Colton Singletary

125 Added | 17 Magazines | 32 Likes | 2 Following | 4 Followers | @ColtonSingl79os | Keep up with Colton Singletary on Flipboard, a place to see the stories, photos, and updates that matter to you. Flipboard creates a personalized magazine full of everything, from world news to life’s great moments. Download Flipboard for free and search for “Colton Singletary”

Cloudflare makes it harder for ISPs to track your web history

If you're privacy-minded, you probably aren't thrilled that governments seem hell-bent on giving internet providers free rein over your browsing data. Cloudflare just gave you a tool to fight back, however. It launched 1.1.1.1, a free Domain Name System service (the technology that translates IP …

Privacy

How To: Perform a Large-Scale Network Security Audit with OpenVAS's GSA

In my previous article, I discussed installing and configuring OpenVAS on Kali Linux. Now it's time to start using OpenVAS with the Greenbone …

Information Security

PoisonTap $5 Device Can Hack Even Password-Protected PCs

The most expensive security systems running on the most advanced devices can now be circumvented using nothing more than a $5 tool and access to a …

If you want to influence people don't try to persuade them. Use ‘pre-suasion’ instead.

Today and every day we are the targets of salespeople, marketers, advertisers, fundraisers and (heaven knows) politicians trying to persuade us to buy something, do something or think a certain way. And they're good at it. Over the years, they've learned a lot about which features to build into a …

The List of Marketing Tools You Won’t Be Able to Live Without

Marketing tools streamline and speed up your everyday job and relieve the pain of time-consuming and draining tasks by automating them. They organize …

Infographics

For $20M, These Israeli Hackers Will Spy On Any Phone On The Planet

With just a few million dollars and a phone number, you can snoop on any call or text that phone makes – no matter where you are or where the device is located.<p>That’s the bold claim of Israel’s Ability Inc, which offers its set of bleeding-edge spy tools to governments the world over. And it’s …

Surveillance

A hacker explains why US nukes controlled by ancient computers is actually a good thing

"The biggest security issue here isn't that the computer is 40 years old, but rather the quality of the lock on the door where the computer is housed," Cris Thomas, a strategist for Tenable Network Security, said in a statement.<p>Thomas, known in hacker circles by his pseudonym, Space Rogue, was one …

RemoteAccess

​Google ditches right-side desktop ads: Who's screwed?

Google tweaks its search results page and there will be some fallout. The changes are good for Google, but some marketers will feel the …

AdWords

A 19-year-old made a free robot lawyer that has appealed $3 million in parking tickets

Hiring a lawyer for a parking-ticket appeal is not only a headache, but it can also cost more than the ticket itself. Depending on the case and the lawyer, an appeal — a legal process where you argue out of paying the fine — can cost between $400 to $900.<p>But with the help of a robot made by British …

The Future

NSA Says It “Must Act Now” Against the Quantum Computing Threat - MIT Technology Review

The National Security Agency did a surprising thing last August – it suddenly declared that the algorithms it had spent a decade telling the world …

Quantum Computing

Microsoft is experimenting with underwater data centers

Is data better down where it's wetter?<p>When your laptop or your smartphone gets hot, you know it's crunching a lot of data. So you can imagine the amount of heat generated by the racks upon racks of servers that store and process the world's digital lives. Keeping these data centers cool is such a …

Moore's Law

Why You Need a Social Media Marketing Plan

More than 74 percent of adults use a social networking site. Of those, 78 percent say a company’s social media posts influenced their buying …

Detect and disconnect WiFi cameras in that AirBnB you’re staying in

Context<p>There have been a few too many stories lately of AirBnB hosts caught spying on their guests with WiFi cameras, using DropCam cameras in …

Home Security

5 Marketing Tools You Probably Aren’t Utilizing

Sure, we’re all on Facebook, Twitter, and Instagram – some of you even use <b>Google AdWords</b>. Guess what? Those are the things that <i>everyone</i> is doing! …

How to Hack Your Own Network and Beef Up Its Security with Kali Linux

Kali Linux is a security-focused operating system you can run off a CD or USB drive, anywhere. With its security toolkit you can crack Wi-Fi …

Linux

Here’s why privacy experts are concerned about Mattel’s new Hello Barbie

As an adult, most of us are painfully aware of just how often we’re tracked by marketers. Until now, children have been mostly immune from any means of invasive tracking by the things they played with.<p>This is all about to change.<p>‘Hello Barbie,’ a conversational doll from Mattel, is at or near the …

Dump Clear-Text Passwords for All Admins in the Domain Using Mimikatz DCSync – Active Directory Security

The two key goals of any attack is access and persistence. This post covers elements of each.<br>In a post-exploitation scenario where the attacker has …

Information Security

Why NASA Needs a Programmer Fluent In 60-Year-Old Languages

To keep the Voyager 1 and 2 crafts going, NASA's new hire has to know FORTRAN and assembly languages.<p><i>UPDATE: The Voyager team has hired internally for Zottarelli's replacement, and the retirement is not anticipated until next year. "I go down the hallway and I meet people and I say, 'Wow, Voyager</i> …

Good news for hackers: People still plug found USB sticks into their computers

Of 200 USB sticks distributed at public places in Chicago, Cleveland, San Francisco and Washington, D.C., earlier this year, 17 percent wound up …

U.S. Dept. of Homeland Security

Building a ToDo App Using Realm and Swift

After the big evolution in smart phones in the last years, a lot of tools have been developed to make life easier and simpler for developers to …

App Store

New to AdWords? Avoid These 10 Common Budget Killing Mistakes

What’s the scariest thing for a small business owner to pull the trigger on?<p>I bet pay per click (PPC) advertising is near the top of the list.<p>PPC is</i> …

AdWords

How to Protect Yourself from the NSA If You Use 1024-bit DH Encryption

In a post on Wednesday, researchers Alex Halderman and Nadia Heninger presented compelling research suggesting that the NSA has developed the …

Tennessee city that fought Comcast and won announces 10Gbps internet

For $299 a month<p>If you live in Chattanooga, Tennessee, you may be in for a treat. EPB Fiber Optics is bringing 10Gbps internet speeds to the southern city, for "$299 per month with free installation, no contracts and no cancellation fees," which it says is the fastest residential internet …

Net Neutrality

Primer explains the spying tech your local cops are using

The Electronic Frontier Foundation's new Law Enforcement Technology Primer for Civilian Oversight Bodies is a short, easy-to-understand guide for …

Surveillance

Windows 10 Privacy Settings Walkthrough

The volume around Windows 10 and privacy has been steadily increasing since shortly after the release of Windows 10 in late July.<p>Just yesterday Terry …

Quantum Computing Kills Encryption

Imagine a world where the most widely-used cryptographic methods turn out to be broken: quantum computers allow encrypted Internet data transactions …

Quantum Computing

Encryption might be the reason we've never heard from aliens, says Snowden

Edward Snowden thinks he might have an answer to the Fermi paradox — the cosmological puzzle of why, given that the universe is so very old and so very big, we haven't heard from any aliens yet. Speaking with Neil deGrasse Tyson on the astrophysicist's <i>StarTalk</i> podcast (the relevant section starts …

Encryption
Surveillance

There's a massive iPhone vulnerability that can only be stopped by downloading iOS 9

Mark Dowd, a security researcher, has revealed the exploit, which involves rebooting the phone after receiving an AirDrop file, according to Forbes.<p>According to Dowd, the only way to prevent this attack is by updating to iOS 9 and OS X 10.11 El Capitan, which come out September 16 and 30 …

San Francisco