Friday, April 12, 2013

To Tibet, with Love | The Official Lookout Blog

To Tibet, with Love | The Official Lookout Blog: On March 25th 2013, the email account of a Tibetan activist was hacked and used to spearphish all the contacts in his address book.

Bing Delivers Five Times as Many Malicious Websites as Google

Bing Delivers Five Times as Many Malicious Websites as Google: Searches on Bing returned five times more links to malicious websites than Google searches, according to an 18-month study from German independent testing lab AV-Test.

Monday, April 8, 2013

Ira Winkler on why cybersecurity degrees are worthless

Ira Winkler on why cybersecurity degrees are worthless: But does a college degree have the same value as a certification? According to security expert Ira Winkler, it does not.

Sunday, April 7, 2013

How to Move Your Blog from WordPress to Blogger

How to Move Your Blog from WordPress to Blogger: Moving a blog from WordPress to Blogger is actually fairly simple as long as you've got administrative access to your WordPress blog.

Saturday, April 6, 2013

Wednesday, April 3, 2013

Tuesday, April 2, 2013

CSIS: 20 Critical Security Controls

CSIS: 20 Critical Security Controls: The Twenty Critical Security Controls have already begun to transform security in government agencies and other large enterprises by focusing their spending on the key controls that block known attacks and find the ones that get through.

Voluntary National Insurance contributions - GOV.UK

Voluntary National Insurance contributions - GOV.UK: The table explains who is eligible to pay voluntary National Insurance contributions and which class to pay

Tuesday, March 26, 2013

Speedtest.net - The Global Broadband Speed Test

Speedtest.net - The Global Broadband Speed Test: Are you getting the speed you pay for? Our Promise Index™ and Speedtest.net help keep your ISP honest!

Sunday, March 17, 2013

Social Media, Common Sense, and the Law

Social Media, Common Sense, and the Law: And then, down the road, you discover that this person you’ve been having work-related conversations with is not really your customer but someone who has stolen your client’s identity

Nerd Chick Adventures: Be on lookout for these social media scams � Redding Record Searchlight

Nerd Chick Adventures: Be on lookout for these social media scams � Redding Record Searchlight: Don’t fall victim. Here’s how to identify and avoid the most common social media ploys.

Internet, social media least trusted industries for privacy | Security & Privacy - CNET News

Internet, social media least trusted industries for privacy | Security & Privacy - CNET News: Internet and social media ranked at the bottom on a list of the most trusted industries for privacy, according to the Ponemon Institute.

Twitter Hacks Force Companies to Confront Security on Social Media - NYTimes.com

Twitter Hacks Force Companies to Confront Security on Social Media - NYTimes.com: What happened to Burger King — and, a day later, to Jeep — is every brand manager’s nightmare.

What you 'Like' in Facebook can come back to haunt you - CSO Online - Security and Risk

What you 'Like' in Facebook can come back to haunt you - CSO Online - Security and Risk: "Commercial companies, governmental institutions, or even one's Facebook friends could use software to infer attributes such as intelligence, sexual orientation

Thursday, March 14, 2013

Wednesday, March 13, 2013

HolisticInfoSec: toolsmith: Redline, APT1, and you – we’re all owned

We are in an exciting time for computer security, and I look forward to seeing Redline help new users dive headfirst into computer security awareness.


From My iPhone

Intelligence Official Warns Congress That Cyberattacks Pose Threat to U.S. - NYTimes.com

a cyberattack could cripple America's infrastructure and economy and suggested that such attacks pose the most dangerous immediate threat to the United States,

http://www.nytimes.com/2013/03/13/us/intelligence-official-warns-congress-that-cyberattacks-pose-threat-to-us.html?smid=tw-share&_r=0


From My iPhone

Tuesday, March 12, 2013

Scammers’ new target: your cell phone - Jennifer Waters's Consumer Confidential - MarketWatch

Scammers’ new target: your cell phone - Jennifer Waters's Consumer Confidential - MarketWatch: If you’ve got a mobile phone that receives text messages, chances are you’ve been hit with the latest scam from the bad guys: smishing

RSA 2013: Security wonks debate whether China will get the message to stop hacking - SC Magazine

RSA 2013: Security wonks debate whether China will get the message to stop hacking - SC Magazine: The jury is out on whether China will scale down its cyber espionage activity after the country was called out in a well-publicized report on a military hacking unit

HP Launches Big Data Security Products, Threat Research - Security -

HP Launches Big Data Security Products, Threat Research - Security -: HP this week released new big data tools designed to provide businesses with better information security intelligence gathering capabilities, and launched a new information security research group that's been tasked with providing better threat intelligence for HP's own security products.

Changes to cookies on our website - ICO

Changes to cookies on our website - ICO: The aim is to help us collect reliable information to make our website better, while remaining compliant with the rules on cookies and our own guidance.

Changes to cookies on our website - ICO

Changes to cookies on our website - ICO: The aim is to help us collect reliable information to make our website better, while remaining compliant with the rules on cookies and our own guidance.

Thursday, March 7, 2013

Wealth Inequality in America

I thought graphic illustration of the distribution of wealth in America quite shocking. It makes me think of Czarist Russia, before the revolution. Is that where we are heading?
When the middle class are hardly better off than the poor, and the richest people are 300 times better off than the middle class, it becomes blatantly obvious that this situation cannot last. My only questions are:
1) How long will this situation last?
and
2) What is going to be the "last straw" that brings on the revolution?

How Safe Is Your Phone From Hackers | NBC 7 San Diego

How Safe Is Your Phone From Hackers | NBC 7 San Diego:

Phones with popular operating systems may be more susceptible to hackers.

Thursday, February 21, 2013

Global Online Enrollment System (GOES)-Official U.S. Government Web Site to apply for Global Entry, FLUX, NEXUS, SENTRI, FAST

Global Online Enrollment System (GOES)-Official U.S. Government Web Site to apply for Global Entry, FLUX, NEXUS, SENTRI, FAST: The Global Online Enrollment System allows registered users to enter their own applications for U.S. Customs and Border Protection (CBP) Trusted Traveler Programs, and approved members to edit their information as needed (mistakes on the original application cannot be corrected once the application is certified - your mistakes will need to be brought to the attention of CBP during your interview).

Sunday, February 17, 2013

Security startup Nok Nok Labs wants to rid the world of passwords — Tech News and Analysis

Security experts say it's not about getting to a level of perfect security, an impossibility. The realistic goal is to minimize risk as much as possible. People find it hard to remember and multiple passwords and user names so they get sloppy — they share and duplicate passwords — and that leads to risk. Nok Nok's tools could be one way to alleviate it.

http://gigaom.com/2013/02/11/security-startup-nok-nok-labs-wants-to-rid-the-world-of-passwords/


From My iPhone

Point-of-Sale malware attacks – crooks expand their reach, no business too small | Naked Security

http://nakedsecurity.sophos.com/2013/02/16/point-of-sale-malware-attacks-no-business-too-small/

As before, the criminals are avoiding very large businesses but in addition to the commonly attacked hospitality industry and hotel targets there are smaller victims, including a single car dealership in Australia.

Tuesday, February 12, 2013

Trash status � WordPress Codex

Trash status � WordPress Codex: By default, posts, pages or comments in the trash will be permanently deleted after 30 days.

Monday, February 11, 2013

12 Professional CSS Buttons | Graeme Boy's Personal Website

12 Professional CSS Buttons | Graeme Boy's Personal Website:

This guy slaved away for a few hours and created nice buttons that work purely using CSS,and they are cross-browser compatible.

Wednesday, February 6, 2013

Chinese Hackers Infiltrate New York Times Computers - NYTimes.com

Chinese Hackers Infiltrate New York Times Computers - NYTimes.com: For the last four months, Chinese hackers have persistently attacked The New York Times, infiltrating its computer systems and getting passwords for its reporters and other employees.

Page 2 - 10 Cool Security Features In Mac OS X Lion

Page 2 - 10 Cool Security Features In Mac OS X Lion: "Specifically, the Address Space Layout Randomization (ASLR) security feature thwarts exploits by randomizing the arrangement position of key data areas, which make it more challenging for hackers to predict target addresses and launch attacks."

'via Blog this'

Why Mac Security Matters: OS X Rootkit Hunter — Tech News and Analysis

Why Mac Security Matters: OS X Rootkit Hunter — Tech News and Analysis: "To answer the “do we really need security tools for OS X?” question in a slightly different way than you’ve seen from many technology pundits, I’d like to turn your attention to utility called rkhunter or “rootkit hunter”"

'via Blog this'

Parallels Integrates CertiVox SkyPin Multi-Factor Authentication Across Plesk, Automation

Parallels Integrates CertiVox SkyPin Multi-Factor Authentication Across Plesk, Automation: With multi-factor authentication becoming widely used online, Parallels has followed suit by adding CertiVox SkyPin Multi-Factor Authentication Service across its entire cloud services enablement portfolio.

Tuesday, February 5, 2013

Blood Bank with Big Breach Settles with the FTC - HDM Latest News Article

Blood Bank with Big Breach Settles with the FTC - HDM Latest News Article: The breach occurred when an unencrypted laptop and unencrypted hard drive were stolen from the car of an employee. Data compromised for approximately 298,000 individuals included some or all of the following: name, gender, date and time of birth, Social Security number, drivers’ license number, email address, phone number, and type of adoption.

Common WordPress Malware Infections — Smashing WordPress

Common WordPress Malware Infections — Smashing WordPress: WordPress security is serious business. Exploits of vulnerabilities in WordPress’ architecture have led to mass compromises of servers through cross-site contamination

Parallels Integrates CertiVox SkyPin Multi-Factor Authentication Across Plesk, Automation

Parallels Integrates CertiVox SkyPin Multi-Factor Authentication Across Plesk, Automation: Some web hosts, like DreamHost, support multi-factor authentication so customers can protect their accounts.

Two-factor authentication and compliance: What it is and isn't

Two-factor authentication and compliance: What it is and isn't: Let's start by explaining the standard definition of two-factor authentication and compare it with the FFIEC's view.

Gartner: What matters is risk-appropriate authentication

Gartner: What matters is risk-appropriate authentication: Are we reaching a stage where passwords need to be replaced by two- or even three-factor authentication methods and is there a future in federated identities?

Billions in Tax Refund Fraud--and How to Stop Most of it - Forbes

Billions in Tax Refund Fraud--and How to Stop Most of it - Forbes: Len Burman, Contributor

I’m a professor at Syracuse U. and focus on tax and budget policy.

Saturday, February 2, 2013