Julia

72 Flips | 3 Magazines | 17 Likes | 7 Following | @littlerd67 | Keep up with Julia on Flipboard, a place to see the stories, photos, and updates that matter to you. Flipboard creates a personalized magazine full of everything, from world news to life’s great moments. Download Flipboard for free and search for “Julia”

My job is to constantly think about cyber attacks — this is the first time I've been truly alarmed

And this is the first time I've been truly alarmed.<p>Friday's ransomware attacks that infected over 150 countries — most notably shutting down hospitals all over England — proved that a cyber attack can determine whether someone lives or dies.<p>Access to information is power, and if a cyber attack …

Intel chip vulnerability lets hackers easily hijack fleets of PCs

Security researchers say exploiting the vulnerability requires little technical expertise, and can result in a hacker taking full control of an …

Better Bug Eradication in the Age of Agile Development

Veracode's Chris Wysopal Details the Latest SecDevOps Techniques Mathew J. Schwartz (euroinfosec) • February 14, 2017<p>The upside of so-called secure …

Rasputin Hacker Uses SQLi to Hack 60 Universities and Government Agencies

Threat intelligence provider Recorded Future feels Rasputin’s focus on these industry verticals is deliberate. As it explains in a blog post:<p>“These …

Revealed: Web servers used by disk-nuking Shamoon cyberweapon

Avoid this wonderful malware on your network by black-holing connectionsA detailed analysis of the Shamoon malware – which is playing a huge role in …

At Least 70 Organizations Targeted In Sophisticated Cyber Surveillance Operation

Most of the targets are in Ukraine, though a few have been spotted in Russia and elsewhere, CyberX says

Americans are alarmingly careless about their own cybersecurity

While the majority of Americans have experienced some kind of data breach and nearly half believe that their personal information is less secure than …

Security News This Week: Yahoo Got Hacked Again. No, Seriously

It was a busy week in security, but aren’t they all these days! It’s always something when yet another Yahoo hack ends up somehow not even cracking …

Security

Hack This: Where To Write Code

From bare-bones text editors to IDE monsters, the tools for building new tools.<p>The code itself, the symbols and strings that eventually dictate the behavior of a machine, is one thing, but properly preparing it and executing it requires a dedicated venue. Your operating system's standard text …

Google, other tech giants outline ways to improve IoT security

Google, Intel, Microsoft, Verizon, Comcast, Time Warner Cable and a handful of other tech industry giants joined former FCC Chief Technologist Dale Hatfield to form the Broadband Internet Technical Advisory Group in 2010, in an attempt to develop a set of best practices for broadband management and …

Internet of Things

A New Global War Front is Taking Shape in Cyberspace

The United States may still be the world's preeminent superpower, based on size and reach of military and intelligence operations, but defending the virtual borders of cyberspace is another matter. Cyberattacks by foreign nations and their agents are on the rise, and this new form of conflict …

Cybersecurity

Products

Designed for the individual<br>Scaled for the enterprise<p>When it comes to elevating people with the power of data, only Tableau combines a laser focus on …

The US Army wants you to look at code it uses to spot cyberattacks

Believe it or not, the US government doesn't <i>always</i> keep its cyberwarfare code a secret. The Army Research Lab has quietly posted the source code for Dshell, a tool it uses to both spot and understand cyberattacks against the Department of Defense. The hope is that this open-door policy will not …

Cyber-attacks

The ‘Simply Amazing’ Invention Aimed at Helping ‘Novices Learn to Play the Piano Without Reading Music’

An invention aimed at helping beginners learn how to play the piano took the Internet by storm this week after a video showing how it works was widely circulated.<p>The device, formally called the Projected Instrument Augmentation System, was developed in Germany and projects a stream of colorful …

Scribd Rolls Out the Internet's First All-You-Can-Listen Audiobooks Service

The rise of the Subscription Economy continues.<p>Little more than a year after launching its all-you-can-read ebook service, the San Francisco startup …

The Feds Got the Sony Hack Right, But the Way They're Framing It Is Dangerous

The FBI’s statement that North Korea is responsible for the cyber attack on Sony Pictures Entertainment has been met with various levels of support …

Framing

Skype's Translator preview sign-ups go live for Windows 8.1 users

We first heard about Skype's Translator feature back in May, and that it should arrive before the end of the year. Well, in keeping with that timeline, the video-chatting outfit opened up a preview for Windows 8.1 devices. As its moniker suggests, the new feature converts speech in real-time, to …

Lockheed's Fusion Promise: What We Know So Far

Can the company do what's never been done before?<p>Researchers at Lockheed Martin made headlines this week with the announcement that they are on the fast track to building a nuclear fusion reactor. But experts responded with skepticism.<p>Fusion promises unlimited clean, renewable energy without the …

Lockheed Martin thinks it can give the world unlimited clean energy in 20 years

Remember back in the '50s, when official-sounding newsreels promised that we'd have new-kew-lur-powered cars by the '70s and no one would ever be unhappy? Probably not, since we've gotten a skewed sense of history from watching too many episodes of <i>Futurama</i>. Still, several decades behind schedule, …

3D-printed 'bump keys' are a tech-savvy lockpicker's best friend

We've all locked ourselves out of our homes or offices at least once, but what do you do when there aren't any handy spare keys laying around? Well, seeing as how we live in the future, you could always 3D print one. Printing a plastic replica of a key you've already got in your possession is a …

Don't forget to enter our Back to School 2014 sweepstakes!

Gearing up for a new academic year can be stressful, and that's where our Back to School 2014 guide comes in handy. Whether you're crossing items off your shopping list or simply perusing your options, you'd be silly not to enter our sweepstakes as well. If you're one of 15 randomly selected …

Companies will pay you to give up privacy on your devices

You may have good reason to safeguard your privacy these days, but would you hand over the goods if someone paid you? For some people, the answer is "yes." Companies like Luth Research have been paying willing subjects a modest amount (in Luth's case, $100 per month) to track their devices' …

You can steal data from a computer by touching it

Normally, breaking a PC's security involves either finding security exploits or launching brute force attacks, neither of which is necessarily quick or easy. However, a team at Tel Aviv University has come up with a potentially much simpler way to swipe data from a computer: touch it. If you make …

Chromecast software vulnerability paves way for another root exploit

Google regularly rolls out Chromecast updates that plug up previous root-friendly exploits, but there's a new method you can use if you want complete control over your streaming device. A group of hardware hackers (fail0verflow, Team Eureka and GTVHacker) have not only discovered a vulnerability in …

Over 1,000 US businesses hit with the same cyberattack as Target

Target's massive data breach grabbed headlines right in the middle of holiday shopping that year, and the fallout continues. According to a Department of Homeland Security advisory this afternoon, the attacks that hit the red-hued retailer, along with Supervalu and UPS, are much more widespread …

Build a Patio Table with Built-In Ice Boxes

Patio Table with Built-In Ice Boxes<br>by Heidi of Kruse’s Workshop<p>Howdy from South Dakota! I’m Heidi, and along with my trusty husband, Brent, we’ve …

Start a 1-Acre, Self-Sufficient Homestead

Everyone will have a different approach to keeping a self-sufficient homestead, and it’s unlikely that any two 1-acre farms will follow the same plan …

Farming

Intel's next Thunderbolt port can handle two 4K displays at once

There's a good reason why the Mac Pro has six Thunderbolt 2 ports: current Thunderbolt tech isn't powerful enough to drive more than one 4K display per port. Future computers shouldn't face that limitation, though. <i>VR-Zone</i> has leaked a presentation which suggests that Intel's next Thunderbolt …

$30 Pottery Barn Inspired Twin Platform Bed - Shanty 2 Chic

Yep guys. You read that right! $30!<p>And although I used my Kreg Jig to build these cuties, you can definitely build them without one. I think these …