background preloader

World's Biggest Data Breaches & Hacks

World's Biggest Data Breaches & Hacks
Let us know if we missed any big data breaches. » 70% of passwords are in this chart. Is yours? » Safely check if your details have been compromised in any recent data breaches: » See the data: This interactive ‘Balloon Race’ code is powered by our forthcoming VizSweet software – a set of high-end dataviz tools for generating interactive visualisations. You might also like:

Related:  Useful information

Quantum mechanics 101: Demystifying tough physics in 4 easy lessons Ready to level up your working knowledge of quantum mechanics? Check out these four TED-Ed Lessons written by Chad Orzel, Associate Professor in the Department of Physics and Astronomy at Union College and author of How to Teach Quantum Physics to Your Dog. 1. Particles and waves: The central mystery of quantum mechanics One of the most amazing facts in physics is that everything in the universe, from light to electrons to atoms, behaves like both a particle and a wave at the same time. Fight Productivity Paralysis With the 2-Minute Rule Superhero designed by Moriah Rich from the Noun Project Being in the zone means that you’ve become so absorbed in the activity at hand that it’s impossible to concentrate on anything else. It’s when code seems to flow from your fingertips, when words seem to fly out of your pen, and when your stylus seems to take on a life of its own. But a common misconception about the zone is that it’s some some elusive, magical place. It is not.

wifi - Tracking down a rogue access point Read this too! The Wifi Pineapple is just one device a person can use in these situations. I'm not sure what kinds of reports you have but, if the person is using a portable Rouge-AP they are most likely mobile(walking, biking) or, static but, within proximity of your AP's(drinking coffee, or on a laptop or, even a smartphone)... It gets really dangerous because when dealing with portable rouge-AP's like the wifi pineapple it becomes apparent that the person your interested in is in fact, amongst your company...An insider. So, you combat a mobile threat like this YOU need to get mobile. Already people have suggested downloading apps for mobile smartphone w/ wifi to scan for rouge-AP SSID's. Visual Business Intelligence We typically think of quantitative scales as linear, with equal quantities from one labeled value to the next. For example, a quantitative scale ranging from 0 to 1000 might be subdivided into equal intervals of 100 each. Linear scales seem natural to us.

Resilience Metrics ENISA is working on the measurement frameworks and metrics for resilient networks and services. This belongs is under the broader umbrella of the of network resilience. In this area of activities ENISA launched in 2010 a study on Measurement Frameworks and Metrics for Resilient Networks and Services. A Melting Arctic And Weird Weather: The Plot Thickens Everyone loves to talk about the weather, and this winter Mother Nature has served up a feast to chew on. Few parts of the US have been spared her wrath. Severe drought and abnormally warm conditions continue in the west, with the first-ever rain-free January in San Francisco; bitter cold hangs tough over the upper Midwest and Northeast; and New England is being buried by a seemingly endless string of snowy nor’easters. Yes, droughts, cold and snowstorms have happened before, but the persistence of this pattern over North America is starting to raise eyebrows. Is climate change at work here?

Blog >> We Should All Have Something To Hide The programs of the past can be characterized as “proximate” surveillance, in which the government attempted to use technology to directly monitor communication themselves. The programs of this decade mark the transition to “oblique” surveillance, in which the government more often just goes to the places where information has been accumulating on its own, such as email providers, search engines, social networks, and telecoms. Both then and now, privacy advocates have typically come into conflict with a persistent tension, in which many individuals don’t understand why they should be concerned about surveillance if they have nothing to hide. It’s even less clear in the world of “oblique” surveillance, given that apologists will always frame our use of information-gathering services like a mobile phone plan or GMail as a choice. We’re All One Big Criminal Conspiracy

Rap News 28: The Singularity Today we travel into the pure world of sci-fi to investigate the much vaunted, mysterious potential future event known as 'The Singularity'. What will a machine consciousness mean for humanity? What are the ethical, political, military and philosophical implications of strong A.I.? And what would an AI sound like when spitting rhymes over a dope beat? Violence as a Source of Trust in Mafia-type Organizations Criminals have great difficulty in trusting each other – they often have conflicting interests (and may sometimes have incentives to inform on each other) but have no very good equivalent of the state to enforce contracts. One traditional solution is to rely on family members, who are presumably more trustworthy. But there are others – scholars such as Thomas Schelling and Diego Gambetta have speculated that shared information about violent acts might help to cement cooperation. If I know that you have committed a violent act, and you know that I have committed a violent act, we each have information on each other that we might threaten to use if relations go sour (Schelling notes that one of the most valuable rights in business relations is the right to be sued – this is a functional equivalent). Kinship does indeed have a statistically significant effect in the Camorra clan: the frequency of contacts between two associates increases when both are near-relatives of the boss.

sans titre Ready to level up your working knowledge of math? Here’s what to read now — and next. Math 101, with Jennifer Ouellette First, start with these 5 books… 1. Number: The Language of Science Tobias Dantzig Plume, 2007 4 Alternatives That May Be Better Than Pastebin On the Internet, we go through a lot of phases. That’s especially true for web services. I remember years ago when image hosts like TinyPic and Imageshack were all the rage. New and free image hosts were popping up everywhere, and as the smoke finally cleared, it was Imgur that came out on top. How does the thyroid manage your metabolism? - Emma Bryce For such a tiny organ that looks a lot like a butterfly, the thyroid gets a lot of attention. But it makes sense when you consider just how vital its task is: this gland helps to control the body's metabolism. If you're stuck trying to grasp why that's important and what exactly metabolism is, check out this helpful video, and read more about the thyroid's role here and here. The tools your thyroid uses to get the job done are triiodothyronine (T3) (that's a tricky word: learn how to say it!) and thyroxine (T4), the two hormones that act as messengers to all your body's cells.

Overview - bletchley - A collection of practical application cryptanalysis tools Here you will find a brief overview of the tools and libraries provided by Bletchley. For further details, see the individual tool usage statements, pydoc documentation, and of course the source code. Contents Beautiful Mathematical GIFs Will Mesmerize You Digital artist and physics PhD student Dave Whyte is dazzling our computer screens with his mesmerizing GIFs that are the perfect marriage of mathematics and art. And we can’t stop watching them. Whyte shares his brilliant, procrastination-fueling creations on an almost daily basis on his Tumblr account, Bees & Bombs. Whyte studies the physics of foam and told Colossal that his first geometric GIFs riffed on computational modules that he was exploring as an undergraduate student.