts (Atom)