Tuesday, February 26, 2019

Tweet from ᴉpᴉǝH (@winter_heidi)

ᴉpᴉǝH (@winter_heidi) tweeted at 7:02 PM on Mon, Feb 25, 2019:
"For multi-factor authentication, "SMS messages, emails and/or voice calls" are now no longer acceptable factors for level two maturity."

FINALLY

https://t.co/3DbcuqnzK4
(https://twitter.com/winter_heidi/status/1100229554772180993?s=03)

Get the official Twitter app at https://twitter.com/download?s=13

Sunday, February 24, 2019

Feed Your Microbiome With Fiber-Rich And Naturally Fermented Foods : The Salt : NPR

Feed Your Microbiome With Fiber-Rich And Naturally Fermented Foods : The Salt : NPR: "Another big one comes from fruits and veggies, called Fructo-oligosaccharides. It's shorter than inulin and adding it to your diet has been shown to reduce markers of inflammation.

Galacto-oligosaccharides are another form of fiber found in milk, and are broken down in the colon.

I was really surprised to learn about resistant starch as another form of fiber. It comes from more simple carbohydrates that have been cooked and then cooled; think of cold potato or pasta salad."

Monday, February 18, 2019

Jewelry Resin - Jewel-R-Rezin

Jewelry Resin - Jewel-R-Rezin: "One of the best jewelry resins is Jewel-R-Rezin is a professional grade, optically clear jewelry resin used for both jewelry making and encapsulation."

Easy Casting of Small Model Parts and Miniatures with Blue Stuff

Easy Casting of Small Model Parts and Miniatures with Blue Stuff: "The amazing model maker, David Damek, who runs the website and YouTube channel called Plastic Models posted this video last year showing how he casts copies of parts for his models using something called Blue Stuff."

Spending on Consumer Drug Ads Skyrockets - Consumer Reports

Spending on Consumer Drug Ads Skyrockets - Consumer Reports: "Also look to see whether the ad ends by pointing to another source for additional information. That information might contain other important details that you need to know about."

Most advertised drugs on U.S. TV 2018 | Statistic

Humira, Lyrica, Zeljanz, Taltz, Chantix, Cosentyx, Entresto
Jardiance, Ibrance, Keytruda, Eliquis, Otezia, Xarelto, Trulicity

This page lists 128 drugs that have been advertised on TV.

The chart shows some pharmaceutical brands in the United States in 2018, by national TV ad spend. AbbVie's Humira was the most advertised drug on U.S. national TV in 2018, with a TV ad spend of 375 million U.S. dollars.
2018 spend
Jardiance86
Ibrance92
Keytruda107
Eliquis136
Otezla139
Xarelto143
Trulicity183

Direct-to-Consumer Advertising of Drugs | Journal of Ethics

How to Stop Direct-to-Consumer Prescription Drug Ads

Wednesday, February 13, 2019

Datto's 2018 State of the MSP Report

Datto's 2018 State of the MSP Report: "60% of MSPs serve less than 100 clients, followed by 20% that serve 101-200 clients"

How Large is the MSP Market and How Many MSPs Are There? - ChannelE2E

How Large is the MSP Market and How Many MSPs Are There? - ChannelE2E: "fewer than 20,000 truly successful (i.e., very healthy and very profitable) small business MSPs in the North American market." (Date?)

2019 Cyber Risk Report | Aon.com

2019 Cyber Risk Report | Aon.com: "Aon’s 2019 Cyber Security Risk Report features eight risks that may impact organizations in the next 12 months, no matter where they are on their digital journey."

Amount and Duration of Unemployment Compensation in California | Nolo.com

"up to a maximum of $450 per week. Benefits are available for up to 26 weeks" = $1,800 for 6 months. So 50% of a $43K salary.

SK = 50% of actual pay for 6 months.

https://www.nolo.com/legal-encyclopedia/collecting-unemployment-benefits-california-32504-2.html

Frequently asked questions: Working in Slovakia - spectator.sme.sk

"- 2 to 5 years notice period is two months and severance pay is one month's salary
- 5 to 10 years, notice period is three months and severance two salaries
- 10 to 20 years, notice period is three months and severance three salaries"

RSA Quarterly Fraud Report: Q4 2018

Tuesday, February 12, 2019

2019 Cyber Symposium Call for Papers – Third Way

2019 Cyber Symposium Call for Papers – Third Way: To propose a topic, please submit a proposal to lawJNSLP@georgetown.edu no later than February 28, 2019.

Google Spots Attacks Exploiting iOS Zero-Day Flaws | SecurityWeek.Com

Google Spots Attacks Exploiting iOS Zero-Day Flaws | SecurityWeek.Com: "two of the vulnerabilities patched by Apple on Thursday with the release of iOS 12.1.4 were zero-day flaws exploited in the wild by malicious actors"

Monday, February 11, 2019

Docker Cryptojacking | Threat Stack

Docker Cryptojacking | Threat Stack: "recently observed Docker exploit attempts from the field, where attackers were looking for web applications vulnerable to command injection"

Black Mirror, Light Mirror: Teaching Technology Ethics Through Speculation

Black Mirror, Light Mirror: Teaching Technology Ethics Through Speculation: "This is not a new idea, and I’m certainly not the only one to do a lot of thinking about it (e.g., see “How to Teach Computer Ethics Through Science Fiction”), but I wanted to share two specific exercises that I use and that I think are easily adaptable." Casey Fiesler

Sunday, February 10, 2019

File:World Map Blank - with blue sea.svg - Wikipedia

File:World Map Blank - with blue sea.svg - Wikipedia: the copyright holder of this work, releases this work into the public domain. This applies worldwide.

50 countries vow to fight cybercrime - US and Russia don't

50 countries vow to fight cybercrime - US and Russia don't: 'Fifty nations and over 150 tech companies pledged Monday to do more to fight criminal activity on the internet, including interference in elections and hate speech. But the United States, Russia and China are not among them."

US Residents - Tanager Wealth

US Residents - Tanager Wealth: There are an estimate one million British nationals living in the USA today and many spend their time between both countries as work or personal lives dictate.

Avoiding A World War Web: The Paris Call for Trust and Security in Cyberspace - Lawfare

Avoiding A World War Web: The Paris Call for Trust and Security in Cyberspace - Lawfare: On November 12th 2018 at the Internet Governance Forum, Macron unveiled France’s first international initiative to that end, the “Paris Call for Trust and Security in Cyberspace.”

Macron and tech giants launch 'Paris call' to fix internet ills | Reuters

Macron and tech giants launch 'Paris call' to fix internet ills | Reuters: "With the launch of a declaration entitled the ‘Paris call for trust and security in cyberspace’, French President Emmanuel Macron is hoping to revive efforts to regulate cyberspace after the last round of United Nations negotiations failed in 2017."

Building management systems still ripe for hacking

Protecting Your Building: Cybersecurity in Building Automation - kW Engineering

Saturday, February 9, 2019

Derby Con stuff

F1 2019

Mar 17AustraliaMelbourne
Mar 31BahrainSakhir
Apr 14ChinaShanghai
Apr 28AzerbaijanBaku
May 12SpainBarcelona
May 26MonacoMonaco
Jun 9CanadaMontreal
Jun 23FranceLe Castellet
Jun 30AustriaSpielberg
Jul 14Great BritainSilverstone
Jul 28GermanyHockenheim
Aug 4HungaryBudapest
Sep 1BelgiumSpa
Sep 8ItalyMonza
Sep 22SingaporeSingapore
Sep 29RussiaSochi
Oct 13JapanSuzuka
Oct 27MexicoMexico City
Nov 3USAAustin
Nov 17BrazilSao Paulo
Dec 1Abu DhabiYas Island

The Geopolitics Of Artificial Intelligence

The Geopolitics Of Artificial Intelligence: "For example the risks posed by the convergence of artificial intelligence with nuclear weapons (or any other war weapon) technology is a stark reminder of the already complex geopolitical scene getting worse due to the potential disruption in already delicate alliances."

Coinminer Targets Linux, Kills Competition to Maximize Profits

The Genesis of the British Hosiery Industry 1600–1750: Textile History: Vol 3, No 1

In Search of William Lee: Textile History: Vol 6, No 1

Friday, February 8, 2019

A New In-Depth Analysis of Anthem Breach - BankInfoSecurity

A New In-Depth Analysis of Anthem Breach - BankInfoSecurity: "Opening the email launched the download of malicious files to the user's computer and allowed hackers to gain remote access to that computer and dozens of other systems within the Anthem enterprise, ... .

Starting with the initial remote access, the attacker was able to move laterally across Anthem systems and escalate privileges, gaining increasingly greater ability to access information and make changes in Anthem's environment, the investigative report says."

Tweet from @mikercarpenter

Forward defense in cyberspace is essential. I'd like Cyber Command to go even further. Rather than just put operatives on notice, let's quietly add them to a cyber watchlist and pick them up whenever they try to travel outside the country. https://t.co/H9n1lAPMZK

http://twitter.com/mikercarpenter/status/1093903812694175744

Sent from Echofon - http://www.echofon.com/


From My iPhone

Thursday, February 7, 2019

Jackware 62%

62% of the automotive pros surveyed for the report say a malicious attack against automotive tech is likely in the next year...according to a report out Wednesday from the tech firm Synopsys and SAE International, an engineering trade group. 

5G can’t fix America’s broadband problems - The Verge

Biographical Dictionary of the History of Technology - Google Books

cultural cognition project - Cultural Cognition Papers by Date - Misconceptions, Misinformation, and the Logic of Identity-Protective Cognition

Oxford man arrested over £8.7m cryptocurrency theft - BBC News

Hacked Customer Data From World Leading Cryptocurrency Exchanges For Sale On The Dark Web?

Privacy Cryptocurrency Beam Experiences Blockchain Stoppage - CoinDesk

Prosecutors: Two men used SIM swapping to extort cryptocurrency | Ars Technica

Two Hacker Groups Pilfered $1 Billion Worth of Cryptocurrency

San Jose: Cryptocurrency thief pleads guilty to bitcoin hacking scheme

Just two hacker groups are behind 60% of stolen cryptocurrency – Naked Security

Chinese headmaster fired over secret coin mining at school - BBC News

New Monero Cryptojacking Malware 'Shellbot' Trojan Targets Linux Users Discovered by JASK

Cryptojacking Overtakes Ransomware, Malware-as-a-Service on the Rise

Cisco joins Apple in calling for a US version of GDPR data protection and privacy laws | BetaNews