http://www.cnn.com/2017/08/10/health/neurotics-live-longer-partner/index.html Security groups and staff have an obligation to seek out and explore worst case scenarios, if only to avoid “why didn’t you think of that?”. Other studies show people who think badly of others live more miserable and shorter lives: but I have never succeeded in getting an upgrade in pay for hazardous work […]
https://www.cnbc.com/2017/08/11/three-square-market-ceo-explains-its-employee-microchip-implant.html Children being chipped is mentioned in passing rather casually. The company says future uses of the microchip implant could include holding your passport and travel information, medical history, and GPS to safeguard children. What could go wrong?
http://thehill.com/policy/cybersecurity/346544-dreamhost-claims-doj-requesting-info-on-visitors-to-anti-trump-website Of course if you have nothing to hide, and are proud of it, everything is as it should be. But a more cynical person might wonder, why is it so important for the Justice Department to identify exactly who is “against” a particular person or idea? TOR can anonymize your IP address — the […]
https://www.cisecurity.org/webinar/sex-lies-and-mobile-devices-the-seedy-underworld-of-mobile-insecurity/https://www.cisecurity.org/webinar/sex-lies-and-mobile-devices-the-seedy-underworld-of-mobile-insecurity/ Register now ——————from the CIS (center for internet security) page:—- Sex, Lies and Mobile Devices: The Seedy Underworld of Mobile [In]security Thursday, August 17, 2017 | 3:00 pm EST The smartphone in your pocket has transformed, quite literally, every facet of your life. From commerce and communications to entertainment and awareness, mobile devices have become […]
Do you use the Amazon Echo provided by your hotel in your room? https://www.bitdefender.com/box/blog/smart-home/hackers-install-malware-amazon-echo-secretly-wiretap The hack described here requires the attacker have physical access to the target Echo. So the one in your house might not be so much at risk (assuming you have reasonably good physical security for your house and your kids’ friends […]
Good information hygiene: keep your stuff updated – operating system, applications, etc, including browsers – if you’re not sure how to do it, google is your friend, look for information from the source: for windows, find the recommendation on microsoft-dot-com, NOT your-friendly-hacker.com or free-helpdesk-here.com (unless you have an idea they are legit). https://blog.torproject.org/blog/tor-03010-released Update 7.0.4 […]
http://www.bbc.com/news/technology-40810771#ampshare=http://www.bbc.com/news/technology-40810771 Yes even though TOR is often mentioned in context of criminal activity, there are indeed legitimate uses by private citizens seeking protection from oppressive regimes – whether you think you live in an oppressive regime perhaps depends on your personal viewpoint. This is from the TOR project, and describes a wide range of appropriate […]