Kevin Shaw

154 Flips | 7 Magazines | 11 Likes | 15 Following | 4 Followers | @kevshawau | Keep up with Kevin Shaw on Flipboard, a place to see the stories, photos, and updates that matter to you. Flipboard creates a personalized magazine full of everything, from world news to life’s great moments. Download Flipboard for free and search for “Kevin Shaw”

Why you need centralized logging and event log management

More companies are using their security logs to detect malicious incidents. Many of them are collecting too much log data—often billions of events. …

Information Security

Photo Stacking for Night Photography

Hey guys and gals! If you’re reading this, it’s because you want to learn how to take that noisy night photo and make it a cleaner, brighter, and …

Landscape Photography

Hands off my data! 15 default privacy settings you should change right now

On the Internet, the devil’s in the defaults.<p>You’re not reading all those updated data policies flooding your inbox. You probably haven’t even looked for your privacy settings. And that’s exactly what Facebook, Google and other tech giants are counting on.<p>They tout we’re “in control” of our …

Apps

The Energy Grid Isn’t Insured Enough to Handle a Catastrophic Hack

Insurers are limiting how much coverage energy companies can buy to protect themselves against a major attack by hackers, potentially leaving …

Cybersecurity

Energy Companies Aren't Doing Much to Defend Against Soaring Cyber Attacks

How much is cyber security worth to the U.S. energy industry?<p>Not a whole lot apparently.<p>Two prominent security consultant firms estimate that energy …

Cybersecurity

The Best Smart Locks of 2018

Keys are so 20th century. A connected lock offers both security and flexibility, letting you control access to your home with your phone. And …

UK will spend £56 million implementing the NIS Regulations

The day has come: the Directive on network and information security systems (NIS Directive) has been transposed into UK law as the NIS Regulations …

Dad jokes, ranked

Let's face it, dads have horrible jokes. But sometimes, the jokes are so horrible they're amazing.<p>Every once in a while, a wholesome dad joke is just …

The Untold Story of Robert Mueller's Time in Combat

One day in the summer of 1969, a young Marine lieutenant named Bob Mueller arrived in Hawaii for a rendezvous with his wife, Ann. She was flying in …

Military

Getting Started with Shodan, “The scariest search engine”

<b>What is Shodan?</b><p>Shodan is a search engine that lets user find specific devices connected to the internet using various filters. Shodan was created in …

5 things to consider before installing smart light switches

When turning your old, dumb house into a smart home, one of the best places to start is with lighting. For starters, you can test the waters with a single smart bulb or set of lights — letting you dip a toe in the smart light pool before diving in head-first.<p>When it comes to smart lighting, one of …

Home Automation

Cyber risk and resilience: A guide for the board and senior management

Each and every organisation is affected by cyber risk:• Organisations that believe they can ignore ‘cyber’ and the benefits it has to offer will<b></b> …

How to speed up your internet and stop your ISP tracking you

Your entire DNS browsing history can be recorded by your ISP, and will soon be sold to anyone who wants it.<p>DNS is what sends you to the correct site when you browse the internet, but it is also non-encrypted, and reveals your entire browsing history. Your browser’s private mode does nothing, and …

This adapter performs CPR on your router if it becomes unresponsive

Do you have security cameras or other automation devices in your home? All of these IoT gadgets are great until your home network goes belly up for …

Cloudflare makes it harder for ISPs to track your web history

If you're privacy-minded, you probably aren't thrilled that governments seem hell-bent on giving internet providers free rein over your browsing data. Cloudflare just gave you a tool to fight back, however. It launched 1.1.1.1, a free Domain Name System service (the technology that translates IP …

8 questions to ask about your industrial control systems security

A recent incident where a likely nation-state threat actor inadvertently shut down a critical infrastructure facility in the Middle East when testing …

WATCH: Trevor Noah’s farewell to Jacob Zuma will have you in stitches

As the country continues to deal with the major political events of last week, which led to Jacob Zuma’s resignation, comedian Trevor Noah has found …

Jacob Zuma

Cloudflare Access takes on VPNs with reverse proxy approach

Cloudflare takes inspiration from Google's BeyondCorp with a new service called Cloudflare Access, which aims to replace corporate VPNs and embrace …

CISOs should examine commercial SOAPA offerings in 2018

For over a year now, I’ve written about a burgeoning security technology initiative that ESG calls a security operations and analytics platform …

I enlisted a free AI to troll email scammers – it was hilariously effective

Email scammers are the scum of the earth and deserve forever itchy butts. I’ve always wondered if there was something I could do beyond just wishing them ill, and I’m happy to report I’ve now found a way to give them a dose of their own medicine.<p>Rescam is an AI bot that sends authentic-sounding …

14 Helpful Lightroom Tips and Tricks to Improve Your Photo Editing

Adobe Lightroom is an app that’s filled with all kinds of helpful features that can make life easier for you once you learn they exist. Here’s a …

Tutorials

Review: The Nikon D850’s Negative Digitizer Isn’t Ready for Prime Time

A couple weeks ago, I got a chance to run the Nikon D850 through its paces as a scanner. The “Negative Digitizer” feature, which can automatically …

Protect Your Small Business From Cyber Attacks With These Free Tools

Defend against hackers and cybercrime with free email theft protection and easy-to-use cybersecurity tools.<p>Opinions expressed by <i>Entrepreneur</i> contributors are their own.<p>Cyber crime damages are predicted to cost the world $6 trillion annually by 2021, up from $3 trillion in 2015, according to a …

Self-downloading adware targets Android users in the UK

<b>A NEW ANDROID THREAT</b> is downloading itself via advertisements on forums and is targeting users in the UK, US and France.<p>The app, which was identified …

Malware downloader infects your PC without a mouse click

You think you're safe from malware since you never click suspicious-looking links, then somebody finds a way to infect your PC anyway. Security researchers have discovered that cybercriminals have recently started using a malware downloader that installs a banking Trojan to your computer even if …

Secure Computing: Lessons from Unisys Chief Trust Officer

Michael Krigsman: Welcome to Episode #238 of CxOTalk. I'm Michael Krigsman, industry analyst, and your host. I want to thank Livestream for being our …

'Doomsday' worm uses seven NSA exploits (WannaCry used two)

The recently discovered EternalRocks joins a set of highly infectious bugs created from the NSA's leaked tools.<p>If the NSA's leaked hacking tools had a Voltron, it would be EternalRocks.<p>On Sunday, researchers confirmed new malware, named EternalRocks, that uses seven exploits first discovered by the …

WannaCry

Apple Just Launched a Site for iPhone Photography Tips and Tricks

Apple wants to train you to be a master of iPhone photography. The company just launched a new microsite called “How to Shoot on iPhone 7” that …

Photography Tips

How to clean your Gmail account of malicious apps

Among the most coveted targets of phishing scammers is gaining access to your Gmail account, where you’re probably storing a gold mine’s worth of …

Google Docs Phishing Scam a Game Changer

Experts expect copycats that take advantage of passive authentication from third-party applications using standards such as OAuth.