Tech Grid


Loading...

Sunset Lets You Use Your Phone Without Losing Your Night Vision

“If you’re stargazing at night, or just somewhere dark and you don’t want to be blinded by using your phone, Sunset for Android is a simple screen filter that applies a reddish overtone to your display so you won’t lose your night vision.” Source:Sunset Lets You Use Your Phone Without Losing Your Night Vision

@ShepherdKathryn guess we will have to wait and see, but if I were a betting man.... View // Reply // Retweet // Favorite

Hospital calculates return on iPad investment at nine days

“If you’ve been around the medical profession, you have probably seen an explosion of iPads. Doctors I’ve talked to say they are easy to carry around, and the iPad mini in particular seems a great fit for pockets. Meanwhile, companies that write software for medical uses are quickly creating apps that are iPad-friendly.” Source: Hospital […]

RT @lewisshepherd: NSA leaker comes forward. Meanwhile, I'm guessing there's a new job opening at Booz http://t.co/GQzxFUisyM View // Reply // Retweet // Favorite

U.S. to protect private sector from secret software attacks

“The U.S. government will use classified information about software vulnerabilities for the first time to protect companies outside of the military industrial complex, top officials told Reuters this week. Secretary of Homeland Security Janet Napolitano said that a system being developed to scan Internet traffic headed toward critical businesses would block attacks on software programs […]

Things that make you hmmm. Leaker now living in Hong Kong? View // Reply // Retweet // Favorite

Saudi Telecom Sought U.S. Researcher’s Help in Spying on Mobile Users

“A prominent computer security researcher says he recently rejected a request by a Saudi telecommunications company to help it spy on mobile customers using social networking accounts such as Twitter. The security researcher, who goes by the name Moxie Marlinspike and who recently left Twitter where he worked on that company’s security team, said he […]

Things that make you hmmm. Leaker now living in Hong Kong? View // Reply // Retweet // Favorite

Homeland Security reportedly struggles to replace departing cybersecurity experts

“As the Pentagon tentatively lays blame for hacking attacks at the feet of the Chinese military, the US Department of Homeland Security grapples with replacing four of its most prominent cybersecurity-focused officials. That includes Deputy Undersecretary for Cybersecurity Mark Weatherford, as well as DHS second-in-command Jane Holl Lute. According to the New York Times, though, […]

There’s a war out there, old friend. A world war. And it’s not about who’s got the most bullets. It’s about who controls the information. View // Reply // Retweet // Favorite

Venture capital gushes into security tech sector

“Venture capitalists continue to toss millions at companies supplying technologies to defend cyber attacks. The latest example: an investment group led by Paladin Capital Group, Ascent Venture Partners and Intel Capital this morning announced $12 million in funding for PerspecSys.” Source:Venture capital gushes into security tech sector

There’s a war out there, old friend. A world war. And it’s not about who’s got the most bullets. It’s about who controls the information. View // Reply // Retweet // Favorite

FRED WILSON: Here’s Why I’m Investing In Bitcoin

“The short explanation: ‘We believe that Bitcoin represents something fundamental and powerful, an open and distributed Internet peer to peer protocol for transferring purchasing power. It reminds us of SMTP, HTTP, RSS, and BitTorrent in its architecture and openness.’” Source:FRED WILSON: Here’s Why I’m Investing In Bitcoin – Business Insider

It is a little known fact that all PRISM data is released into the public domain by the USG... via Numbers Stations. View // Reply // Retweet // Favorite

Cyber-attacks behind possibly record-breaking bank heist

“It may be the largest bank robbery in history: A crime ring is accused of stealing $45 million from financial institutions from around the world. But these criminals weren’t wearing masks or waving guns. They were armed with computers.” Source:Cyber-attacks behind possibly record-breaking bank heist – CBS News

It is a little known fact that all PRISM data is released into the public domain by the USG... via Numbers Stations. View // Reply // Retweet // Favorite

US accuses China government and military of cyber-spying

“China’s government and military have targeted US government computers as part of a cyber espionage campaign, a US report on China says. Intrusions were focused on collecting intelligence on US diplomatic, economic and defence sectors which could benefit China’s own defence programme, it says.” Source:BBC News – US accuses China government and military of cyber-spying

RT @PRISM_NSA: Not sure what's a bigger relief this week: being able to finally talk about our jobs, or finally not having to keep secret t… View // Reply // Retweet // Favorite

Government Lab Reveals It Has Operated Quantum Internet For Over Two Years

“A quantum internet capable of sending perfectly secure messages has been running at Los Alamos National Labs for the last two and a half years, say researchers” Source: Government Lab Reveals It Has Operated Quantum Internet For Over Two Years | MIT Technology Review

Keep in mind, TIA wanted to solve the big data analysis issues only by solving the privacy issues in parallel. View // Reply // Retweet // Favorite

Four years and $100 million later, Bitcoin’s mysterious creator remains anonymous

“Bitcoin, the four-year-old virtual currency that approximates cash on the internet, now powers an economy worth more than $1 billion and is widely admired for the technical sophistication that allows it to operate without a central authority. It got its own ticker on CNBC and inspired a legion of startups. And yet, we still don’t […]

Keep in mind, TIA wanted to solve the big data analysis issues only by solving the privacy issues in parallel. View // Reply // Retweet // Favorite

Bitcoin Is Not as Secure, Unregulated, or Lucrative as You Might Think

“I’ll be blunt: Money’s gotten buggy. People who don’t realize this might be in high finance — indeed, we’ve gotten very good at moving the revenues of entire generations within a precise number of femtoseconds — but what if you’re just trying to buy a smoothie?” Source: Bitcoin Is Not as Secure, Unregulated, or Lucrative […]

You’d be remiss if you posted to Twitter about all this without reading Poindexter’s TIA retirement letter. http://t.co/CEOTiTZghr View // Reply // Retweet // Favorite

US military approves Android phones for soldiers

“Samsung phones running a secure version of Android have been approved for use by the US Department of Defense. The approval is the start of a process that will see many different types of mobile devices used by US soldiers.” Source:BBC News – US military approves Android phones for soldiers

You’d be remiss if you posted to Twitter about all this without reading Poindexter’s TIA retirement letter. http://t.co/CEOTiTZghr View // Reply // Retweet // Favorite

Accused Chinese spy charged with downloading porn, not NASA secrets

“Bo Jiang, the Chinese national accused of spying on NASA, was formally charged in a Virginia court this week — not for conducting espionage, but for downloading porn and pirated movies to his computer. A former research contractor at NASA’s Langely Research Center in Hampton, Virginia, Jiang was originally indicted on March 20th, when federal […]

BINGO! “@jmulvenon: Something fishy about leaks about US cyber spying right before we meet Xi Jinping to criticize China's cyber spying” View // Reply // Retweet // Favorite

Dark web drugs site Silk Road knocked offline by hacker

Dark Web DDOS | “An ‘underground’ website famed for selling drugs and other illegal items has been targeted in a cyberattack. It appears the site suffered from a Distributed Denial of Service (DDoS) attack over the course of Tuesday and Wednesday.” Source:BBC News – Dark web drugs site Silk Road knocked offline by hacker

BINGO! “@jmulvenon: Something fishy about leaks about US cyber spying right before we meet Xi Jinping to criticize China's cyber spying” View // Reply // Retweet // Favorite

Dutch police may get right to hack in cyber crime fight

“The Dutch government has announced plans to give police far greater powers to fight cybercrime. Under a new bill, investigators would be able to hack into computers, install spyware, read emails and destroy files.” Source:BBC News – Dutch police may get right to hack in cyber crime fight

You need to find the suspects of interest in the noise. Then it becomes a subject based investigation. View // Reply // Retweet // Favorite

DHS: ‘OpUSA’ May Be More Bark Than Bite

“The U.S. Department of Homeland Security is warning that a group of mostly Middle East- and North Africa-based criminal hackers are preparing to launch a cyber attack campaign next week known as ‘OpUSA’ against websites of high-profile US government agencies, financial institutions, and commercial entities. But security experts remain undecided on whether this latest round […]

You need to find the suspects of interest in the noise. Then it becomes a subject based investigation. View // Reply // Retweet // Favorite

OpUSA Threatens Banks, Government on May 7

“The group goes on to say U.S. financial institutions will be targeted for attack. ‘Do not take this as a warning,’ the post states. ‘You cannot stop the Internet hate machine from doxes, DNS attacks, defaces, redirects, DDoS attacks, database leaks and admin takeovers.’ The White House website and eight other federal government sites, plus […]

For over a decade the problem has migrated towards behavioral analysis and transaction based pattern analysis. View // Reply // Retweet // Favorite

China Cyberspies Outwit U.S. Stealing Military Secrets

At what point are shareholders able to sue for negligence? That question has been haunting the cyber domain for a decade… “QinetiQ’s espionage expertise didn’t keep Chinese cyber- spies from outwitting the company. In a three-year operation, hackers linked to China’s military infiltrated QinetiQ’s computers and compromised most if not all of the company’s research. […]

For over a decade the problem has migrated towards behavioral analysis and transaction based pattern analysis. View // Reply // Retweet // Favorite

How to use Tasker

“We are Android users, and we are a pampered bunch. Android is such a flexible mobile OS that our Android devices often act as our personal genies granting our daily mobile wishes, making some of our mobile dreams come true. And, powerful as OEM-provided genies already are, a task control and task automation app such […]

But the fundamental problem is we don’t have the complete list of suspects to monitor. View // Reply // Retweet // Favorite

Sensitive Army database of U.S. dams compromised; Chinese hackers suspected

“U.S. intelligence agencies traced a recent cyber intrusion into a sensitive infrastructure database to the Chinese government or military cyber warriors, according to U.S. officials. “ Source: Sensitive Army database of U.S. dams compromised; Chinese hackers suspected | Washington Free Beacon

But the fundamental problem is we don’t have the complete list of suspects to monitor. View // Reply // Retweet // Favorite

New Skype malware spreading at 2,000 clicks per hour makes money by using victims’ machines to mine Bitcoins

If I were a criminal, I’d be doing this. “A new piece of malware propagating across Skype has been discovered that tries to convince the recipient to click on a link. What makes this particular threat different is that it drops a Bitcoin miner application to make the malware author money.” Source: New Skype malware […]

This NYT editorial asks how our security goals can be met by collecting all data instead of just suspect data. http://t.co/RRLdoQu4Yq View // Reply // Retweet // Favorite

Cyberattacks Abound Yet Companies Tell SEC Losses Are Few

At some point we need a grand reconciliation. The Intel Community has told us hundreds of billions of dollars are being lost, yet SEC reporting of losses is insignificant. We are our own worst enemy for diplomatic negotiations. “The 27 largest U.S. companies reporting cyber attacks say they sustained no major financial losses, exposing a […]

This NYT editorial asks how our security goals can be met by collecting all data instead of just suspect data. http://t.co/RRLdoQu4Yq View // Reply // Retweet // Favorite

White House announces $100 million in funding to help map the human brain

They should team up with that Russian billionaire that wants to build cyborgs. “The Obama administration has officially announced a long-running research project aimed at mapping the human brain. The Brain Research through Advancing Innovative Neurotechnologies (BRAIN) Initiative will launch with around $100 million of initial funding in 2014, supported by the National Institutes of […]

@MaximWheatley I’d be surprised if anything could save them at this point. View // Reply // Retweet // Favorite

Israel braces for massive cyber-offensive

“Hackers around the world are plotting to strike Israel’s online presence in a coordinated cyber-attack later this week. The effort, known as ‘OpIsrael,’ which is being organized by hacktivist group Anonymous, aims to target the 100 largest websites in the country, especially those of banks, credit card companies, and communications firms. The attack is scheduled […]