IoT botnet used in YouTube ad fraud scheme | ZDNet
Just a basic blog—snagging random stuff that catches our eye—nothing else, really...
Thursday, January 31, 2019
Windows Anti-Malware Market Share Report, October 2018 | OPSWAT
Windows Anti-Malware Market Share Report, October 2018 | OPSWAT: "monthly updates on the market share of leading anti-malware vendors and products"
Wednesday, January 30, 2019
Amy Jordan - Agenda Contributor | World Economic Forum
Amy Jordan - Agenda Contributor | World Economic Forum
Cyber security centre
https://www.weforum.org/agenda/authors/amy-jordan/Unconfigured IoT is a security risk, warns researcher
This is an interesting angle. Even more attack surface...
https://www.computerweekly.com/news/252456704/Unconfigured-IoT-is-a-security-risk-warns-researcherAI in Security Carries as Many Questions as Answers
AI in Security Carries as Many Questions as Answers: "AI is certainly, thanks to very strong marketing, winning the hearts and minds, not of the practitioners but of the broader executive suite,"
Black Hat: European Security Pros Wrestling With Cyber-badness
Black Hat: European Security Pros Wrestling With ...: "Nearly two-thirds (65%) of security pros in Europe believe a successful cyberattack affecting the critical infrastructure of multiple EU nations will occur in the next two years,"
Tuesday, January 29, 2019
IBM Study: Hidden Costs of Data Breaches Increase Expenses for Businesses - Jul 11, 2018
IBM Study: Hidden Costs of Data Breaches Increase Expenses for Businesses - Jul 11, 2018: Sponsored by IBM Security and conducted by Ponemon Institute, the 2018 Cost of a Data Breach Study1 found that the average cost of a data breach globally is $3.86 million,2 a 6.4 percent increase from the 2017 report.
Watch: 5 smart buildings that got hacked
Watch: 5 smart buildings that got hacked: With IT and building control bound ever-more inextricably together, cybersecurity is an unignorable risk for facilities and security managers as well as IT professionals.
To raise security awareness, researchers spent months hacking mock building systems
To raise security awareness, researchers spent months hacking mock building systems: ForeScout researchers�assembled�a lab of building-automation equipment, threw their custom malware at it, and then documented how effectively their code�manipulated the gear.
Exclusive: Hackers Take Control Of Giant Construction Cranes
Exclusive: Hackers Take Control Of Giant Construction Cranes: The attacks are simple, cheap and open to any person willing to risk launching them, warns Mark Nunnikhoven, VP for cloud security at Trend Micro. “Anyone in range can manipulate these devices.”
Sunday, January 27, 2019
Saturday, January 26, 2019
A Modern 4-story Work Of Art Located In The... - VRBO
A Modern 4-story Work Of Art Located In The... - VRBO: This 4 story piece of art will make your stay in San Diego truly unforgettable.
Friday, January 25, 2019
• U.S.: violent crime rate graph 1990-2017 | Statista
• U.S.: violent crime rate graph 1990-2017 | Statista: "This graph shows the reported violent crime rate in the U.S. since 1990. In 2017, the nationwide rate was 382.9 cases per 100,000 of the population."
Unauthorized immigrant population trends for states, birth countries and regions
Unauthorized immigrant population trends for states, birth countries and regions: In 2016, an estimated 10.7 million unauthorized immigrants lived in the U.S., down from a peak of 12.2 million in 2007.
Old IoT vulnerabilities – a botnet gift that keeps on giving
Old IoT vulnerabilities – a botnet gift that keeps on givingIT News Africa – Up to date technology news, IT news, Digital news, Telecom news, Mobile news, Gadgets news, Analysis and Reports | Africa's Technology News Leader: "The first thing anyone purchasing any device that connects to the Internet should do upon switching it on for the first time is to update it immediately. If you don’t, you risk having it hijacked by a botnet."
Threat Spotlight: IoT Application Vulnerabilities Leave IOT Devices Open To Attack
Threat Spotlight: IoT Application Vulnerabilities leave IOT Devices Open To Attack. - IT Security Guru
https://www.itsecurityguru.org/2019/01/24/threat-spotlight-iot-application-vulnerabilities-leave-iot-devices-open-to-attack/Thursday, January 24, 2019
Age bias law does not cover job applicants: U.S. appeals court | Reuters
Age bias law does not cover job applicants: U.S. appeals court | Reuters
https://www.reuters.com/article/us-usa-labor-age-bias/age-bias-law-does-not-cover-job-applicants-u-s-appeals-court-idUSKCN1PI02N
https://www.reuters.com/article/us-usa-labor-age-bias/age-bias-law-does-not-cover-job-applicants-u-s-appeals-court-idUSKCN1PI02N
Wednesday, January 23, 2019
Monday, January 21, 2019
Sunday, January 20, 2019
Saturday, January 19, 2019
The Exaggerated Promise of So-Called Unbiased Data Mining
The Exaggerated Promise of So-Called Unbiased Data Mining | WIRED
https://www.wired.com/story/the-exaggerated-promise-of-data-mining/
https://www.wired.com/story/the-exaggerated-promise-of-data-mining/
GRIFFIN v. COGHILL | Civil Action No. 17-cv-11619... | 20180813872| Leagle.com
GRIFFIN v. COGHILL | Civil Action No. 17-cv-11619... | 20180813872| Leagle.com: a total judgment of $420,141.28 with interest as provided by law
Friday, January 18, 2019
Thursday, January 17, 2019
LoJax Malware Continues to Operate 8 Months After Discovery - ExtremeTech
LoJax Malware Continues to Operate 8 Months After Discovery - ExtremeTech
https://www.extremetech.com/computing/283961-lojax-malware-continues-to-operate-8-months-after-discovery
https://www.extremetech.com/computing/283961-lojax-malware-continues-to-operate-8-months-after-discovery
Wednesday, January 16, 2019
Kies my Samsung Bye Bye
Kies: Kies 3 supported models: Samsung Galaxy devices running Android 4.3 or later versions.
Crackdown showdown: Serious cybersecurity enforcement is coming in 2019, but are advisers ready?
Crackdown showdown: Serious cybersecurity enforcement is coming in 2019, but are advisers ready?: "The Securities and Exchange Commission is leading the charge. The agency took several actions in 2018 that should alert every adviser that any grace period in adopting data security controls has expired."
Monday, January 14, 2019
NASA internal app leaked employee emails, project names | ZDNet
NASA internal app leaked employee emails, project names | ZDNet
https://www.zdnet.com/article/nasa-internal-app-leaked-employee-emails-project-names/
https://www.zdnet.com/article/nasa-internal-app-leaked-employee-emails-project-names/
How Much Should I Pay The Directors On My Board?
How Much Should I Pay The Directors On My Board?: Median Annual Retainer for U.S. based directors was $24,000 vs. $25,000 internationally.
Interventional radiology of the adrenal glands: current status
Interventional radiology of the adrenal glands: current status: "As more and more adrenal neoplasms are found incidentally or symptomatically, the need for interventional procedures has being increasing. In recent years these procedures registered continued steady expansion."
Sunday, January 13, 2019
Get Fit — Faster: This 22-Minute Workout Has You Covered
Most realistic I've seen: Get Fit — Faster: This 22-Minute Workout Has You Covered : NPR: https://www.npr.org/sections/health-shots/2019/01/13/684432540/get-fit-faster-this-22-minute-workout-has-you-covered
Saturday, January 12, 2019
10 Awesome Free Business Name Generators
10 Awesome Free Business Name Generators: "Choosing a business name can be one of the easiest parts of starting a business, or it can be one of the most difficult."
On cybersecurity, North Dakota wants to ‘change the conversation completely’ | StateScoop
On cybersecurity, North Dakota wants to ‘change the conversation completely’ | StateScoop: "a radical overhaul of the state’s information technology budget, proposed earlier this year by the state’s top technology officials, to unify IT and cybersecurity polices for nearly every public institution across the state under a single agency."
The Genius Neuroscientist Who Might Hold the Key to True AI | WIRED
The Genius Neuroscientist Who Might Hold the Key to True AI | WIRED: “You don’t teach undergraduates the free energy principle—yet.”
CDA hippie cybernetic grindr
Ekeland said the law is "antiquated" and "utopian," a "Haight-Ashbury vision of technology being the savior when the reality is a lot darker."
https://theoutline.com/post/6968/grindr-lawsuit-matthew-herrick?zd=2&zi=jju3lfua
https://theoutline.com/post/6968/grindr-lawsuit-matthew-herrick?zd=2&zi=jju3lfua
Friday, January 11, 2019
GOV Employees Can Now Attend Suits and Spooks DC FREE* During Gov Shut Down
GOV Employees Can Now Attend Suits and Spooks DC FREE* During Gov Shut Down: "As a former Coastie, I remember what it was like to have to work without pay during a government shutdown and it wasn’t fun."
California Consumer Privacy Act: The Challenge Ahead — Key Terms in the CCPA | HL Chronicle of Data Protection
California Consumer Privacy Act: The Challenge Ahead — Key Terms in the CCPA | HL Chronicle of Data Protection: "The law defines a “business” as a legal entity that collects consumers’ personal information, determines the purposes and means of processing consumers’ personal information, conducts business in the State of California, and satisfies one or more enumerated thresholds:
The second threshold for a “business” is ambiguous. As we describe below, the CCPA’s definition of “consumer” is limited to California residents. However, the CCPA does not specify whether “households” or “devices” are similarly limited.
- Earns annual gross revenues in excess of $25,000,000;
- Buys, receives for commercial purposes, sells, or shares for commercial purposes, the personal information of 50,000 or more consumers, households, or devices per year; or
- Derives 50 percent or more of its annual revenues from selling consumers’ personal information.
The second threshold for a “business” is ambiguous. As we describe below, the CCPA’s definition of “consumer” is limited to California residents. However, the CCPA does not specify whether “households” or “devices” are similarly limited.
California Consumer Privacy Act: The Challenge Ahead - Consumer Litigation and the CCPA: What to Expect | HL Chronicle of Data Protection
California Consumer Privacy Act: The Challenge Ahead - Consumer Litigation and the CCPA: What to Expect | HL Chronicle of Data Protection: This post discusses litigation exposure that businesses collecting personal information about California consumers should consider in the wake of the California Legislature’s passage of the California Consumer Privacy Act of 2018 (CCPA).
A Comparison of GDPR and CCPA | I.S. Partners | Compliance Advisors
A Comparison of GDPR and CCPA | I.S. Partners | Compliance Advisors: One of the most important things to understand about the CCPA has to do with how it applies to businesses. If you run an organization that meets any one of the following criteria, you now have to concern yourself with what the CCPA means:
Is it great to be a worker in the U.S.? Not compared with the rest of the developed world. - The Washington Post
Is it great to be a worker in the U.S.? Not compared with the rest of the developed world. - The Washington Post: The United States and Mexico are the only countries in the entire study that don't require any advance notice for individual firings. The U.S. ranks at the bottom for employee protection
European Employment Law 101: Employment At-Will Is Truly a Foreign Concept - HR Daily Advisor
European Employment Law 101: Employment At-Will Is Truly a Foreign Concept - HR Daily Advisor: One of the biggest conceptual differences is the unique U.S. employment at-will doctrine—which does not exist in European employment law. Naturally, understanding this difference (among many others) is especially important when dealing with the European Union and its member states.
For Owners of Amazon's Ring Security Cameras, Strangers May Have Been Watching
For Owners of Amazon's Ring Security Cameras, Strangers May Have Been Watching
https://theintercept.com/2019/01/10/amazon-ring-security-camera/
https://theintercept.com/2019/01/10/amazon-ring-security-camera/
Wednesday, January 9, 2019
NSA to release GHIDRA open source reverse engineering tool
NSA to release GHIDRA open source reverse engineering tool
https://searchsecurity.techtarget.com/news/252455479/NSA-to-release-GHIDRA-open-source-reverse-engineering-tool
https://searchsecurity.techtarget.com/news/252455479/NSA-to-release-GHIDRA-open-source-reverse-engineering-tool
Tuesday, January 8, 2019
BK removal
How to Remove a Bankruptcy from Your Credit Report [See Proof]
https://www.crediful.com/bankruptcy-on-your-credit-report/Monday, January 7, 2019
Cisco, Apple, Aon, Allianz introduce a first in cyber risk management - Apple
Cisco, Apple, Aon, Allianz introduce a first in cyber risk management - Apple: Cisco, Apple, Aon and Allianz today announced a new cyber risk management solution for businesses, comprised of cyber resilience evaluation services from Aon, the most secure technology from Cisco and Apple, and options for enhanced cyber insurance coverage from Allianz.
Saturday, January 5, 2019
A Holistic Approach to Understanding and Addressin...
A Holistic Approach to Understanding and Addressin...: Coventry University (CU) is inviting applications from suitably-qualified graduates for a fully-funded PhD studentship
Trying this code
Here is code:
javascript:popw='';Q='';x=document;y=window;if(x.selection) {Q=x.selection.createRange().text;} else if (y.getSelection) {Q=y.getSelection();} else if (x.getSelection) {Q=x.getSelection();}popw = y.open('http://www.blogger.com/blog_this.pyra?t=' + escape(Q) + '&u=' + escape(location.href) + '&n=' + escape(document.title),'bloggerForm','scrollbars=no,width=475,height=300,top=175,left=75,status=yes,resizable=yes');if (!document.all) T = setTimeout('popw.focus()',50);void(0)
Copy and paste.
javascript:popw='';Q='';x=document;y=window;if(x.selection) {Q=x.selection.createRange().text;} else if (y.getSelection) {Q=y.getSelection();} else if (x.getSelection) {Q=x.getSelection();}popw = y.open('http://www.blogger.com/blog_this.pyra?t=' + escape(Q) + '&u=' + escape(location.href) + '&n=' + escape(document.title),'bloggerForm','scrollbars=no,width=475,height=300,top=175,left=75,status=yes,resizable=yes');if (!document.all) T = setTimeout('popw.focus()',50);void(0)
Copy and paste.
Individuals with congenital amusia imitate pitches more accurately in singing than in speaking: Implications for music and language processing | SpringerLink
Individuals with congenital amusia imitate pitches more accurately in singing than in speaking: Implications for music and language processing | SpringerLink: we investigated the impact of congenital amusia, a disorder of musical processing, on speech and song imitation in speakers of a tone language, Mandarin.
Thursday, January 3, 2019
Ever wondered what the dark web looks like?
Ever wondered what the dark web looks like?: Cobb guided Ryssdal to Dream Market, a popular marketplace that makes it easy to browse illegal goods for sale such as scans of driver's licenses, bundles of stolen credit card data, which are called "dumps," and ransomwear.
Wednesday, January 2, 2019
Where to Download All the Books That Just Entered the Public Domain - Motherboard
Where to Download All the Books That Just Entered the Public Domain
https://motherboard.vice.com/en_us/article/qvq99b/how-to-download-the-books-that-just-entered-the-public-domain
Book Speaking, Events and Appearances | APB Speakers
Book Peter Singer for Speaking, Events and Appearances | APB Speakers: "There is no issue more important and yet less understood today than Cybersecurity."
New Hacking Tool Lets Users Access a Bunch of DVRs and Their Video Feeds
New Hacking Tool Lets Users Access a Bunch of DVRs and Their Video Feeds: "Fernandez also published a few screenshots of devices he gained access to by leveraging CVE-2018-9995 and his tool. The screenshots showed Fernandez having full access to the DVRs' settings, but also to live video feeds."
Tuesday, January 1, 2019
Radsone ES100 Bluetooth Receiver User Manual EarStudio Manual ENG added pages
Radsone ES100 Bluetooth Receiver User Manual EarStudio Manual ENG added pages:
Classic example of dumb design ruining a great piece of tech.
Radsone ES100 Bluetooth Receiver User Manual EarStudio Manual
Classic example of dumb design ruining a great piece of tech.
Radsone ES100 Bluetooth Receiver User Manual EarStudio Manual
Using Shodan's streaming API to show a live stream of vulnerable devices as Shodan finds them.
HackerGiraffe/VulnStream: Using Shodan's streaming API to show a live stream of vulnerable devices as Shodan finds them.: "Using Shodan's streaming API to show a live stream of vulnerable devices as Shodan finds them."
Subscribe to:
Posts (Atom)