Wednesday, January 30, 2019

Tuesday, January 29, 2019

IBM Study: Hidden Costs of Data Breaches Increase Expenses for Businesses - Jul 11, 2018

IBM Study: Hidden Costs of Data Breaches Increase Expenses for Businesses - Jul 11, 2018: Sponsored by IBM Security and conducted by Ponemon Institute, the 2018 Cost of a Data Breach Study1 found that the average cost of a data breach globally is $3.86 million,2 a 6.4 percent increase from the 2017 report.

Watch: 5 smart buildings that got hacked

Watch: 5 smart buildings that got hacked: With IT and building control bound ever-more inextricably together, cybersecurity is an unignorable risk for facilities and security managers as well as IT professionals.

To raise security awareness, researchers spent months hacking mock building systems

To raise security awareness, researchers spent months hacking mock building systems: ForeScout researchers�assembled�a lab of building-automation equipment, threw their custom malware at it, and then documented how effectively their code�manipulated the gear.

Exclusive: Hackers Take Control Of Giant Construction Cranes

Exclusive: Hackers Take Control Of Giant Construction Cranes: The attacks are simple, cheap and open to any person willing to risk launching them, warns Mark Nunnikhoven, VP for cloud security at Trend Micro. “Anyone in range can manipulate these devices.”

Friday, January 25, 2019

• U.S.: violent crime rate graph 1990-2017 | Statista

• U.S.: violent crime rate graph 1990-2017 | Statista: "This graph shows the reported violent crime rate in the U.S. since 1990. In 2017, the nationwide rate was 382.9 cases per 100,000 of the population."

Unauthorized immigrant population trends for states, birth countries and regions

Unauthorized immigrant population trends for states, birth countries and regions: In 2016, an estimated 10.7 million unauthorized immigrants lived in the U.S., down from a peak of 12.2 million in 2007.

Old IoT vulnerabilities – a botnet gift that keeps on giving

Old IoT vulnerabilities – a botnet gift that keeps on givingIT News Africa – Up to date technology news, IT news, Digital news, Telecom news, Mobile news, Gadgets news, Analysis and Reports | Africa's Technology News Leader: "The first thing anyone purchasing any device that connects to the Internet should do upon switching it on for the first time is to update it immediately. If you don’t, you risk having it hijacked by a botnet."

This Time It’s Russia’s Emails Getting Leaked

The Messy Truth About Infiltrating Computer Supply Chains

Threat Spotlight: IoT Application Vulnerabilities Leave IOT Devices Open To Attack

Threat Spotlight: IoT Application Vulnerabilities leave IOT Devices Open To Attack. - IT Security Guru
https://www.itsecurityguru.org/2019/01/24/threat-spotlight-iot-application-vulnerabilities-leave-iot-devices-open-to-attack/

Microsoft Senior Technical Evangelist Salaries | Paysa

Technical Evangelist Salary | PayScale

Microsoft Technical Evangelist Salaries | Glassdoor

Wednesday, January 16, 2019

Kies my Samsung Bye Bye

Kies: Kies 3 supported models: Samsung Galaxy devices running Android 4.3 or later versions.

ThreatList: $1.7M is the Average Cost of a Cyber-Attack | Threatpost | The first stop for security news

Exclusive: Hackers Take Control Of Giant Construction Cranes

Tony... To raise security awareness, researchers spent months hacking mock building systems - CyberScoop

Crackdown showdown: Serious cybersecurity enforcement is coming in 2019, but are advisers ready?

Crackdown showdown: Serious cybersecurity enforcement is coming in 2019, but are advisers ready?: "The Securities and Exchange Commission is leading the charge. The agency took several actions in 2018 that should alert every adviser that any grace period in adopting data security controls has expired."

Average cost of a cyberattack passes $1 million

Saturday, January 12, 2019

10 Awesome Free Business Name Generators

10 Awesome Free Business Name Generators: "Choosing a business name can be one of the easiest parts of starting a business, or it can be one of the most difficult."

On cybersecurity, North Dakota wants to ‘change the conversation completely’ | StateScoop

On cybersecurity, North Dakota wants to ‘change the conversation completely’ | StateScoop: "a radical overhaul of the state’s information technology budget, proposed earlier this year by the state’s top technology officials, to unify IT and cybersecurity polices for nearly every public institution across the state under a single agency."

The Genius Neuroscientist Who Might Hold the Key to True AI | WIRED

The Genius Neuroscientist Who Might Hold the Key to True AI | WIRED: “You don’t teach undergraduates the free energy principle—yet.”

How Continuing To Work Can Increase Social Security Benefits

CDA hippie cybernetic grindr

Ekeland said the law is "antiquated" and "utopian," a "Haight-Ashbury vision of technology being the savior when the reality is a lot darker."
https://theoutline.com/post/6968/grindr-lawsuit-matthew-herrick?zd=2&zi=jju3lfua

Friday, January 11, 2019

GOV Employees Can Now Attend Suits and Spooks DC FREE* During Gov Shut Down

GOV Employees Can Now Attend Suits and Spooks DC FREE* During Gov Shut Down: "As a former Coastie, I remember what it was like to have to work without pay during a government shutdown and it wasn’t fun."

California Consumer Privacy Act: The Challenge Ahead — Key Terms in the CCPA | HL Chronicle of Data Protection

California Consumer Privacy Act: The Challenge Ahead — Key Terms in the CCPA | HL Chronicle of Data Protection: "The law defines a “business” as a legal entity that collects consumers’ personal information, determines the purposes and means of processing consumers’ personal information, conducts business in the State of California, and satisfies one or more enumerated thresholds:



  • Earns annual gross revenues in excess of $25,000,000; 
  • Buys, receives for commercial purposes, sells, or shares for commercial purposes, the personal information of 50,000 or more consumers, households, or devices per year; or 
  • Derives 50 percent or more of its annual revenues from selling consumers’ personal information. 


The second threshold for a “business” is ambiguous. As we describe below, the CCPA’s definition of “consumer” is limited to California residents. However, the CCPA does not specify whether “households” or “devices” are similarly limited.

California Consumer Privacy Act: The Challenge Ahead - Consumer Litigation and the CCPA: What to Expect | HL Chronicle of Data Protection

California Consumer Privacy Act: The Challenge Ahead - Consumer Litigation and the CCPA: What to Expect | HL Chronicle of Data Protection: This post discusses litigation exposure that businesses collecting personal information about California consumers should consider in the wake of the California Legislature’s passage of the California Consumer Privacy Act of 2018 (CCPA).

A Comparison of GDPR and CCPA | I.S. Partners | Compliance Advisors

A Comparison of GDPR and CCPA | I.S. Partners | Compliance Advisors: One of the most important things to understand about the CCPA has to do with how it applies to businesses. If you run an organization that meets any one of the following criteria, you now have to concern yourself with what the CCPA means:

Is it great to be a worker in the U.S.? Not compared with the rest of the developed world. - The Washington Post

Is it great to be a worker in the U.S.? Not compared with the rest of the developed world. - The Washington Post: The United States and Mexico are the only countries in the entire study that don't require any advance notice for individual firings. The U.S. ranks at the bottom for employee protection

European Employment Law 101: Employment At-Will Is Truly a Foreign Concept - HR Daily Advisor

European Employment Law 101: Employment At-Will Is Truly a Foreign Concept - HR Daily Advisor: One of the biggest conceptual differences is the unique U.S. employment at-will doctrine—which does not exist in European employment law. Naturally, understanding this difference (among many others) is especially important when dealing with the European Union and its member states.

For Owners of Amazon's Ring Security Cameras, Strangers May Have Been Watching

For Owners of Amazon's Ring Security Cameras, Strangers May Have Been Watching

https://theintercept.com/2019/01/10/amazon-ring-security-camera/

Monday, January 7, 2019

Cisco, Apple, Aon, Allianz introduce a first in cyber risk management - Apple

Cisco, Apple, Aon, Allianz introduce a first in cyber risk management - Apple: Cisco, Apple, Aon and Allianz today announced a new cyber risk management solution for businesses, comprised of cyber resilience evaluation services from Aon, the most secure technology from Cisco and Apple, and options for enhanced cyber insurance coverage from Allianz.

Search houses and flats for sale and to rent in Coventry - Matthew James

Saturday, January 5, 2019

A Holistic Approach to Understanding and Addressin...

A Holistic Approach to Understanding and Addressin...: Coventry University (CU) is inviting applications from suitably-qualified graduates for a fully-funded PhD studentship

Trying this code

Here is code:

javascript:popw='';Q='';x=document;y=window;if(x.selection) {Q=x.selection.createRange().text;} else if (y.getSelection) {Q=y.getSelection();} else if (x.getSelection) {Q=x.getSelection();}popw = y.open('http://www.blogger.com/blog_this.pyra?t=' + escape(Q) + '&u=' + escape(location.href) + '&n=' + escape(document.title),'bloggerForm','scrollbars=no,width=475,height=300,top=175,left=75,status=yes,resizable=yes');if (!document.all) T = setTimeout('popw.focus()',50);void(0)

 Copy and paste.

Individuals with congenital amusia imitate pitches more accurately in singing than in speaking: Implications for music and language processing | SpringerLink

Individuals with congenital amusia imitate pitches more accurately in singing than in speaking: Implications for music and language processing | SpringerLink: we investigated the impact of congenital amusia, a disorder of musical processing, on speech and song imitation in speakers of a tone language, Mandarin.

Did cybercrime cause the crime drop? | Crime Science | Full Text

Thursday, January 3, 2019

Ever wondered what the dark web looks like?

Ever wondered what the dark web looks like?: Cobb guided Ryssdal to Dream Market, a popular marketplace that makes it easy to browse illegal goods for sale such as scans of driver's licenses, bundles of stolen credit card data, which are called "dumps," and ransomwear.