background preloader

Security Now! Episode Archive

Security Now! Episode Archive

OpenClassroom Full courses. Short Videos. Free for everyone. Learn the fundamentals of human-computer interaction and design thinking, with an emphasis on mobile web applications. A practical introduction to Unix and command line utilities with a focus on Linux. Introduction to fundamental techniques for designing and analyzing algorithms, including asymptotic analysis; divide-and-conquer algorithms and recurrences; greedy algorithms; data structures; dynamic programming; graph algorithms; and randomized algorithms. Database design and the use of database management systems (DBMS) for applications. Machine learning algorithms that learn feature representations from unlabeled data, including sparse coding, autoencoders, RBMs, DBNs. Introduction to discrete probability, including probability mass functions, and standard distributions such as the Bernoulli, Binomial, Poisson distributions. Introduction to applied machine learning. This is a course created to test the website.

ShieldsUP! — Internet Vulnerability Profiling Your Internet connection's IP address is uniquely associated with the following "machine name": The string of text above is known as your Internet connection's "reverse DNS." The end of the string is probably a domain name related to your ISP. This will be common to all customers of this ISP. But the beginning of the string uniquely identifies your Internet connection. The concern is that any web site can easily retrieve this unique "machine name" (just as we have) whenever you visit. If the machine name shown above is only a version of the IP address, then there is less cause for concern because the name will change as, when, and if your Internet IP changes. There is no standard governing the format of these machine names, so this is not something we can automatically determine for you. Just something to keep in mind as you wander the Internet.

Krebs on Security Khan Academy Shields UP! -- Officially Unofficial ShieldsUP! FAQ _______________________________________________________________ ShieldsUp! Newsgroup Frequently Asked Questions Written and Compiled by Chris Baker Version 1.14 - 16 April 2000 Please note: If you wish to contact me with errors, omissions, or suggestions regarding this FAQ, feel free to e-mail me at faq-admin@home.com, and I will try to get back to you within 72 hours. However, if you have general questions or technical support issues regarding ShieldsUp!, or anything else for that matter, I regret that I have neither the time nor the resources to assist you directly. Please contact ShieldsUp! , or better yet, post your question in one of the ShieldsUp! Table of Contents Introduction This FAQ came into being on 29 February 2000, primarily because I got tired of answering the same few questions over and over again. Right now, it basically represents a compilation of what I know about internet security, with the excellent comments of several others thrown in. Q. Q. Q. Q. Q. Q. Q. Q. Q. Q.

Drone hijacked by hackers from Texas college with $1,000 spoofer Researchers at the University of Texas at Austin hacked and hijacked a drone in front of the dismayed Department of Homeland Security officials who had dared them $1,000 to do it. According to exclusive coverage of the event from Fox News, the researchers flew the small surveillance drone over the Austin stadium last Monday. The drone followed a series of GPS waypoints programmed into its flight computer in what initially looked like a routine flight. At one point, the drone veered off course from its intended flight path. It banked hard to the right, "streaking" toward the south, before it turned to hurtle at the ground in what looked like imminent drone suicide, according to Fox's description. A safety pilot radioed the drone - which was owned by the university, according to Reuters - and forced it to pull up just a few feet before it would have crashed into the field. The researchers managed to hack the drone with a spoofer they put together with about $1,000 worth of parts.

Free Online Course Materials | Courses Spear Phishing’s New Trend Targeting Whole Websites Websense the security company says that personalized spear-phishing assaults not only target single persons but whole Internet sites, which behave like "watering holes" when cyber-criminal syndicates want so while focusing on any particular theme. According to Security Research Manager Chris Astacio of Websense, spear-phishing typically refers to targeted assaults through malware-laced e-mails with the purpose of compromising an individual's PC for theft alternatively spying on vital information of the victim. However, recently it's been found that spear-phishing associates with aiming attack on whole websites so all people accessing those sites can be cracked and their PCs compromised, explains Astacio. PCAdvisor published this dated October 9, 2012. Astacio further explains that during "watering-hole" assaults, cyber-criminals look for hijacking a website for determining the nature of its visitors followed with installing malicious content on it for attacking those visitors.

Background: Atoms and Light Energy Inside the Atom Just like bricks are the building blocks of a home, atoms are the building blocks of matter. Matter is anything that has mass and takes up space (volume). All matter is made up of atoms. Light Energy Each orbital has a specific energy associated with it. The illustrations on this page are simplified versions of real atoms, of course. Identifying Individual Types of Atoms Transitions among the various orbitals are unique for each element because the energy levels are uniquely determined by the protons and neutrons in the nucleus. We can use tools like the periodic table of elements to figure out exactly how many protons, and thus electrons, an atom has. Different forms of the same chemical element that differ only by the number of neutrons in their nucleus are called isotopes. Here's another example - carbon usually occurs in the form of C-12 (carbon-12) , that is, 6 protons and 6 neutrons, though one isotope is C-13, with 6 protons and 7 neutrons. Reference URLs:

Internet Security Level - Current Threat Activity Current Threat Activity Share Share on facebook Share on twitter Share on google_plusone_share More Sharing Services Latest Trend Micro Blog Posts Security On Azure From the Simply Security Blog 24 Apr, 2014 Getting Up to Speed on Azure From the Simply Security Blog 22 Apr, 2014 Latest Security Advisories Malware: JS_SHESDE.E From the Threat Encyclopedia 22 Apr, 2014 Spam: Capsized South Korean Ferry Used in Spam From the Threat Encyclopedia 19 Apr, 2014 Vulnerabilities: OpenSSL Heartbleed Vulnerability (CVE-2014-0160) From the Threat Encyclopedia 10 Apr, 2014 Malicious URLs: From the Threat Encyclopedia 16 Oct, 2013 How to Protect Your Privacy on Social Media Oversharing online might do damage to your reputation. Integrated Defense Against Cross-Platform Threats With multiple devices in the workplace, maintaining IT control and protecting corporate data become more complex. The Malicious Top Ten Global Botnet Activity From the TrendLabs Mobile Malware Blog 15 Apr, 2014 ↑ Top of page

Related: