Chico Johnson

61 Flips | 5 Magazines | 31 Likes | 1 Following | 85 Followers | @chicomdk2014 | Keep up with Chico Johnson on Flipboard, a place to see the stories, photos, and updates that matter to you. Flipboard creates a personalized magazine full of everything, from world news to life’s great moments. Download Flipboard for free and search for “Chico Johnson”

An Identity Thief Explains the Art of Emptying Your Bank Account

Nightfall in Minsk means Dmitry Naskovets begins working the phone. At 24, Naskovets is tall and skinny, and still looks like the college kid he …

Intelligence gathering Methodologies

Intelligence gathering Methodologies<p><b>Abstract</b><p>Hi Peerlysters! In this article we will discover how to perform Open-Source Intelligence (OSINT) …

5 Steps for Assessing Your Wireless Network Security

<b>Regularly checking your WLAN for vulnerabilities will help keep your network safe</b><p>Network security is a never-ending task; it requires ongoing vigilance. Securing your wireless network can be particularly tricky because unauthorized users can quietly sneak onto your network, unseen and possibly …

Normalization of deviance in software: how broken practices become standard

Have you ever mentioned something that seems totally normal to you only to be greeted by surprise? Happens to me all the time when I describe …

5 Things You Need to Know About Mac Security Vulnerability Thunderstrike

Photo Credit: Alan736 via WikiMediaIn case you missed it during the busy holiday rush over the past few weeks, a computer security expert has …

A flaw in Facebook lets anyone create as many fake 'Likes' as they want without using a bot army

The McGill team is hoping that by making the bugs public, advertisers — who rely on Likes and pay for them — and users will realise that some articles aren't actually as popular as the number of Likes would indicate.<p>The McGill paper will be of interest to Facebook spammers who, until now, have …

The top 50 apps for creative minds

Our pick of the best tablet and smartphone tools to enable you to make video, music, art and more<p>There’s an ongoing argument in the technology world about whether tablets and smartphones are more focused on consumption than creativity. As time has gone on, though, the number of apps helping us do …

Apps

21 tips, tricks and shortcuts to help you stay anonymous online

Photograph: PR<p>276<p>http://static.guim.co.uk/sys-images/Guardian/Pix/pictures/2015/3/5/1425567367604/51248b02-0c7c-4a07-a78a-8d789aa34828-460x276.jpeg<p>460<p>Photograph: …

'Some people don't understand my music': meet Vladimir Putin’s 'official DJ'

Is the moniker ‘Putin’s official DJ’ a sought-after crown or the kiss of death for an electronic musician living in Russia?<p>Those wondering should keep any eye on the career of DJ Fenix, recently afforded the title after becoming the first person ever to DJ at the Kremlin.<p>Fenix, real name Alex …

Listening to the Star Wars Soundtrack in a Pygmy Village

A new study looks at how music affects emotions across cultures.<p>Four decades after the debut of the brassy score that announced a galaxy far, far, away, music from <i>Star Wars</i> has reached a whole other world: a Pygmy village in the Congolese rainforest.<p>The Mebenzélé Pygmies, an isolated group of …

'Hacktivist' group Anonymous says it will avenge Charlie Hebdo attacks by shutting down jihadist websites

Hacker group Anonymous have released a video condemning the Paris attacks, saying "freedom of expression has suffered an inhuman assault"<p>Hacker group Anonymous have released a video and a statement via Twitter condemning the <b>attacks on Charlie Hebdo</b>, in which 12 people, including eight journalists, …

Health warning: Now e-cigarettes can give you malware

E-cigarettes may be better for your health than normal ones, but spare a thought for your poor computer – electronic cigarettes have become the latest vector for malicious software, according to online reports.<p>Many e-cigarettes can be charged over USB, either with a special cable, or by plugging …

Sony Got Hacked Hard: What We Know and Don't Know So Far

<i>Editors' note, 2:30 p.m. ET 12/04/14: After further reporting, we have updated the sections "How Did This Hack Occur?" and "Was Data Destroyed or</i> …

The NSA has a plan to map the entire Internet. It’s called ‘Treasure Map’

Newly exposed Edward Snowden documents reveal the NSA’s in-depth plan to “map the entire Internet — any device, anywhere, all the time.”<p>According to a report published today by German news publication Der Spiegel, the NSA and its British counterpart, GCHQ, “[aim] to map the Internet, and not just …

Half of U.K. Firms Would Hire Hackers, Ex-Convicts to Secure Their Networks

Increasingly worried about the state of their cyber security, and unable to hire or retain specialist staff, U.K. firms are looking to hire hackers and ex-convicts in a desperate bid to secure their networks.

Cybersecurity

TechWiseTV

New “TCP Stealth” tool aims to help sysadmins block spies from exploiting their systems

System administrators who aren’t down with spies commandeering their servers might want to pay attention to this one: A Friday article in German …

Technology Company Will Pay You $300,000 If You Can Hack Them

The cloud-based messaging app Telegram is offering $300,000 to the most “malicious” computer hacker.<p>You read that right. If you can gain full control of the communication lines and servers used by “Nick” and “Paul” to extract their sensitive data, you could be rewarded with more than a quarter …

The 5 Most Frightful Viruses Terrorizing Computer Users Everywhere

Here is a tutorial showing you how to crack WPA2 when WPS is disabled. This should only be practised on your own router. http://www.latesthackingnews.com/2014/08/12/how-to-crack-wpa2-using-a-dictionary-attack/

Attackers can lock your Samsung phone via exploit in built-in security app

If you own a Samsung phone, odds are you’ve heard of Find My Phone. A service built in to most recent Samsung devices, it allows users to track, lock, and even ring their phone in case the device is stolen. You may want to think twice about using the service, though, because there is a pretty …

Mobile

Hacker's guide to Neural Networks

Hi there, I’m a CS PhD student at Stanford. I’ve worked on Deep Learning for a few years as part of my research and among several of my related pet …

Have We Been Interpreting Quantum Mechanics Wrong This Whole Time?

Author: Natalie Wolchover, Quanta Magazine. Natalie Wolchover, Quanta Magazine Science<p>Date of Publication: 06.30.14.<p>Time of Publication: 6:30 am. …

A low tech hack for noobs.. still funny back in the day More Images @ http://bit.ly/1wsNbgE

Yes, hackers can now control traffic lights

PORTLAND, Ore. - We've seen it happen in movies like The Italian Job, but could hackers manipulate traffic signals in the real world?<p>According to a …

WiFi software Acrylic WiFi Free v2.0 - Real-time WLAN information and network analysis

New Acrylic <b>WiFi software</b> update. WiFi software for network analysis has gone through many changes since the first free version and finally reaches …

China Is The World's Top Source Of Internet Attack Traffic [Infographic]

China is the place where the vast majority of Internet attack traffic originates from, according to Akamai’s most recent “State of The Internet” report. Denial-of-service or DDoS attacks overwhelm computers and networks with high levels of online activity, usually through a network taken over or …

Snapchat isn't private. Period.

The photo-sharing app Snapchat offers a false sense of privacy by promising it will erase photos.<p>In fact, numerous third-party apps like SaveSnap, SnapBox and SnapSpy offer users the ability to save incoming photos.<p>Their mere existence undermines Snapchat's purpose. And if these third-party apps …

A Convicted Hacker and an Internet Icon Join Forces to Thwart NSA Spying

The internet is littered with burgeoning email encryption schemes aimed at thwarting NSA spying. Many of them are focused on solving the usability …