Kimberlé Crenshaw Explains The Power Of Intersectional Feminism In 1 Minute | HuffPost: "It took Kimberlé Crenshaw, an esteemed civil rights advocate and law professor, about 60 seconds to lay out the importance of “intersectional feminism” on Friday ― and the internet could not get enough of it."
'via Blog this'
Just a basic blog—snagging random stuff that catches our eye—nothing else, really...
Saturday, March 31, 2018
10 Insanely Good Reasons You Should Publish On Medium | WordStream
10 Insanely Good Reasons You Should Publish On Medium | WordStream: "If you haven't yet taken the leap, here are 10 insanely good reasons you should syndicate your content on Medium."
'via Blog this'
'via Blog this'
Tesla says Autopilot was engaged in fatal crash under investigation in California
Tesla says Autopilot was engaged in fatal crash under investigation in California
https://www.wsj.com/articles/tesla-says-autopilot-was-engaged-in-fatal-crash-under-investigation-in-california-1522462409
https://www.wsj.com/articles/tesla-says-autopilot-was-engaged-in-fatal-crash-under-investigation-in-california-1522462409
Tesla says Autopilot was engaged in fatal crash under investigation in California
Tesla says Autopilot was engaged in fatal crash under investigation in California
https://www.wsj.com/articles/tesla-says-autopilot-was-engaged-in-fatal-crash-under-investigation-in-california-1522462409
Strike 3?
https://www.wsj.com/articles/tesla-says-autopilot-was-engaged-in-fatal-crash-under-investigation-in-california-1522462409
Friday, March 30, 2018
Cybercriminals using clever tricks to hide malware in phones
Cybercriminals using clever tricks to hide malware in phones: While analysts figure out new methodologies for analyzing malware and users begin to understand how all this works, cybercriminals are seeking new ways to hide in phones and compromise devices.
Exclusive: Arizona governor and Uber kept self-driving program secret, emails reveal | Technology | The Guardian
Exclusive: Arizona governor and Uber kept self-driving program secret, emails reveal | Technology | The Guardian: "A cozy relationship with governor Doug Ducey enabled an autonomous program with limited expert oversight – but governor denies it was ‘secret’"
'via Blog this'
'via Blog this'
Uber reaches settlement with family of woman killed by self-driving car
Uber reaches settlement with family of woman killed by self-driving car: "It pulled its approximately 94 test vehicles off the roads after the accident, and Gov. Doug Ducey has since ordered them to stay off Arizona roads."
'via Blog this'
'via Blog this'
How to Improve Tech Candidate Recruitment
How to Improve Tech Candidate Recruitment: " So am I describing dating here or recruitment and hiring? Hard to tell, isn’t it?"
'via Blog this'
'via Blog this'
Yellow wristbands, segregation for Florida homeless in Irma
Yellow wristbands, segregation for Florida homeless in Irma: "she, her husband and her 17-month-old son arrived at an emergency shelter as Hurricane Irma closed in, they were separated from others by yellow wristbands and told to stay in an area with other people like them — the homeless."
'via Blog this'
'via Blog this'
Defining digital down
Defining digital down: "The Trump Federal Communications Commission (FCC) is following a similar “defining down” policy when it comes to what is acceptable in the all-important networks that connect us."
'via Blog this'
'via Blog this'
GDPR and the End of Reckless Data Sharing - SecurityRoundTable.org
GDPR and the End of Reckless Data Sharing - SecurityRoundTable.org
https://www.securityroundtable.org/gdpr-end-reckless-data-sharing/
https://www.securityroundtable.org/gdpr-end-reckless-data-sharing/
The Ransomware Threat to ICS (Industrial Control Systems) Security
The Ransomware Threat to ICS (Industrial Control Systems) Security
https://www.tripwire.com/state-of-security/ics-security/ransomware-threat-ics-security/
https://www.tripwire.com/state-of-security/ics-security/ransomware-threat-ics-security/
Thursday, March 29, 2018
Connected cars pose security risks, and autonomous vehicles only compound the problem | Ovum Link
Connected cars pose security risks, and autonomous vehicles only compound the problem | Ovum Link: "In a few years, we will see the rise of autonomous, or self-driving vehicles, obviating the need for a driver altogether and relying even more heavily on connectivity to perform their tasks."
'via Blog this'
'via Blog this'
Download the report on Connected cars pose security risks, and autonomous vehicles only compound the problem
Download the report on Connected cars pose security risks, and autonomous vehicles only compound the problem: * The different types of cyber threat posed by Connected Cars
* What impact the evolution of autonomous vehicles will have on the overall attack surface of global automotive fleet
* What impact the evolution of autonomous vehicles will have on the overall attack surface of global automotive fleet
Virus Bulletin :: Last-minute paper: Industroyer: biggest threat to industrial control systems since Stuxnet
Virus Bulletin :: Last-minute paper: Industroyer: biggest threat to industrial control systems since Stuxnet: Our talk will cover a detailed analysis of Industroyer's malicious payloads that directly interfere with the targeted industrial control systems, as well as supporting modules responsible for command & control communication, persistence, and so on.
Wednesday, March 28, 2018
About — Peggy Peattie Photography
About — Peggy Peattie Photography: Currently she is an independent photojournalist, documenting the stories of the homeless at www.TalesoftheStreet.com and teaching visual journalism at SDSU and UCSD..
Sophisticated hacking tools now in the hands of petty cybercriminals
Sophisticated hacking tools now in the hands of petty cybercriminals
https://www.scmagazineuk.com/sophisticated-hacking-tools-now-in-the-hands-of-petty-cyber-criminals/article/750525/
https://www.scmagazineuk.com/sophisticated-hacking-tools-now-in-the-hands-of-petty-cyber-criminals/article/750525/
Senior NSA official says tech is wondrous -- and risky in a world of cyberspace foes | Fox News
Senior NSA official says tech is wondrous -- and risky in a world of cyberspace foes | Fox News
http://www.foxnews.com/politics/2018/03/24/senior-nsa-official-says-technology-is-great-but-can-bring-great-risk-in-cybersecurity.html
http://www.foxnews.com/politics/2018/03/24/senior-nsa-official-says-technology-is-great-but-can-bring-great-risk-in-cybersecurity.html
Cyber Analogies: Historical Parallels to Cyber Warfare, Cyber and Computer Security
Cyber Analogies: Historical Parallels to Cyber Warfare, Cyber and Computer Security, Cyber Pearl Harbor Surprise Attack, Nuclear Scenarios, Internet and Web Attacks, Vulnerabilities – CyberWar
Tuesday, March 27, 2018
Absent at Munich: Placing cybersecurity on the main stage of geopolitics – GCSC
Absent at Munich: Placing cybersecurity on the main stage of geopolitics – GCSC: "From this perspective, the main policy deliberations have focused on investing resources to solve short-term security deficiencies. But as the recent election attacks have shown, the use of cyber tools can have a long-standing strategic impact. As the internet of things continues to connect our devices to the cyber realm, real world risks have amplified dramatically."
Security Controls for Computer Systems: Report of Defense Science Board Task Force on Computer Security
Security Controls for Computer Systems: Report of Defense Science Board Task Force on Computer Security - RAND Report R-609-1 | RAND - Ware report 1973
Saturday, March 24, 2018
[1802.07228] The Malicious Use of Artificial Intelligence: Forecasting, Prevention, and Mitigation
[1802.07228] The Malicious Use of Artificial Intelligence: Forecasting, Prevention, and Mitigation: "This report surveys the landscape of potential security threats from malicious uses of AI, "
'via Blog this'
'via Blog this'
Law-enforcement officers raid Cambridge Analytica's headquarters in London
Law-enforcement officers raided Cambridge Analytica's headquarters in London, The Guardian reported late Friday, after Britain's data regulator obtained a warrant to enter the building and seize its servers.
Friday, March 23, 2018
Three things you won’t want to miss from ESET at RSA 2018 | WebWire
Three things you won’t want to miss from ESET at RSA 2018 | WebWire: "ESET’s technology and telemetry allows them to track some of the most dangerous and destructive cybercriminals and cyber-espionage groups — and how any IT department globally can now both utilize and benefit from the very same intel."
'via Blog this'
'via Blog this'
Creating Gritty Black and White Portraits - Jeff Smallwood Photography
Creating Gritty Black and White Portraits - Jeff Smallwood Photography: "I've been interested in learning is how to create gritty, dark, black and white portraits"
https://wegraphics.net/blog/tutorials/photoshop-quick-tip-create-a-dragan-style-portrait-effect-in-5-steps/
https://youtu.be/3I10C8j1B0o - cool Dragan effect tutorial.
'via Blog this'
https://wegraphics.net/blog/tutorials/photoshop-quick-tip-create-a-dragan-style-portrait-effect-in-5-steps/
https://youtu.be/3I10C8j1B0o - cool Dragan effect tutorial.
'via Blog this'
How to Test Images, Messages, Packaging, and Product Concepts with Surveys | SurveyMonkey
How to Test Images, Messages, Packaging, and Product Concepts with Surveys | SurveyMonkey: "For example, your hypothesis could be, “The package design with both a picture of the product and the logo will outperform a package with just our company logo because consumers 1) recognize and trust our brand but 2) want to see what they’re getting.”"
'via Blog this'
'via Blog this'
Cybersecurity apathy rife among US government employees, survey finds
Cybersecurity apathy rife among US government employees, survey finds: "Just 13 percent of government employees believe they have complete personal responsibility for the security of their work devices or information, according to a survey by security services firm Dtex Systems."
'via Blog this'
'via Blog this'
The NSA Worked to “Track Down” Bitcoin Users, Snowden Documents Reveal
The NSA Worked to "Track Down" Bitcoin Users, Snowden Documents Reveal
https://theintercept.com/2018/03/20/the-nsa-worked-to-track-down-bitcoin-users-snowden-documents-reveal/
https://theintercept.com/2018/03/20/the-nsa-worked-to-track-down-bitcoin-users-snowden-documents-reveal/
US National Security Agency Develops System To Identify Bitcoin Users, Say…
US National Security Agency Develops System To Identify Bitcoin Users, Say…
https://cointelegraph.com/news/us-national-security-agency-develops-system-to-identify-bitcoin-users-say-leaked-docs
https://cointelegraph.com/news/us-national-security-agency-develops-system-to-identify-bitcoin-users-say-leaked-docs
Thursday, March 22, 2018
78% of Healthcare Workers Lack Data Privacy, Security Preparedness
78% of Healthcare Workers Lack Data Privacy, Security Preparedness: "Seventy percent of employees in numerous industries lack awareness to stop preventable cybersecurity attacks, MediaPro found in its 2017 State of Privacy and Security Awareness Report. However, 78 percent of healthcare employees showed some lack of preparedness with common privacy and security threat scenarios."
'via Blog this'
'via Blog this'
The power of optimism in determining the future. A briefing from Futurist Chet W. Sisk - LEAD Global
You'll see it when you believe it: The power of optimism in determining the future. A briefing from Futurist Chet W. Sisk - LEAD Global: "Tell the whole story. Tell them about what positive possibilities can come if they re-imagine the future beyond the dystopian tropes of our movies, tv shows and pop culture. We used to call that hope."
'via Blog this'
'via Blog this'
Booking Flights: Our Data Flies with Us - Our Data Our Selves
Booking Flights: Our Data Flies with Us - Our Data Our Selves: "Our Passenger Name Records (PNRs) are commonly displayed as six-digit codes, but they are actually data-rich records generated every time we book flights or hotels. In this article we look at what data is included in a PNR and how this data might be used against politically-engaged individuals."
'via Blog this'
'via Blog this'
Wednesday, March 21, 2018
Quick Start - Games FB
Quick Start - Games: Go to the Basic Settings section of your app and make sure to set the category to Games. Save your changes.
How Cambridge Analytica turned Facebook ‘likes’ into a lucrative political tool | Technology | The Guardian
How Cambridge Analytica turned Facebook ‘likes’ into a lucrative political tool | Technology | The Guardian: The algorithm at the heart of the Facebook data breach sounds almost too dystopian to be real. It trawls through the most apparently trivial, throwaway postings –the “likes” users dole out as they browse the site – to gather sensitive personal information about sexual orientation, race, gender, even intelligence and childhood trauma.
“Cambridge Analytica executives created a company with the Executive Director & Deputy Chairman of…”
"Cambridge Analytica executives created a company with the Executive Director & Deputy Chairman of…" https://medium.com/@wsiegelman/cambridge-analytica-executives-created-a-company-in-2017-with-the-executive-director-deputy-b803f27f84a2
Tuesday, March 20, 2018
Fees and entry requirements
Fees and entry requirements: To apply for this course you need a Professional Diploma or a Postgraduate Diploma, you must also have a minimum of six months work experience at graduate level, in either a managerial or professional capacity which may include voluntary work, placements, internships, project management etc.
MA snd MSc by Research - Research degrees - Research - Kingston University London
MA snd MSc by Research - Research degrees - Research - Kingston University London: In exceptional circumstances, we may consider you for admission to a research degree without the conventional qualifications. If you have substantial relevant professional experience, including publications or written reports, the University will consider these as a potential alternative basis for an application for admission to a research degree programme.
Private traits and attributes are predictable from digital records of human behavior | Proceedings of the National Academy of Sciences
Private traits and attributes are predictable from digital records of human behavior | Proceedings of the National Academy of Sciences: We show that easily accessible digital records of behavior, Facebook Likes, can be used to automatically and accurately predict a range of highly sensitive personal attributes including: sexual orientation, ethnicity, religious and political views, personality traits, intelligence, happiness, use of addictive substances, parental separation, age, and gender.
Big Five Personality Test
Big Five Personality Test: This is an interactive version of the IPIP Big-Five Factor Markers, a measure of the big five personality traits.
20 TOP VOICES OF CYBER SECURITY AND INFORMATION SECURITY FOR MARCH 2018 BY JAN BARBOSA - beBee Producer
20 TOP VOICES OF CYBER SECURITY AND INFORMATION SECURITY FOR MARCH 2018 BY JAN BARBOSA - beBee Producer
https://www.bebee.com/producer/@jan-barbosa/20-top-voices-of-cyber-security-and-information-security-for-march-2018-by-jan-barbosa
https://www.bebee.com/producer/@jan-barbosa/20-top-voices-of-cyber-security-and-information-security-for-march-2018-by-jan-barbosa
Monday, March 19, 2018
Humalogy, the Perfect Blending of Humanity & Technology - SpeakersOffice
Humalogy, the Perfect Blending of Humanity & Technology - SpeakersOffice: What is the definition of Humalogy?“The perfect blending of humanity and technology. Melding the head (information processing power) and the heart (human/spiritual connection.) The efficient use of machines, and the sensitive understanding of emotions.”
Sunday, March 18, 2018
Saturday, March 17, 2018
Friday, March 16, 2018
Apprenticeships - ApprenticePower
Apprenticeships - ApprenticePower: "Apprentice Power collaborates with employers, industry and trade associations, education institutions, staffing agencies and investors to create apprenticeship strategies that support economic development. "
'via Blog this'
'via Blog this'
National Novel Writing Month
"In order to update your word count in November, you need to give your novel a title (don't worry, you can always change it later!). You cannot write your novel on our site, but you can share a short synopsis and excerpt."
Thursday, March 15, 2018
Sunday, March 11, 2018
No one’s coming. It’s up to us. – Dan Hon – Medium
No one’s coming. It’s up to us. – Dan Hon – Medium: Metcalfe’s law says that the value of a telecommunications network is proportional to the square of the number of connected users of the system.
Thursday, March 8, 2018
Meet the Girls Changing the Face of Cyber Security – Amy Poehler’s Smart Girls
Meet the Girls Changing the Face of Cyber Security – Amy Poehler’s Smart Girls: Right now, there is a critical shortage of people with the skills and training required to defend our computer systems.
Wednesday, March 7, 2018
Cybersecurity Briefings | Accenture
Cybersecurity Briefings | Accenture: To protect their businesses, CEOs and directors must demand appropriate briefings from their chief information security officers (CISOs).
Here's what keeps your CISO up at night - Help Net Security
Here's what keeps your CISO up at night - Help Net Security: 89.1 percent of all information security leaders are concerned about the rise of digital threats they are experiencing across web, social and mobile channels, according to the 2018 CISO Survey by RiskIQ.
Here's what keeps your CISO up at night - Help Net Security
Here's what keeps your CISO up at night - Help Net Security: 89.1 percent of all information security leaders are concerned about the rise of digital threats they are experiencing across web, social and mobile channels, according to the 2018 CISO Survey by RiskIQ.
Women of Infosec call bullsh*t on RSA's claim it could only find one female speaker by Magda CHELLY
Women of Infosec call bullsh*t on RSA's claim it could only find one female speaker by Magda CHELLY
https://www.google.com/url?rct=j&sa=t&url=https://www.theregister.co.uk/2018/03/07/oursa_women_in_infosec_conference/&ct=ga&cd=CAIyHTY1Y2QxNjY0ZWI3NTJlY2Y6Y29tLnNnOmVuOlNH&usg=AFQjCNGo9hP8fIPqdwCrpn1PZxTZnEJ7Ww
https://www.google.com/url?rct=j&sa=t&url=https://www.theregister.co.uk/2018/03/07/oursa_women_in_infosec_conference/&ct=ga&cd=CAIyHTY1Y2QxNjY0ZWI3NTJlY2Y6Y29tLnNnOmVuOlNH&usg=AFQjCNGo9hP8fIPqdwCrpn1PZxTZnEJ7Ww
Inside the 'Stalkerware' Surveillance Market, Where Ordinary People Tap Each Other's Phones - Motherboard
Inside the 'Stalkerware' Surveillance Market, Where Ordinary People Tap Each Other's Phones - Motherboard
https://motherboard.vice.com/en_us/article/53vm7n/inside-stalkerware-surveillance-market-flexispy-retina-x
For LM
https://motherboard.vice.com/en_us/article/53vm7n/inside-stalkerware-surveillance-market-flexispy-retina-x
Tuesday, March 6, 2018
Why an Honor Student Wants to Skip College to Go to Trade School
Why an Honor Student Wants to Skip College to Go to Trade School
Write to Douglas Belkin at doug.belkin@wsj.com
https://www.wsj.com/articles/college-or-trade-school-its-a-tough-call-for-many-teens-1520245800
Write to Douglas Belkin at doug.belkin@wsj.com
https://www.wsj.com/articles/college-or-trade-school-its-a-tough-call-for-many-teens-1520245800
Monday, March 5, 2018
Free SSL Guide | InMotion Hosting
Free SSL Guide | InMotion Hosting: "When you enable Free SSL, your domains are automatically assigned an SSL if they are eligible"
'via Blog this'
'via Blog this'
Fred Cohen & Associates
Fred Cohen & Associates: "A Case for Benevolent Viruses
by Dr. Frederick B. Cohen * "
'via Blog this'
by Dr. Frederick B. Cohen * "
'via Blog this'
Cyber-attack: US and UK blame North Korea for WannaCry - BBC News
Cyber-attack: US and UK blame North Korea for WannaCry - BBC News: "The US and UK governments have said North Korea was responsible for the WannaCry malware attack affecting hospitals, businesses and banks across the world earlier this year."
'via Blog this'
'via Blog this'
UK and US blame Russia for 'malicious' NotPetya cyber-attack - BBC News
UK and US blame Russia for 'malicious' NotPetya cyber-attack - BBC News: "The Russian military was directly behind a "malicious" cyber-attack on Ukraine that spread globally last year, the US and Britain have said."
'via Blog this'
'via Blog this'
Saturday, March 3, 2018
Navigating Healthcare's Biggest Cybersecurity Challenges Endpoint
"To validate the HIMSS results, Palo Alto Networks® analyzed threat data from more than 1,000 global healthcare providers and found that email-based campaigns account for 94 percent of all attacks"
Black Hat | EU
Black Hat | Sponsors: No other European security event offers the depth of content combined with the opportunities for networking and career growth that Black Hat delivers.
Friday, March 2, 2018
S. Cobb on Security: Getting to know CISOs: Challenging assumptions about closing the cybersecurity skills gap
S. Cobb on Security: Getting to know CISOs: Challenging assumptions about closing the cybersecurity skills gap: "The cybersecurity skills gap is a serious problem for many countries, and it is a problem that I have been studying for some time."
Tweet with pic
'via Blog this'
Tweet with pic
'via Blog this'
Caring Neighborhoods - City of Sacramento
Caring Neighborhoods - City of Sacramento: "Sacramento is a city of neighborhoods. Many residents of these neighborhoods are growing older and are facing the challenges of living independently and no longer feel connected to the communities they live in. In Sacramento, approximately 47,551 people are over 65. Thirty percent of those are over 80 years old. "
'via Blog this'
'via Blog this'
File your CFP Submission for @dianainitiative | The Diana Initiative 3.0
File your CFP Submission for @dianainitiative | The Diana Initiative 3.0
https://www.dianainitiative.org/cfp/
Check out....
https://www.dianainitiative.org/cfp/
World's Biggest Family Tree Contains 13 Million People—And It Shows…
World's Biggest Family Tree Contains 13 Million People—And It Shows…
"colleagues downloaded 86 million public profiles from Geni.com, one of the largest collaborative genealogy websites"
http://www.newsweek.com/worlds-biggest-family-tree-contains-13-million-people-and-it-shows-when-827893
"colleagues downloaded 86 million public profiles from Geni.com, one of the largest collaborative genealogy websites"
http://www.newsweek.com/worlds-biggest-family-tree-contains-13-million-people-and-it-shows-when-827893
Thursday, March 1, 2018
7 Best Places to Live in Albuquerque for Top Healthcare - Movoto
7 Best Places to Live in Albuquerque for Top Healthcare - Movoto: "The 87106 area is home to the UNM/Southeast Heights neighborhood, which offers immediate access to the University of New Mexico hospital and the UNM Carrie Tingley Hospital. "
'via Blog this'
'via Blog this'
PCSD – Psychiatric Centers at San Diego
PCSD – Psychiatric Centers at San Diego: "Psychiatric Centers at San Diego, Incorporated Medical Group (PCSD) is a group of psychiatrists, therapists, and nurse practitioners who are engaged in a wide range of professional endeavors."
'via Blog this'
'via Blog this'
eCrime 2018 : IEEE 13th Symposium on Electronic Crime Research
eCrime 2018 : IEEE 13th Symposium on Electronic Crime Research: The thirteenth Symposium on Electronic Crime Research (eCrime) 2018 will be held between May 14th - 16th 2018 in San Diego, CA.
The Right Way to Monetize a Blog (With Lessons From Wait But Why)
The Right Way to Monetize a Blog (With Lessons From Wait But Why)
https://www.shopify.com/blog/117906117-the-audience-first-approach-to-monetizing-your-content-with-lessons-from-wait-but-why
https://www.shopify.com/blog/117906117-the-audience-first-approach-to-monetizing-your-content-with-lessons-from-wait-but-why
Subscribe to:
Posts (Atom)