Tech Grid

RT @CognitioCorp: RT ctovision "The 10 Nov 2015 FedCyber Summit and Threat Expo: Agenda Update View // Reply // Retweet // Favorite

Home Depot switches execs to iPhones, MacBooks as it blames Windows for massive breach

“Home Depot’s security breach that left 56 million credit card numbers and 53 million customer email addresses vulnerable was blamed by a Windows vulnerability. When executives at the home improvement retailer learned of cause of the breach, those executives were quickly given replacement MacBook laptops and iPhones” Source:Home Depot switches execs to iPhones, MacBooks as […]

RT @kevinmitnick: I'll be on the Art Bell show tonight from 9 PM to 12 AM. :-) View // Reply // Retweet // Favorite

If You Like Immersion, You’ll Love This Reality

“‘I don’t worry anymore about whether it will be accepted by the mainstream — that will happen,’ said Jeremy Bailenson, a virtual reality researcher who directs Stanford University’s Virtual Human Interaction Lab. Like many in his field, Dr. Bailenson argues that virtual reality technology is advancing so quickly that it is certain to infuse just […]

RT @FioraAeterna: 2005: look at this, I can get my toaster to run Linux! 2015: bleh, my toaster runs Linux 2025: I wish I could get a toa… View // Reply // Retweet // Favorite

Facebook Introduces ‘Hack,’ the Programming Language of the Future

“Facebook engineers Bryan O’Sullivan, Julien Verlaguet, and Alok Menghrajani spent the last few years building a programming language unlike any other. Working alongside a handful of others inside the social networking giant, they fashioned a language that lets programmers build complex websites and other software at great speed while still ensuring that their software code […]

@WeldPond I use that photo from BO2K all the time. ;-) View // Reply // Retweet // Favorite

Yahoo’s sleek News Digest app swims against the stream

Interesting concept, but I think it fails on a single point. Most folks I know consume their news on their tablet, not their phone. This application needs an iPad version ASAP. “D’Aloisio had reached a similar conclusion earlier this year, after he had become a product manager at Yahoo working in London. Unusually for someone […]

RT @ErrataRob: Nothing says "elitism" in infosec more than the way we criticize others for saying "cyber". View // Reply // Retweet // Favorite

Everything connected: the smart home in 2014

“This was the year that tablets and smartphones truly matured; 2014 should be the year when our homes finally start to get as smart as our phones. The past 12 months have witnessed some remarkable innovations. Samsung introduced eye-tracking technology that — although imperfect — knows when to scroll up on a screen, and Apple […]

@thedarktangent Just pulled into NYC for a couple of days myself…think Jay is trying to organize a get together. View // Reply // Retweet // Favorite

Eric Schmidt makes 2014 predictions, says mobile has won

“While he’s not busy writing instructions on how to lead a tech company or guides for switching from iPhone to Android, Google chairman Eric Schmidt has taken some time out to provide Bloomberg TV with his predictions for 2014. Schmidt has a history of bold public statements, but his predictions for the year ahead are […]

I can confirm this issue is real for me. View // Reply // Retweet // Favorite

Where Google Ventures is pinning its hopes

“Five years after its founding amid snickers and skepticism, Google Ventures has emerged as one of the hottest venture firms in Silicon Valley. It’s sought out by entrepreneurs and, as a co-investor, by the Valley’s marquee firms. In 2013 alone, three of its portfolio companies have gone public, and six were acquired.” Source: Where Google […]

Nice to see my old baby still innovating. @ctovision @idefense View // Reply // Retweet // Favorite

Secret contract tied NSA and security industry pioneer

“As a key part of a campaign to embed encryption software that it could crack into widely used computer products, the U.S. National Security Agency arranged a secret $10 million contract with RSA, one of the most influential firms in the computer security industry, Reuters has learned. Documents leaked by former NSA contractor Edward Snowden […]

RT @Carahsoft: Looking forward to the @fedcyber Summit on 11/10 in Tysons Corner! View // Reply // Retweet // Favorite

Unplugged: IBM reveals 5 innovations that’ll change our lives

“IBM has unveiled its eighth annual ‘IBM 5 in 5′ (#ibm5in5) – a list of innovations that will change the lives of people in five years. The list has the potential to change the way people work, live and interact during the next five years, and the tech company’s role in making them a reality.” […]

@jeremiahg …because the right thing might be evil? View // Reply // Retweet // Favorite

Second Life Founder, Philip Rosedale, Is Quietly Creating a Next-Generation Virtual World

“In Ernest Cline’s Ready Player One, humanity escapes a gritty dystopia by donning VR goggles and entering a virtual world called OASIS. Back here in a comparatively rosy 2013, we don’t have a fully immersive virtual experience—yet. But virtual reality is undergoing a renaissance. And while Oculus develops a consumer-ready virtual reality headset, Second Life […]

RT @thedarktangent: With BP2 I can finally start using some overly invasive apps again by blocking access to location, microphone, etc with… View // Reply // Retweet // Favorite

Spy agencies in covert push to infiltrate virtual world of online gaming

I wrote a paper about this years ago. Have to post the outline. “To the National Security Agency analyst writing a briefing to his superiors, the situation was clear: their current surveillance efforts were lacking something. The agency’s impressive arsenal of cable taps and sophisticated hacking attacks was not enough. What it really needed was […]

RT @SwiftOnSecurity: Some day we will look back on this era in security. That we solely relied on the human mind to authenticate to 100s se… View // Reply // Retweet // Favorite

Launch code for US nuclear weapons was as easy as 00000000

“But nuclear experts claim the military was worried about the possibility of command centers or communication lines being destroyed in real nuclear war, stopping soldiers getting the codes or authorization to launch missiles when they were actually needed. So they simply left the security code for the weapons as eight zeros, getting around the security […]

We’ve just confirmed Tim Thomas as one of our distinguished speakers at the FedCyber Threat Expo. View // Reply // Retweet // Favorite

Meet The ‘Assassination Market’ Creator Who’s Crowdfunding Murder With Bitcoins

Good article that ties together Assassination Politics with Bitcoin. I’ve been mentioning this link since Bitcoin started to establish some momentum and now someone has coded it. “Last month I received an encrypted email from someone calling himself by the pseudonym Kuwabatake Sanjuro, who pointed me towards his recent creation: The website Assassination Market, a […]

In addition to his excellent books, you can read some of Tim’s journal articles online at #FedCyber View // Reply // Retweet // Favorite

How One Hacker’s Mistake Fashioned the Internet You Use Today

“An MIT computer called PREP was the first to be penetrated. It was Nov. 2, 1988, and the time was approximately 8 p.m. Within hours and into the following morning, an estimated 10% of all machines connected to the Internet would crash, overloaded with several copies of a mysterious program. “ Source:How One Hacker’s Mistake […]

We’ve just confirmed Tim Thomas as one of our distinguished speakers at the FedCyber Threat Expo. http://events/ View // Reply // Retweet // Favorite

LED Lights Make Augmented Vision a Reality

“Once miniature green LEDs are developed (and they’re in the works, as of now), full color displays will be possible. Once that happens, the possibilities are endless. Think about everything your smart phone can do right now, and imagine the same being possible for your eyeball. This news is a little scary and a lot […]

Toethenticate. You heard it here first. View // Reply // Retweet // Favorite

The FBI busted Silk Road, but not the ‘dark web’ behind it

“While it is possible that the FBI discovered some vulnerability in Tor that was not disclosed in the criminal complaint, it seems much more likely that this was old-fashioned police work. Dread Pirate Roberts made a number of errors, according to the FBI, including connecting to the Silk Road server using only a Virtual Private […]

RT @WazeTrafficDC: UPDATE: Constitution Ave NW Washington still unusually bad. Will add over 2h to your drive! View // Reply // Retweet // Favorite

Second Life updates graphics, promises Oculus Rift support ‘soon’

“But the real surprise comes towards the end of the video, when Linden Labs shows a Second Lifer exploring the world through an Oculus Rift. Virtual reality, it promises, is ‘coming soon.’ It’s essentially promising the dream of the Holodeck: an all-consuming world that’s a bit like real life, only freer and more glamorous “ […]

Hey @WhistlePigRye - look what I found in bathroom of a San Francisco startup. View // Reply // Retweet // Favorite


“iBeacons will enable every iOS7 device to become a ‘beacon’, which creates a ‘Bluetooth low energy’ field. BLE basically needs almost no energy, so it won´t drain your battery at all.” Source: Jürgen Alker

RT @Accenture: FusionX teams with us. What’s in it for clients? It’s about amplification. @MattDevost #CyberSecurity View // Reply // Retweet // Favorite

Researchers implant false memories in mice

“Have you ever misremembered an event, while being totally certain it actually happened? Most people have experienced the unreliability of human memory. As it turns out, false memories are very easy to generate. Scientists at the Riken–MIT Center for Neural Circuit Genetics have created false memories in mice using a procedure they say would also […]

RT @AccentureOps: What's exciting to @fusionx CEO @MattDevost about joining #cybersecurity forces with us? Aligning our visions: http://t.c View // Reply // Retweet // Favorite

Digital Carjackers Show Forbes How To Crash Cars, Fuel Michael Hastings Conspiracy Theories

“The trio plus an unseen camera person test the 3,500 pound Ford Escape in the weedy parking lot of a South Bend, Indiana strip mall. With Greenberg at the wheel, the digital carjackers mess with the reporter’s mind by making his dashboard show more gas in the car than he actually has or by making […]

RT @TheLoopcast: #FF one of our guests! @AlexOlesker from our latest show on #Wildlife Trafficking. You can listen to the show here http://… View // Reply // Retweet // Favorite

Tech companies are cooperating with US intelligence agencies more than you think

“The latest bold claims made in the US National Security Agency’s leaked PowerPoint presentation on its PRISM internet surveillance program suggest that the agency is able to monitor communications in realtime, despite earlier avid denials by tech companies. The government may also be accessing much information without tech companies’ explicit knowledge, but a pair of […]

Former student parlayed their semester research project into this article series. View // Reply // Retweet // Favorite

How Hackers Beat The NSA In The ’90s And How They Can Do It Again

“While the world parses the ramifications of the National Security Agency’s massive snooping operation, it’s important to remember an earlier government attempt at data collection and, more important, how a group of hackers and activists banded together to stop it. In the early 1990s, the military was petrified that encryption technologies would leave them blind […]

Worthy of a vote for #SXSW2016 @HurdontheHill panel - Decrypting the #Cyber Security Debate in Washington View // Reply // Retweet // Favorite

Is It the Dawn of the Encryption App?

“We might live in an age of persistent and pervasive surveillance. The recent revelations about the secret National Security Agency programs aimed at collecting vast amounts of data on Americans and foreigners seemingly confirm what tinfoil-wearing netizens have feared for years: They’re watching us; technology has turned against its users.” Source:Is It the Dawn of […]

Coverage of @HurdOnTheHill’s trip to Defcon with me. View // Reply // Retweet // Favorite

We Should All Have Something To Hide

“Suddenly, it feels like 2000 again. Back then, surveillance programs like Carnivore, Echelon, and Total Information Awareness helped spark a surge in electronic privacy awareness. Now a decade later, the recent discovery of programs like PRISM, Boundless Informant, and FISA orders are catalyzing renewed concern.” Source: Moxie Marlinspike >> Blog >> We Should All Have […]

@MCole1008 Jason H. should be in touch today. Will check the voicemail issue. Thanks! View // Reply // Retweet // Favorite

Bitcoin Millionaires Become Investing Angels

“Every time you spend bitcoins to buy a drink at Evr, a swanky bar in midtown Manhattan that accepts the digital currency, you make its co-owner, Charlie Shrem, just a little bit richer. And that’s not only because a chamomile sour costs $17 (or 0.16 bitcoins). It’s because whenever someone new uses bitcoins, the electronic […]