Yury Chemerkin

39 Added | 1 Magazine | 5 Likes | 1 Follower | @yurychemerkin | Keep up with Yury Chemerkin on Flipboard, a place to see the stories, photos, and updates that matter to you. Flipboard creates a personalized magazine full of everything, from world news to life’s great moments. Download Flipboard for free and search for “Yury Chemerkin”

Access The Internet Globally And Save Yourself A Heap Of Money

Data roaming when you’re overseas can be a horrifyingly expensive prospect, particularly if you’re a big data user who’s always on the move. The problem is that many of us have phones that are ‘locked; to a network and tethering an iPad or laptop to a mobile phone can be impossible, depending on …

Report: NSA 'collected 200m texts per day'

<b>The US National Security Agency (NSA) has collected and stored almost 200 million text messages a day from around the world, UK media report.</b><p>The NSA extracts and stores data from the SMS messages, and UK spies have had access to some of the information, the Guardian and Channel 4 News say.<p>The …

Surveillance

BBM will be preinstalled on some Android smartphones, BlackBerry says

BlackBerry this morning announced that BBM will be preloaded on some Android smartphones starting in December. The specific models weren't named — …

Twitter Enables Perfect Forward Secrecy Across Sites To Protect User Data Against Future Decryption

Twitter has enabled Perfect Forward Secrecy across its mobile site, website and API feeds in order to protect against future cracking of the service’s encryption. The PFS method ensures that, if the encryption key Twitter uses is cracked in the future, all of the past data transported through the …

Samsung, Nokia say they don’t know how to track a powered-down phone | Ars Technica

Privacy International still awaits answers from Apple, BlackBerry, and others.<p>Back in July 2013, <i>The Washington Post</i> reported that nearly a decade …

Tracking botnets using automatically generated domains - Help Net Security

Stefano Zanero is an Assistant Professor at Politechnico di Milano, where he focuses on systems security.<p>Modern botnets rely on domain-generation …

Linux backdoor squirts code into SSH to keep its badness buried

Security researchers have discovered a Linux backdoor that uses a covert communication protocol to disguise its presence on compromised systems.<p>The …

New threat model army

“THE NSA has turned the internet into a giant surveillance platform.” Security guru Bruce Schneier (pictured) did not pull his punches when he …

Tweetbot 3.1 for iPhone brings back classic features, adds quick actions

When Tapbots released Tweetbot 3 for the iPhone last month, it took two steps forward and one step back -- a slew of older features didn't make the cut. The developer is quickly making amends with its 3.1 update, however. The refreshed Twitter app restores the option to set list as the active …

More Android apps in more languages as Google opens App Translation Service to all developers

Google has announced that its App Translation Service is now available to every Android developer. The company previewed this localization tool back at I/O 2013, after which a number of devs were able to participate in a pilot program -- Google says it was so well received that it just had to open …

ActiveX Control issue being addressed in Update Tuesday

Late last Friday, November 8, 2013, a vulnerability, CVE-2013-3918, affecting an Internet Explorer ActiveX Control was publically disclosed. We have …

CryptoLocker

The ransomware variant known as CryptoLocker is a particularly nasty bit of malware that is taking the Internet by storm. Its use of sound …

Google Drive

6 IaaS providers you should know (but may not)

Advertisement<p>33 Comments<p>When people think Infrastructure as a Service their first thought is Amazon(S amzn) Web Services. That’s fair given its early …

Cyberpolitics in International Relations

Rating:<p>Amazon Price: $35.00 $28.00 You save: $7.00 (20%). (as of February 16, 2018 00:08 – Details). Product prices and availability are accurate as …

Why NSA's war on terror is more than just a 'neat' hacking game http://trib.al/tKvzlYd Photograph: Washington Post

The Shadow Warriors

Rating:<p>Amazon Price: $14.99 $14.99 (as of March 12, 2018 23:05 – Details). Product prices and availability are accurate as of the date/time indicated …

Live from Expand: The Industrial Revolution Starts at Home

This is going to be a fun one. We've brought some of the top names in the maker space to discuss the world of do-it-yourself electronics. We'll be joined by master modder Ben Heck, littleBits founder Ayah Bdeir and <i>Make Magazine</i> Editor-in-Chief Mark Frauenfelder.<p>November 10, 2013 10:20:00 AM</i> …

Piracy: The Intellectual Property Wars from Gutenberg to Gates

Since the rise of Napster and other file-sharing services in its wake, most of us have assumed that intellectual piracy is a product of the digital …

IBM opens its research doors into Africa

The 1980s adage that nobody ever got fired for buying IBM is one of marketing’s great slogans, but the company has always been more enterprising than its customers. Its recent move into Africa underlines how it is looking to the future.<p>The road to IBM’s new Africa Research Lab in the outlying Karen …

CyberStorm

Rating:<p>Amazon Price: N/A (as of February 19, 2018 11:42 – Details). Product prices and availability are accurate as of the date/time indicated and …

Glass Houses: Privacy, Secrecy, and Cyber Insecurity in a Transparent World

Rating:<p>Amazon Price: N/A (as of January 31, 2018 02:27 – Details). Product prices and availability are accurate as of the date/time indicated and are …

Active Directory Audit Tool

By:<p>Course of the Month23 days, 10 hours left to enroll<p>Premium<p>Premium members can enroll in this course at no extra cost.<p>273 lessons<p>By:<p>Premium<p>Premium …

Audits

Hacking: Digital Media and Technological Determinism

Hacking provides an introduction to the community of hackers and an analysis of the meaning of hacking in twenty-first century societies.<p>One the one …

Protecting Industrial Control Systems from Electronic Threats

Rating:<p>Amazon Price: $89.95 $89.95 (as of April 24, 2018 14:01 – Details). Product prices and availability are accurate as of the date/time indicated …

Cybersecurity

Stealing PIN Codes With a Wink and a Nod

Security researchers have developed a number of different methods to steal or bypass the passcodes on most of the common mobile phone platforms, some …

Information Security

Python Parser to Recover Deleted SQLite Database Data

Soooo.... last week I was listening to the Forenisc Lunch and the topic of parsing deleted<p>records from SQLite databases came up. These Forensic …