Tech Grid


Loading...
RT @kevinmitnick: Sony was likely hacked because they don't follow best practices, even after being hacked several times before. Lessons no… View // Reply // Retweet // Favorite

Home Depot switches execs to iPhones, MacBooks as it blames Windows for massive breach

“Home Depot’s security breach that left 56 million credit card numbers and 53 million customer email addresses vulnerable was blamed by a Windows vulnerability. When executives at the home improvement retailer learned of cause of the breach, those executives were quickly given replacement MacBook laptops and iPhones” Source:Home Depot switches execs to iPhones, MacBooks as […]

For years I’ve been saying that capability has not yet aligned with intent to engage in information terrorism attacks. Guess that is over. View // Reply // Retweet // Favorite

If You Like Immersion, You’ll Love This Reality

“‘I don’t worry anymore about whether it will be accepted by the mainstream — that will happen,’ said Jeremy Bailenson, a virtual reality researcher who directs Stanford University’s Virtual Human Interaction Lab. Like many in his field, Dr. Bailenson argues that virtual reality technology is advancing so quickly that it is certain to infuse just […]

@kevinmitnick But they say this is a sophisticated attack! Re:domain credentials. View // Reply // Retweet // Favorite

Facebook Introduces ‘Hack,’ the Programming Language of the Future

“Facebook engineers Bryan O’Sullivan, Julien Verlaguet, and Alok Menghrajani spent the last few years building a programming language unlike any other. Working alongside a handful of others inside the social networking giant, they fashioned a language that lets programmers build complex websites and other software at great speed while still ensuring that their software code […]

@VerizonSupport Wired. I don’t need to repeat the horrible support script over twitter. Been doing that in the live chat. View // Reply // Retweet // Favorite

Yahoo’s sleek News Digest app swims against the stream

Interesting concept, but I think it fails on a single point. Most folks I know consume their news on their tablet, not their phone. This application needs an iPad version ASAP. “D’Aloisio had reached a similar conclusion earlier this year, after he had become a product manager at Yahoo working in London. Unusually for someone […]

We make the rubble bounce! “@mtanji: @Jason_Healey according to Dick we nuke them...” View // Reply // Retweet // Favorite

Everything connected: the smart home in 2014

“This was the year that tablets and smartphones truly matured; 2014 should be the year when our homes finally start to get as smart as our phones. The past 12 months have witnessed some remarkable innovations. Samsung introduced eye-tracking technology that — although imperfect — knows when to scroll up on a screen, and Apple […]

@VerizonSupport Did you not see my original post? I uploaded the picture of the abysmal network download speeds. View // Reply // Retweet // Favorite

Eric Schmidt makes 2014 predictions, says mobile has won

“While he’s not busy writing instructions on how to lead a tech company or guides for switching from iPhone to Android, Google chairman Eric Schmidt has taken some time out to provide Bloomberg TV with his predictions for 2014. Schmidt has a history of bold public statements, but his predictions for the year ahead are […]

RT @bobgourley: Always an honor to be mentioned with @MattDevost like in: Sony Pictures Wasn’t the First. Why It Won’t Be the Last. http://… View // Reply // Retweet // Favorite

Where Google Ventures is pinning its hopes

“Five years after its founding amid snickers and skepticism, Google Ventures has emerged as one of the hottest venture firms in Silicon Valley. It’s sought out by entrepreneurs and, as a co-investor, by the Valley’s marquee firms. In 2013 alone, three of its portfolio companies have gone public, and six were acquired.” Source: Where Google […]

@VerizonSupport Your kidding right? View // Reply // Retweet // Favorite

Secret contract tied NSA and security industry pioneer

“As a key part of a campaign to embed encryption software that it could crack into widely used computer products, the U.S. National Security Agency arranged a secret $10 million contract with RSA, one of the most influential firms in the computer security industry, Reuters has learned. Documents leaked by former NSA contractor Edward Snowden […]

WTF @VerizonSupport - Having major download speed issues right now. Live Chat support is horrible. http://t.co/JfFicbnVlX View // Reply // Retweet // Favorite

Unplugged: IBM reveals 5 innovations that’ll change our lives

“IBM has unveiled its eighth annual ‘IBM 5 in 5′ (#ibm5in5) – a list of innovations that will change the lives of people in five years. The list has the potential to change the way people work, live and interact during the next five years, and the tech company’s role in making them a reality.” […]

RT @DinoStraciatela: @NateSilver538 Might be noise but Sony Market Cap down $2bn since the leaks & down $300mm in after hours NYSE trading. View // Reply // Retweet // Favorite

Second Life Founder, Philip Rosedale, Is Quietly Creating a Next-Generation Virtual World

“In Ernest Cline’s Ready Player One, humanity escapes a gritty dystopia by donning VR goggles and entering a virtual world called OASIS. Back here in a comparatively rosy 2013, we don’t have a fully immersive virtual experience—yet. But virtual reality is undergoing a renaissance. And while Oculus develops a consumer-ready virtual reality headset, Second Life […]

RT @KimZetter: At risk of launching another Tweet storm, I'll point out that intel sources also claimed Brazilian blackouts were caused by … View // Reply // Retweet // Favorite

Spy agencies in covert push to infiltrate virtual world of online gaming

I wrote a paper about this years ago. Have to post the outline. “To the National Security Agency analyst writing a briefing to his superiors, the situation was clear: their current surveillance efforts were lacking something. The agency’s impressive arsenal of cable taps and sophisticated hacking attacks was not enough. What it really needed was […]

RT @redteamjournal: New on Red Team Journal: two-minute interview with FusionX's Matt Devost. http://t.co/BLE0T46v6S #infosec #riskmanagem… View // Reply // Retweet // Favorite

Launch code for US nuclear weapons was as easy as 00000000

“But nuclear experts claim the military was worried about the possibility of command centers or communication lines being destroyed in real nuclear war, stopping soldiers getting the codes or authorization to launch missiles when they were actually needed. So they simply left the security code for the weapons as eight zeros, getting around the security […]

RT @CITorg: If you are thinking about starting a #cybersecurity product company - you need to check out @MACH37cyber #infosec https://t.co/ View // Reply // Retweet // Favorite

Meet The ‘Assassination Market’ Creator Who’s Crowdfunding Murder With Bitcoins

Good article that ties together Assassination Politics with Bitcoin. I’ve been mentioning this link since Bitcoin started to establish some momentum and now someone has coded it. “Last month I received an encrypted email from someone calling himself by the pseudonym Kuwabatake Sanjuro, who pointed me towards his recent creation: The website Assassination Market, a […]

@KatieHeigl @ChrisLMcKenna I’m putting Nick in the “good guy” category for now. Not sure I trust anyone else but him at this point. View // Reply // Retweet // Favorite

How One Hacker’s Mistake Fashioned the Internet You Use Today

“An MIT computer called PREP was the first to be penetrated. It was Nov. 2, 1988, and the time was approximately 8 p.m. Within hours and into the following morning, an estimated 10% of all machines connected to the Internet would crash, overloaded with several copies of a mysterious program. “ Source:How One Hacker’s Mistake […]

Really enjoying the writing for @ChrisLMcKenna’s Nick character on #StateOfAffairs - “Just point me and shoot.” View // Reply // Retweet // Favorite

LED Lights Make Augmented Vision a Reality

“Once miniature green LEDs are developed (and they’re in the works, as of now), full color displays will be possible. Once that happens, the possibilities are endless. Think about everything your smart phone can do right now, and imagine the same being possible for your eyeball. This news is a little scary and a lot […]

The #StateOfAffairs fact checking team fails again. Turns our there IS a gun emoticon. What will the @CIA say? http://t.co/LwBXVhdSZR View // Reply // Retweet // Favorite

The FBI busted Silk Road, but not the ‘dark web’ behind it

“While it is possible that the FBI discovered some vulnerability in Tor that was not disclosed in the criminal complaint, it seems much more likely that this was old-fashioned police work. Dread Pirate Roberts made a number of errors, according to the FBI, including connecting to the Silk Road server using only a Virtual Private […]

Dude, do you even Cyber? Glad to see the Cyber 9/12 student challenge will take place again in 2015. Great event! http://t.co/RoOyPdI9tb View // Reply // Retweet // Favorite

Second Life updates graphics, promises Oculus Rift support ‘soon’

“But the real surprise comes towards the end of the video, when Linden Labs shows a Second Lifer exploring the world through an Oculus Rift. Virtual reality, it promises, is ‘coming soon.’ It’s essentially promising the dream of the Holodeck: an all-consuming world that’s a bit like real life, only freer and more glamorous “ […]

“@Aelkus: I believe @MattDevost called this shortly after first stirrings of Student http://t.co/3STQAVbhfEhttp://t.co/6s8naLwCu0 View // Reply // Retweet // Favorite

iBeacons

“iBeacons will enable every iOS7 device to become a ‘beacon’, which creates a ‘Bluetooth low energy’ field. BLE basically needs almost no energy, so it won´t drain your battery at all.” Source: Jürgen Alker

"Sony Breach May Have Exposed Employee Healthcare, Salary Data" http://t.co/99kCQWzfTR View // Reply // Retweet // Favorite

Researchers implant false memories in mice

“Have you ever misremembered an event, while being totally certain it actually happened? Most people have experienced the unreliability of human memory. As it turns out, false memories are very easy to generate. Scientists at the Riken–MIT Center for Neural Circuit Genetics have created false memories in mice using a procedure they say would also […]

@Jason already eaten on the East Coast. http://t.co/rrj7rAUpwH View // Reply // Retweet // Favorite

Digital Carjackers Show Forbes How To Crash Cars, Fuel Michael Hastings Conspiracy Theories

“The trio plus an unseen camera person test the 3,500 pound Ford Escape in the weedy parking lot of a South Bend, Indiana strip mall. With Greenberg at the wheel, the digital carjackers mess with the reporter’s mind by making his dashboard show more gas in the car than he actually has or by making […]

RT @danachis: Happy Thanksgiving! If you are home with parents, please update their browsers. View // Reply // Retweet // Favorite

Tech companies are cooperating with US intelligence agencies more than you think

“The latest bold claims made in the US National Security Agency’s leaked PowerPoint presentation on its PRISM internet surveillance program suggest that the agency is able to monitor communications in realtime, despite earlier avid denials by tech companies. The government may also be accessing much information without tech companies’ explicit knowledge, but a pair of […]

@SofAWritersRoom with a good dialogue reference to BSG FTW. View // Reply // Retweet // Favorite

How Hackers Beat The NSA In The ’90s And How They Can Do It Again

“While the world parses the ramifications of the National Security Agency’s massive snooping operation, it’s important to remember an earlier government attempt at data collection and, more important, how a group of hackers and activists banded together to stop it. In the early 1990s, the military was petrified that encryption technologies would leave them blind […]

RT @techpologist: @MattDevost But then we can't buy their stuff. View // Reply // Retweet // Favorite

Is It the Dawn of the Encryption App?

“We might live in an age of persistent and pervasive surveillance. The recent revelations about the secret National Security Agency programs aimed at collecting vast amounts of data on Americans and foreigners seemingly confirm what tinfoil-wearing netizens have feared for years: They’re watching us; technology has turned against its users.” Source:Is It the Dawn of […]

China can take down the U.S. power grid. Nothing to see here, move along. http://t.co/20Jb5KUcgp View // Reply // Retweet // Favorite

We Should All Have Something To Hide

“Suddenly, it feels like 2000 again. Back then, surveillance programs like Carnivore, Echelon, and Total Information Awareness helped spark a surge in electronic privacy awareness. Now a decade later, the recent discovery of programs like PRISM, Boundless Informant, and FISA orders are catalyzing renewed concern.” Source: Moxie Marlinspike >> Blog >> We Should All Have […]

RT @fusionx: Shawn Duffy from FusionX gives a 60 second future threat scenario at the Bloomberg Year Ahead conference. http://t.co/w87bT9B View // Reply // Retweet // Favorite

Bitcoin Millionaires Become Investing Angels

“Every time you spend bitcoins to buy a drink at Evr, a swanky bar in midtown Manhattan that accepts the digital currency, you make its co-owner, Charlie Shrem, just a little bit richer. And that’s not only because a chamomile sour costs $17 (or 0.16 bitcoins). It’s because whenever someone new uses bitcoins, the electronic […]