Boston Marathon Aid: How You Can Help, And Scams To Avoid: "Of course, the scam artists know this and have already set up phony donation links to trick good-hearted people out of their hard-earned dollars."
'via Blog this'
Just a basic blog—snagging random stuff that catches our eye—nothing else, really...
Monday, April 15, 2013
Saturday, April 13, 2013
Decoding Biology of Blood Disorders Leads to New Therapies
Decoding Biology of Blood Disorders Leads to New Therapies:
"Iron control is regulated, first and foremost, by hepcidin or Hamp"
'via Blog this'
"Iron control is regulated, first and foremost, by hepcidin or Hamp"
'via Blog this'
Friday, April 12, 2013
To Tibet, with Love | The Official Lookout Blog
To Tibet, with Love | The Official Lookout Blog: On March 25th 2013, the email account of a Tibetan activist was hacked and used to spearphish all the contacts in his address book.
Bing Delivers Five Times as Many Malicious Websites as Google
Bing Delivers Five Times as Many Malicious Websites as Google: Searches on Bing returned five times more links to malicious websites than Google searches, according to an 18-month study from German independent testing lab AV-Test.
Monday, April 8, 2013
Ira Winkler on why cybersecurity degrees are worthless
Ira Winkler on why cybersecurity degrees are worthless: But does a college degree have the same value as a certification? According to security expert Ira Winkler, it does not.
Sunday, April 7, 2013
How to Move Your Blog from WordPress to Blogger
How to Move Your Blog from WordPress to Blogger: Moving a blog from WordPress to Blogger is actually fairly simple as long as you've got administrative access to your WordPress blog.
Saturday, April 6, 2013
CSIS: 20 Critical Security Controls
CSIS: 20 Critical Security Controls: The Twenty Critical Security Controls have already begun to transform security
Wednesday, April 3, 2013
Forensics Analysis of Mandiant’s APT1 Report | Malware Analysis
Forensics Analysis of Mandiant’s APT1 Report | Malware Analysis: I don’t find sufficient evidence from the APT1 Report to proof the hypothsis-2 that:
APT1 is Unit 61398.
APT1 is Unit 61398.
Tuesday, April 2, 2013
CSIS: 20 Critical Security Controls
CSIS: 20 Critical Security Controls: The Twenty Critical Security Controls have already begun to transform security in government agencies and other large enterprises by focusing their spending on the key controls that block known attacks and find the ones that get through.
Voluntary National Insurance contributions - GOV.UK
Voluntary National Insurance contributions - GOV.UK: The table explains who is eligible to pay voluntary National Insurance contributions and which class to pay
Tuesday, March 26, 2013
Speedtest.net - The Global Broadband Speed Test
Speedtest.net - The Global Broadband Speed Test: Are you getting the speed you pay for? Our Promise Index™ and Speedtest.net help keep your ISP honest!
Tuesday, March 19, 2013
Hotel Casa Natalia - Location - Welcome - San Jose del Cabo, Mexico
Hotel Casa Natalia - Location - Welcome - San Jose del Cabo, Mexico: Chic and unpretentious, Casa Natalia embraces the most charming aspects of Mexican culture
Monday, March 18, 2013
What do Win32/Redyms and TDL4 have in common?
What do Win32/Redyms and TDL4 have in common?: Deeper analysis shows blog.eset.com
Sunday, March 17, 2013
Social Media, Common Sense, and the Law
Social Media, Common Sense, and the Law: And then, down the road, you discover that this person you’ve been having work-related conversations with is not really your customer but someone who has stolen your client’s identity
Nerd Chick Adventures: Be on lookout for these social media scams � Redding Record Searchlight
Nerd Chick Adventures: Be on lookout for these social media scams � Redding Record Searchlight: Don’t fall victim. Here’s how to identify and avoid the most common social media ploys.
Internet, social media least trusted industries for privacy | Security & Privacy - CNET News
Internet, social media least trusted industries for privacy | Security & Privacy - CNET News: Internet and social media ranked at the bottom on a list of the most trusted industries for privacy, according to the Ponemon Institute.
Twitter Hacks Force Companies to Confront Security on Social Media - NYTimes.com
Twitter Hacks Force Companies to Confront Security on Social Media - NYTimes.com: What happened to Burger King — and, a day later, to Jeep — is every brand manager’s nightmare.
What you 'Like' in Facebook can come back to haunt you - CSO Online - Security and Risk
What you 'Like' in Facebook can come back to haunt you - CSO Online - Security and Risk: "Commercial companies, governmental institutions, or even one's Facebook friends could use software to infer attributes such as intelligence, sexual orientation
Thursday, March 14, 2013
Sicherheitstacho.eu Attack Map
Sicherheitstacho.eu: Overview of current cyber attacks (logged by 97 Sensors )
Wednesday, March 13, 2013
HolisticInfoSec: toolsmith: Redline, APT1, and you – we’re all owned
We are in an exciting time for computer security, and I look forward to seeing Redline help new users dive headfirst into computer security awareness.
From My iPhone
Intelligence Official Warns Congress That Cyberattacks Pose Threat to U.S. - NYTimes.com
a cyberattack could cripple America's infrastructure and economy and suggested that such attacks pose the most dangerous immediate threat to the United States,
From My iPhone
Tuesday, March 12, 2013
Scammers’ new target: your cell phone - Jennifer Waters's Consumer Confidential - MarketWatch
Scammers’ new target: your cell phone - Jennifer Waters's Consumer Confidential - MarketWatch: If you’ve got a mobile phone that receives text messages, chances are you’ve been hit with the latest scam from the bad guys: smishing
RSA 2013: Security wonks debate whether China will get the message to stop hacking - SC Magazine
RSA 2013: Security wonks debate whether China will get the message to stop hacking - SC Magazine: The jury is out on whether China will scale down its cyber espionage activity after the country was called out in a well-publicized report on a military hacking unit
HP Launches Big Data Security Products, Threat Research - Security -
HP Launches Big Data Security Products, Threat Research - Security -: HP this week released new big data tools designed to provide businesses with better information security intelligence gathering capabilities, and launched a new information security research group that's been tasked with providing better threat intelligence for HP's own security products.
Changes to cookies on our website - ICO
Changes to cookies on our website - ICO: The aim is to help us collect reliable information to make our website better, while remaining compliant with the rules on cookies and our own guidance.
Changes to cookies on our website - ICO
Changes to cookies on our website - ICO: The aim is to help us collect reliable information to make our website better, while remaining compliant with the rules on cookies and our own guidance.
Thursday, March 7, 2013
Wealth Inequality in America
I thought graphic illustration of the distribution of wealth in America quite shocking. It makes me think of Czarist Russia, before the revolution. Is that where we are heading?
When the middle class are hardly better off than the poor, and the richest people are 300 times better off than the middle class, it becomes blatantly obvious that this situation cannot last. My only questions are:
1) How long will this situation last?
and
2) What is going to be the "last straw" that brings on the revolution?
How Safe Is Your Phone From Hackers | NBC 7 San Diego
How Safe Is Your Phone From Hackers | NBC 7 San Diego:
Phones with popular operating systems may be more susceptible to hackers.
Phones with popular operating systems may be more susceptible to hackers.
Thursday, February 21, 2013
Global Online Enrollment System (GOES)-Official U.S. Government Web Site to apply for Global Entry, FLUX, NEXUS, SENTRI, FAST
Global Online Enrollment System (GOES)-Official U.S. Government Web Site to apply for Global Entry, FLUX, NEXUS, SENTRI, FAST: The Global Online Enrollment System allows registered users to enter their own applications for U.S. Customs and Border Protection (CBP) Trusted Traveler Programs, and approved members to edit their information as needed (mistakes on the original application cannot be corrected once the application is certified - your mistakes will need to be brought to the attention of CBP during your interview).
Sunday, February 17, 2013
Security startup Nok Nok Labs wants to rid the world of passwords — Tech News and Analysis
Security experts say it's not about getting to a level of perfect security, an impossibility. The realistic goal is to minimize risk as much as possible. People find it hard to remember and multiple passwords and user names so they get sloppy — they share and duplicate passwords — and that leads to risk. Nok Nok's tools could be one way to alleviate it.
http://gigaom.com/2013/02/11/security-startup-nok-nok-labs-wants-to-rid-the-world-of-passwords/
From My iPhone
http://gigaom.com/2013/02/11/security-startup-nok-nok-labs-wants-to-rid-the-world-of-passwords/
From My iPhone
Point-of-Sale malware attacks – crooks expand their reach, no business too small | Naked Security
http://nakedsecurity.sophos.com/2013/02/16/point-of-sale-malware-attacks-no-business-too-small/
As before, the criminals are avoiding very large businesses but in addition to the commonly attacked hospitality industry and hotel targets there are smaller victims, including a single car dealership in Australia.
Saturday, February 16, 2013
Tuesday, February 12, 2013
Trash status � WordPress Codex
Trash status � WordPress Codex: By default, posts, pages or comments in the trash will be permanently deleted after 30 days.
Monday, February 11, 2013
12 Professional CSS Buttons | Graeme Boy's Personal Website
12 Professional CSS Buttons | Graeme Boy's Personal Website:
This guy slaved away for a few hours and created nice buttons that work purely using CSS,and they are cross-browser compatible.
This guy slaved away for a few hours and created nice buttons that work purely using CSS,and they are cross-browser compatible.
Wednesday, February 6, 2013
Chinese Hackers Infiltrate New York Times Computers - NYTimes.com
Chinese Hackers Infiltrate New York Times Computers - NYTimes.com: For the last four months, Chinese hackers have persistently attacked The New York Times, infiltrating its computer systems and getting passwords for its reporters and other employees.
Page 2 - 10 Cool Security Features In Mac OS X Lion
Page 2 - 10 Cool Security Features In Mac OS X Lion: "Specifically, the Address Space Layout Randomization (ASLR) security feature thwarts exploits by randomizing the arrangement position of key data areas, which make it more challenging for hackers to predict target addresses and launch attacks."
'via Blog this'
'via Blog this'
Why Mac Security Matters: OS X Rootkit Hunter — Tech News and Analysis
Why Mac Security Matters: OS X Rootkit Hunter — Tech News and Analysis: "To answer the “do we really need security tools for OS X?” question in a slightly different way than you’ve seen from many technology pundits, I’d like to turn your attention to utility called rkhunter or “rootkit hunter”"
'via Blog this'
'via Blog this'
Parallels Integrates CertiVox SkyPin Multi-Factor Authentication Across Plesk, Automation
Parallels Integrates CertiVox SkyPin Multi-Factor Authentication Across Plesk, Automation: With multi-factor authentication becoming widely used online, Parallels has followed suit by adding CertiVox SkyPin Multi-Factor Authentication Service across its entire cloud services enablement portfolio.
Tuesday, February 5, 2013
Blood Bank with Big Breach Settles with the FTC - HDM Latest News Article
Blood Bank with Big Breach Settles with the FTC - HDM Latest News Article: The breach occurred when an unencrypted laptop and unencrypted hard drive were stolen from the car of an employee. Data compromised for approximately 298,000 individuals included some or all of the following: name, gender, date and time of birth, Social Security number, drivers’ license number, email address, phone number, and type of adoption.
Common WordPress Malware Infections — Smashing WordPress
Common WordPress Malware Infections — Smashing WordPress: WordPress security is serious business. Exploits of vulnerabilities in WordPress’ architecture have led to mass compromises of servers through cross-site contamination
Parallels Integrates CertiVox SkyPin Multi-Factor Authentication Across Plesk, Automation
Parallels Integrates CertiVox SkyPin Multi-Factor Authentication Across Plesk, Automation: Some web hosts, like DreamHost, support multi-factor authentication so customers can protect their accounts.
Two-factor authentication and compliance: What it is and isn't
Two-factor authentication and compliance: What it is and isn't: Let's start by explaining the standard definition of two-factor authentication and compare it with the FFIEC's view.
Gartner: What matters is risk-appropriate authentication
Gartner: What matters is risk-appropriate authentication: Are we reaching a stage where passwords need to be replaced by two- or even three-factor authentication methods and is there a future in federated identities?
Billions in Tax Refund Fraud--and How to Stop Most of it - Forbes
Billions in Tax Refund Fraud--and How to Stop Most of it - Forbes: Len Burman, Contributor
I’m a professor at Syracuse U. and focus on tax and budget policy.
I’m a professor at Syracuse U. and focus on tax and budget policy.
Saturday, February 2, 2013
Apple Infiltrates The Enterprise: 1/5 Of Global Info Workers Use Apple Products For Work! | Forrester Blogs
Apple Infiltrates The Enterprise: 1/5 Of Global Info Workers Use Apple Products For Work! | Forrester Blogs: Below are two portions of the graphics in our Apple Infiltrates The Enterprise report, released to clients today, and covered in a New York Times piece this morning
Subscribe to:
Comments (Atom)