Latest - The Atlantic What Did Mike Pompeo Do? Reports that Trump asked intelligence chiefs to help shut down the investigation into Michael Flynn raise the question of whether the CIA director was asked to do the same, and how he reacted if he was. There's No Such Thing as 'Honest Loyalty' Fueling the clash between Comey and Trump was this simple fact—they inhabit incompatible moral universes. The Scandal Is What's Already Known There are many questions that James Comey may answer in his Senate testimony, but the broad outlines of Trump’s conduct are clear.
Cyber security - small firms now in the firing line Small businesses need to upgrade their awareness of - and abilities in - cyber security if they are to avoid becoming the 'soft underbelly' of the UK's fights against hackers and cyber threats. Media Reports about IT security breaches resulting in data loss and other compromises to corporate data integrity usually only make headline news when big name brands are hit. Resultant concerns about reputational damage have spurred many medium-to-large enterprises (MLEs) into reviewing their cyber-security strategies and redoubling their efforts to ensure that their ICT is properly protected - or at least as protected as possible within the context of their risk assessments and IT budgets. Because of their size a lot of the damage can over time be 'managed'. Disproportionate riches The 'Black Hat' intelligentsia are wise to the fact that start-up SMEs often have data assets of a value disproportionate to their company size on their systems.
Raymond Wang: How germs travel on planes Close Help with subtitles Desktop / laptop users: please make sure you have the most updated versions of your browser and Flash player, and that Flash is enabled when you visit TED.com. iOS users: to access subtitles, start playing the video, then tap the speech bubble icon that appears in the bottom row of video controls. Android users: although Android devices do not support subtitles, you can download the TED app from the Google Play store. IEEE Security and Privacy Magazine E-biobanking: What Have You Done to My Cell Samples? The rise in biobanking (collecting and storing human biological material) has increased the need to store large quantities of related data and make that data available to researchers and others. However, this introduces concerns regarding data security and dependability. The BiobankCloud project is developing technology to help create e-biobanking ecosystems based on a secure, dependable private-public "cloud of clouds" accessed through platform-as-a-service interfaces. Read full article » Highlights from Making Sense of Snowden, Part II: What's Significant in the NSA Revelations
CRP In the News Bloomberg Politics Published on 6/9/17 The U.S. Security Notice Update: July 10, 2015 @ 8:00 PM EST Thank you for taking the time to read our posts and follow our recommended actions after the recent events. Behind-the-scenes, our response has been ongoing. As we mentioned before, we’ve engaged security experts and firms to help us, and we’re working with the authorities to take the appropriate actions. These events have put our systems to the test, and we’re more secure as a result. Security is an ongoing back-and-forth. Undocumented iOS Features left Hidden Backdoors Open in 600 Million Apple Devices A well known iPhone hacker and forensic scientist has unearthed a range of undocumented and hidden functions in Apple iOS mobile operating system that make it possible for a hacker to completely bypass the backup encryption on iOS devices and can steal large amounts of users’ personal data without entering passwords or personal identification numbers. Data forensics expert named Jonathan Zdziarski has posted the slides (PDF) titled “Identifying Backdoors, Attack Points, and Surveillance Mechanisms in iOS Devices” showing his findings, from his talk at the Hackers On Planet Earth (HOPE X) conference held in New York on Friday. Jonathan Zdziarski, better identified as the hacker "NerveGas" in the iPhone development community, worked as dev-team member on many of the early iOS jailbreaks and is also the author of five iOS-related O'Reilly books including "Hacking and Securing iOS Applications." EVERY SET OF INFORMATION OF iOS USERS IS AT RISK
50 User Interface Design Tools A Web Designer Must Have The success of web applications and websites depends in how well designed the User Interface is. Designing a good user interface however is a very challenging process. A designer’s concepts and design decisions always affect the end users of the web site, application or generally any user interface or service he has designed. Daily Intelligencer Deadlocked SCOTUS Keeps Obama Immigration Initiative Frozen There's no telling how this saga will end. By Ed Kilgore There's no telling how this saga will end. Share Tweet Get smarter news, now. Follow Daily Intelligencer.
Introduction to Cyber Security: More free resources from The Open University Copyrighted image Copyright: © Oksipix 4 | Dreamstime.com 5 - Cyber Security Photo About the course Do you want to better understand online security and protect your digital life, whether at home or work? Perhaps you would like to be able to recognise the threats that could harm you online and the steps you can take to reduce the chances that they will happen to you? Meet KeySweeper, the $10 USB charger that steals MS keyboard strokes It sounds like the stuff of a James Bond flick or something described in documents leaked by former NSA subcontractor Edward Snowden. In fact, the highly stealthy keystroke logger can be built by someone with only slightly above-average technical skills for as little as $10. Called KeySweeper, it's a device disguised as a functioning USB wall charger that sniffs, decrypts, logs, and transmits all input typed into a Microsoft wireless keyboard. KeySweeper is the brainchild of Samy Kamkar, a hacker who has a track record of devising clever exploits that are off the beaten path. The namesake of the Samy worm that inadvertently knocked MySpace out of commission in 2005, Kamkar has concocted drones that seek out and hack other drones and devised exploits that use Google Streetview and Google Wi-Fi location data to stalk targets.
A bionic prosthetic eye that speaks the language of your brain On the grand scale of things, we know so very little about the brain. Our thick-headedness isn’t quite cosmological in scale — we really do know almost nothing about the universe beyond Earth — but, when it comes down to it, the brain is virtually a black box. We know that stimuli goes in, usually through one of our senses, and motor neurons come out, but that’s about it.
Blog — Limitless You set a goal- Losing some pounds. Finishing that long paper or finally getting that boring, administrative thing done. You set a deadline - "I AM going to finish this paper in a week." Yet somehow you don't. You do it with much energy for a couple of days and then something comes up - that party, a "short" nap or that crucial football game.