background preloader

Security

Data loss prevention software - Wikipedia Data loss prevention software - Wikipedia Data loss prevention software detects potential data breaches/data ex-filtration transmissions and prevents them by monitoring, detecting and blocking sensitive data while in-use (endpoint actions), in-motion (network traffic), and at-rest (data storage). In data leakage incidents, sensitive data is disclosed to unauthorized parties by either malicious intent or an inadvertent mistake. Sensitive data includes private or company information, intellectual property (IP), financial or patient information, credit-card data and other information. The terms "data loss" and "data leak" are related and are often used interchangeably.[1] Data loss incidents turn into data leak incidents in cases where media containing sensitive information is lost and subsequently acquired by an unauthorized party. However, a data leak is possible without losing the data on the originating side. Categories[edit] Standard measures[edit] Advanced measures[edit] Designated solutions[edit] Types[edit] Network[edit]
isc Home | SANS Internet Storm Center; Cooperative Network Security Community - Internet Security
SANS: IT Information Security Awareness Training
Info Security

Wallet TrackR - Find Your Wallet Wallet TrackR - Find Your Wallet Purchase Wallet TrackR Today! What is a Wallet TrackR? The Wallet TrackR fits easily into any wallet - just like a credit card. When combined with the free Wallet TrackR iPhone app, it becomes a powerful new tool to keep you from losing your wallet. When the Wallet TrackR gets separated from your iPhone or iPad, the Wallet TrackR app gently alerts you that you may be leaving your wallet behind. The app also takes a GPS snapshot of where your wallet was at the moment of separation in case you didn't hear the alert. How does Wallet TrackR work? Forget-me-not reminder If you forget your wallet, the App will play your favorite song and the Wallet TrackR will beep before you get too far. Lost and Found Map The App remembers the location and time you separated from your Wallet TrackR and can show you on a map. Is your wallet hiding? If you cannot find your wallet, press the FIND button in the App to cause the wallet to beep. Device Specs Width: 4.1cm Length: 6.8cm "Handy, eh?"
Know the Trade – Your IT Security Information Portal CISSP/CEH/CISA/Hacker and Penetration Testing Specialist Google Hacking allintitle:Brains, Corp. camera allintitle:"index of/admin" allintitle:"index of/root" allintitle:restricted filetype:doc site:gov allintitle:restricted filetype :mail allintitle:sensitive filetype:doc allinurl:/bash_history allinurl:winnt/system32/ (get cmd.exe) ext:ini eudora.ini ext:pwd inurl:(service|authors|administrators |users) "# -FrontPage-" filetype:bak inurl:"htaccess|passwd|shadow|htusers" filetype:conf slapd.conf filetype:ctt "msn" filetype:mdb inurl:"account|users|admin|administrators|passwd|password" filetype:mdb inurl:users.mdb filetype:QDF QDF filetype:pdf "Host Vulnerability Summary Report" "Assessment Report" filetype:sql ("passwd values ****" | "password values ****" | "pass values ****" ) filetype:xls inurl:"email.xls" filetype:user eggdrop user intitle:"Apache::Status" (inurl:server-status | inurl:status.html | inurl:apache.html) intitle:"Welcome to IIS 4.0!" These log files record info about the SSH client PUTTY. Know the Trade – Your IT Security Information Portal CISSP/CEH/CISA/Hacker and Penetration Testing Specialist
Know the Trade – Your IT Security Information Portal | CISSP/CEH/CISA/Hacker and Penetration Testing Specialist
Android Security Bulletins | Android Open Source Project Security has always been a major focus for Android and Google Play: Android was built from day one with security in mind. Monthly device updates are an important tool to make and keep Android users safe. This page contains the available Android Security Bulletins. These security bulletins also include information users can follow to ensure their device has the latest security updates. Notifications To get notifications when a new Android bulletin is published, join the Android Security Updates group, and set your email delivery preference to receive all updates. Sources Fixes listed in the public bulletin come from various different sources: the Android Open Source Project (AOSP), the upstream Linux kernel, and system-on-chip (SOC) manufacturers. Android platform fixes are merged into AOSP 24-48 hours after the security bulletin is released and can be picked up directly from there. Bulletins Android Security Bulletins | Android Open Source Project
The Future of Food and Farming: 2030 – a graphic overview of the impact of climate change on agriculture and food security. Adaptation of our crops and farming methods will be key to a sustainable future. Source: Consultative Group on International Agricultural Research (CGIAR) Global climate change influences all aspects of our daily lives, and it will for many years to come. To assess all aspects of climate change and its impact and formulate realistic strategies to mitigate these effects, the Intergovernmental Panel on Climate Change (IPCC) was founded in 1988. Food security and food production systems The report was developed by the IPCC's three working groups. A key conclusion of the authors is that climate challenge will increase the risk of reduced crop productivity associated with heat and drought stress. To mitigate the effects, they recommend the following crop management adaptations: Planting of mangrove seedlings in Funafala, an islet of Funafuti Atoll, Tuvalu. Olesen, J. Dr. How will climate change affect food security? How will climate change affect food security?
Climate Change Climate Change How Climate Change Affects Hunger Climate change is making climate disasters, such as floods and droughts, more frequent and intense, land and water more scarce and difficult to access, and increases in agricultural productivity even harder to achieve. These impacts are increasing the risk of hunger and the breakdown of food systems. Without considerable efforts made to improve people's climate resilience, it has been estimated that the risk of hunger and malnutrition could increase by up to 20 percent by 2050. The Most Vulnerable People At Risk Climate change puts millions of people's lives at risk, and traps poor households in food insecurity and poverty. WFP: Climate Resilience Innovations Working with governments, international partners and local communities, WFP has expertise in developing and delivering large-scale climate resilience innovations. WFP's climate resilience work is closely integrated with the organisation's Disaster Risk Reduction efforts.
Rambling: Daylesford, with Artist as Family August 24, 2015 | Foraging, Permaculture | 0 Comments | Author: Kirsten Bradley A night in an eco shack followed by a tour of the Daylesford Community Garden in deep winter – the air was frosty, but the company was enough to put the fire in your belly. I’ve always been curious about Daylesford – it’s a pretty town an hour from Melbourne where mineral springs flow out of the ground (serviced by free community pumps), the bespoke eateries are many and the winter is cold. Recently, following the inaugral Deep Winter agrarian un-conference, I got to spend a night in Daylesford in the home and company of Meg, Patrick, Zephyr + Woody + Zero, otherwise known as the Artist as Family crew. Artist as Family are my dream version of myself, a bit. Lucky for all the rest of us, Artist as Family lives like they mean it, and provide a sturdy example of yes, you can. I arrived with Milkwood teacher + good mate Brendan, for a whirlwind garden tour before things got dark and rainy. Rambling: Daylesford, with Artist as Family
Computer Hacking / Security

The Essential Skills to Becoming a Master Hacker Many of my aspiring hackers have written to me asking the same thing. "What skills do I need to be a good hacker?" As the hacker is among the most skilled information technology disciplines, it requires a wide knowledge of IT technologies and techniques. This is my overview list of required skills to enter the pantheon of this elite IT profession. The Fundamental Skills These are the basics that every hacker should know before even trying to hack. 1. It probably goes without saying that to become a hacker you need some basic computer skills. Many of these basic skills can be acquired in a basic computer skills course like A+. 2. You need to understand the basics of networking, such as the following. DHCP NAT Subnetting IPv4 IPv6 Public v Private IP DNS Routers and switches VLANs OSI model MAC addressing ARP As we are often exploiting these technologies, the better you understand how they work, the more successful you will be. 3. 4. 5. 6. 7. The Essential Skills to Becoming a Master Hacker The Essential Skills to Becoming a Master Hacker
Top 10 best tutorials to start learning hacking with Kali Linux » TechWorm Kali Linux is one of the most loved distros by the hacking and security community because of its pentesting and exploit tools. It is one of the best security auditing operating systems based on the Linux kernel and the successor of the popular BackTrack. The Kali Linux has itself been upgraded to 2016.1, based on Debian GNU/Linux 8 “Jessie,” and that there’s an official Kali Linux Docker image that lets users run the distro on any platform. However, what good is a tool or an exploit for a wannabe hacker or security researcher, if you don’t know how to use it! Top 5 Best Websites To Learn Linux Online This is the reason that in this article we look at the top 10 best resources for hackers and security researchers to learn hacking with Kali Linux. 1. We start off this YouTube video tutorial which teaches you how to install basic Linux and Kali Linux on your computer. 2. The Kali Linux blog itself is a great resource for you to learn to use various tools and exploits. 3. 4. 5. 6. 8. 9. 10. Top 10 best tutorials to start learning hacking with Kali Linux » TechWorm
Social Security

Behold the GOP’s Not-So-Secret Plan to Dismantle Government Services: Defund, Degrade and then Privatize Behold the GOP’s Not-So-Secret Plan to Dismantle Government Services: Defund, Degrade and then Privatize Photo Credit: Wikimedia Commons One side effect of the three-ring circus this presidential campaign has become is the distraction it provides so that other damaging agendas can be advanced with little or no attention. Take for example, the Republican Party’s long-standing efforts to dismantle America’s internationally modest, but still crucially important welfare state, which helps keep tens of millions of Americans out of poverty. The need for Social Security staff services has increased as baby boomers begin to retire. These congressional cuts would even force workers to take a two-week furlough. Not only does Social Security lift tens of millions of retirees out of poverty, but in 2014 3.2 million American kids directly received Social Security benefits, mostly in the form of survivor benefits. Those attacks are already well under way, thanks to the austerity measures imposed since the Tea Party first arrived in Washington with the GOP congressional wave of 2010.
The New Deal monument in Washington, DC. (Photo: Josh) Social Security is one of the most important and popular government programs of all time. Not only has it been crucial as a foundation for US retirees and as the most effective anti-poverty program ever -- it also has been indispensable as "the policy cornerstone of a decades-old philosophy which deploys the 'visible hand' of government to foster a fair economy for all," according to author Steven Hill in his new book, Expand Social Security Now: How to Ensure Americans Get the Retirement They Deserve. Social Security, which dates back to President Franklin Roosevelt's New Deal in the 1930s, has been beneficial not only for individual retirees, but also for US businesses and the broader macroeconomy. It acts as an "automatic stabilizer," says Hill, keeping money in people's pockets, which maintains levels of consumer spending during economic downturns. How about for the presidential election? No, they actually didn't. Defending a Sacred Trust: The High Stakes for the Future of US Social Security
Social Security’s Disability Insurance (SSDI) program has existed for nearly 60 years. Over that time, it has morphed from a relatively small-scale, anti-poverty program into a massive system that provides benefits to one out of every 20 working-age individuals. Despite its size and expense, the program fails to keep millions out of poverty. Rather than maintaining the current benefit structure, which provides higher benefits to individuals with higher pre-disability earnings, SSDI could better protect the disabled from poverty and improve the program’s long-run finances through a flat benefit linked to the federal poverty level. SSDI Is Broken According to the 2015 Social Security Trustees Report,[1] the SSDI Trust Fund will be exhausted at the end of 2016, and incoming tax revenues will cover only 81 percent of benefits. The short answer to why the SSDI program is broken is that too many people enter the program and too few leave it. Flat Benefit: Offering Superior Poverty Protection Improving Social Security Disability Insurance with a Flat Benefit | The Heritage Foundation
online security

Tech Support Scams: a Beginner's Guide Posted by David Harley on November 26, 2015. Introduction I’ve spent a lot of time over the last few years writing and talking about tech support scams. Basic scam gambits Often, the scammer claims that the victim’s PC has been hacked, or is infected or affected by viruses or other forms of malware. The classic cold-calling scam works something like this: you get a telephone call from someone telling you that he is from or working with Microsoft, and that your Windows PC has been reported as being compromised in some way. The CLSID scam gambit A longstanding favourite is the CLSID gambit, when he tells you that this string of characters is unique to your system: ZFSendToTarget=CLSID{888DCA60-FC0A-11CF-8F0F-00C04FD7D062} In fact the ASSOC command will show this very same string on just about any Windows machine. The Event Viewer gambit Another gambit is to ‘prove’ that your PC is ‘infected’ by misrepresenting the results of running standard utilities such as Event Viewer. The New Wave Conclusion
Solar energy firm receives record fine for automated nuisance calls | UK news A green energy company which plagued consumers with millions of nuisance phone calls offering ‘free’ solar panels has received a record fine from a Government watchdog for “deliberately and recklessly” breaching marketing regulations. Home Energy & Lifestyle Management Ltd (Helms), based in Glasgow, has been slapped with a £200,000 fine by the Information Commissioner’s Office (ICO) after pestering householders with millions of automated calls on an “industrial scale”. An ICO investigation found that Helms made over six million calls as part of a massive automated call marketing campaign offering ‘free’ solar panels. Helms – an accredited company in the failed Government Green Deal initiative to help people make energy saving improvements to their homes – admitted it didn’t even know what the rules were. In just over two months – from October to December 2014 – the ICO received 242 complaints from individuals.
The UK's biggest online pharmacy has been fined £130,000 ($200,000) for selling patients' personal data to scammers who targeted the sick and vulnerable. Pharmacy2U (P2U) was punished by the Information Commissioner's Office (ICO) for offering the names and addresses of people who purchased prescriptions and other remedies from their site through online marketing list company, Alchemy Direct Media. The pharmacy was found to have unlawfully sold the personal data of more than 21,000 NHS patients and P2U customers without informing them beforehand or getting their consent to have the data sold on. The companies which bought the data include Australian Lottery fraudsters who targeted male pensioners who were more likely to have chronic health conditions, a Jersey-based "healthcare supplement" company which was found to have conducted "misleading advertising" and "unauthorised health claims" and a UK charity which used the details to solicit donations for people with learning disabilities. UK's largest online pharmacy fined £130,000 for selling patients' personal data to scammers
Cyber Security

Security snapshot reveals massive personal data loss
Second bank cyber-attack detected by Swift after Bangladesh raid
Online rental fraud rising steeply
Sicurezza ICT: c'è ancora differenza tra Safety e Security? Il significato in 6 punti
Vademecum sulla privacy a scuola — Notizie della scuola
Android backdoor is secretly sending user data and texts to China, and no one knows why
Android 6.0 re-implements mandatory storage encryption for new devices | Ars Technica
Google relaxes Android 5.0 Lollipop's encryption requirements
Ron Deibert’s Lab Is the 'Robin Hood' of Cyber Securityat - Motherboard
Security and Privacy

How to Use SSH Tunneling to Access Restricted Servers and Browse Securely
How to Choose the Best VPN Service for Your Needs
How secure is your iPhone 5S fingerprint?
Metropolitan Police launches campaign to tackle rising iPhone theft
Verizon Spying Controversy Confuses Executive, Implies Personal Privacy Is Gone
IoT security

IoT Security - A Safer Internet of Things | GEMALTO
GSMA IoT Security Guidelines - complete document set | Connected Living
IoT Security Standards – Paving the Way For Customer Confidence | IEEE Standards University
Android Development Security Tips

Eight factors when choosing mobile application development tools
Application development security requires forethought
Types of Risks in Software Projects
Aggiornamenti di sicurezza Apple - Supporto Apple
Contact Apple About Security Issues
Fascism and the Security State

Network Security

Information Security

IT security

Security Apps

Privacy & Security

Corso IT Security