Tech Grid


Loading...

Hospital calculates return on iPad investment at nine days

“If you’ve been around the medical profession, you have probably seen an explosion of iPads. Doctors I’ve talked to say they are easy to carry around, and the iPad mini in particular seems a great fit for pockets. Meanwhile, companies that write software for medical uses are quickly creating apps that are iPad-friendly.” Source: Hospital […]

@tweethue - What the heck is going on with your web site. Haven’t been able to log in for weeks now. View // Reply // Retweet // Favorite

U.S. to protect private sector from secret software attacks

“The U.S. government will use classified information about software vulnerabilities for the first time to protect companies outside of the military industrial complex, top officials told Reuters this week. Secretary of Homeland Security Janet Napolitano said that a system being developed to scan Internet traffic headed toward critical businesses would block attacks on software programs […]

A Fierce Domain: Conflict in Cyberspace, 1986-2012 http://t.co/FKQa64Yisr View // Reply // Retweet // Favorite

Saudi Telecom Sought U.S. Researcher’s Help in Spying on Mobile Users

“A prominent computer security researcher says he recently rejected a request by a Saudi telecommunications company to help it spy on mobile customers using social networking accounts such as Twitter. The security researcher, who goes by the name Moxie Marlinspike and who recently left Twitter where he worked on that company’s security team, said he […]

A Fierce Domain: Conflict in Cyberspace, 1986-2012 http://t.co/FKQa64Yisr View // Reply // Retweet // Favorite

Homeland Security reportedly struggles to replace departing cybersecurity experts

“As the Pentagon tentatively lays blame for hacking attacks at the feet of the Chinese military, the US Department of Homeland Security grapples with replacing four of its most prominent cybersecurity-focused officials. That includes Deputy Undersecretary for Cybersecurity Mark Weatherford, as well as DHS second-in-command Jane Holl Lute. According to the New York Times, though, […]

RT @0xcharlie: That DHS bulletin is bullshit. Despite the title, it gives no evidence of increasing attacks against mobile devices as ther… View // Reply // Retweet // Favorite

Venture capital gushes into security tech sector

“Venture capitalists continue to toss millions at companies supplying technologies to defend cyber attacks. The latest example: an investment group led by Paladin Capital Group, Ascent Venture Partners and Intel Capital this morning announced $12 million in funding for PerspecSys.” Source:Venture capital gushes into security tech sector

RT @levie: If you bought Yahoo stock the day Marissa started, you're up 70%. View // Reply // Retweet // Favorite

FRED WILSON: Here’s Why I’m Investing In Bitcoin

“The short explanation: ‘We believe that Bitcoin represents something fundamental and powerful, an open and distributed Internet peer to peer protocol for transferring purchasing power. It reminds us of SMTP, HTTP, RSS, and BitTorrent in its architecture and openness.’” Source:FRED WILSON: Here’s Why I’m Investing In Bitcoin – Business Insider

Kill with a borrowed sword - an origins story that infosec, CNA, and Tom Clancy fans might enjoy. http://t.co/9Qp13nmkDS View // Reply // Retweet // Favorite

Cyber-attacks behind possibly record-breaking bank heist

“It may be the largest bank robbery in history: A crime ring is accused of stealing $45 million from financial institutions from around the world. But these criminals weren’t wearing masks or waving guns. They were armed with computers.” Source:Cyber-attacks behind possibly record-breaking bank heist – CBS News

Kill with a borrowed sword - an origins story that infosec, CNA, and Tom Clancy fans might enjoy. http://t.co/9Qp13nmkDS View // Reply // Retweet // Favorite

US accuses China government and military of cyber-spying

“China’s government and military have targeted US government computers as part of a cyber espionage campaign, a US report on China says. Intrusions were focused on collecting intelligence on US diplomatic, economic and defence sectors which could benefit China’s own defence programme, it says.” Source:BBC News – US accuses China government and military of cyber-spying

RT @anildash: Just rename the Unread count in your email inbox to "Followers". Boom. Problem solved. View // Reply // Retweet // Favorite

Government Lab Reveals It Has Operated Quantum Internet For Over Two Years

“A quantum internet capable of sending perfectly secure messages has been running at Los Alamos National Labs for the last two and a half years, say researchers” Source: Government Lab Reveals It Has Operated Quantum Internet For Over Two Years | MIT Technology Review

Lessons for Digital Warriors and Spies from the Cold War - “@ooda: OODA Loop: The Cyber Moscow Rules | http://t.co/gTVR00eg2N View // Reply // Retweet // Favorite

Four years and $100 million later, Bitcoin’s mysterious creator remains anonymous

“Bitcoin, the four-year-old virtual currency that approximates cash on the internet, now powers an economy worth more than $1 billion and is widely admired for the technical sophistication that allows it to operate without a central authority. It got its own ticker on CNBC and inspired a legion of startups. And yet, we still don’t […]

Lessons for Digital Warriors and Spies from the Cold War - “@ooda: OODA Loop: The Cyber Moscow Rules | http://t.co/gTVR00eg2N View // Reply // Retweet // Favorite

Bitcoin Is Not as Secure, Unregulated, or Lucrative as You Might Think

“I’ll be blunt: Money’s gotten buggy. People who don’t realize this might be in high finance — indeed, we’ve gotten very good at moving the revenues of entire generations within a precise number of femtoseconds — but what if you’re just trying to buy a smoothie?” Source: Bitcoin Is Not as Secure, Unregulated, or Lucrative […]

Special forces author with a cyberpunk book collection. @JackMurphyRGR books just went a few notches higher on reading list. View // Reply // Retweet // Favorite

US military approves Android phones for soldiers

“Samsung phones running a secure version of Android have been approved for use by the US Department of Defense. The approval is the start of a process that will see many different types of mobile devices used by US soldiers.” Source:BBC News – US military approves Android phones for soldiers

@Fantom_Planet I knew it! So thank you for your service on this Memorial Day. Glad Dixie Flatline was finally realized outside Googleplex. View // Reply // Retweet // Favorite

Accused Chinese spy charged with downloading porn, not NASA secrets

“Bo Jiang, the Chinese national accused of spying on NASA, was formally charged in a Virginia court this week — not for conducting espionage, but for downloading porn and pirated movies to his computer. A former research contractor at NASA’s Langely Research Center in Hampton, Virginia, Jiang was originally indicted on March 20th, when federal […]

@Fantom_Planet Prove it? Maybe you’re just some ghost construct on the wire. View // Reply // Retweet // Favorite

Dark web drugs site Silk Road knocked offline by hacker

Dark Web DDOS | “An ‘underground’ website famed for selling drugs and other illegal items has been targeted in a cyberattack. It appears the site suffered from a Distributed Denial of Service (DDoS) attack over the course of Tuesday and Wednesday.” Source:BBC News – Dark web drugs site Silk Road knocked offline by hacker

Disadvantages of the Internet of Things. Hue web site down, so I can’t shut off my lights. View // Reply // Retweet // Favorite

Dutch police may get right to hack in cyber crime fight

“The Dutch government has announced plans to give police far greater powers to fight cybercrime. Under a new bill, investigators would be able to hack into computers, install spyware, read emails and destroy files.” Source:BBC News – Dutch police may get right to hack in cyber crime fight

Disadvantages of the Internet of Things. Hue web site down, so I can’t shut off my lights. View // Reply // Retweet // Favorite

DHS: ‘OpUSA’ May Be More Bark Than Bite

“The U.S. Department of Homeland Security is warning that a group of mostly Middle East- and North Africa-based criminal hackers are preparing to launch a cyber attack campaign next week known as ‘OpUSA’ against websites of high-profile US government agencies, financial institutions, and commercial entities. But security experts remain undecided on whether this latest round […]

RT @BlackHatEvents: !!! 25 brand new Briefings sessions just announced for #BlackHat USA !!! Come check out all the goodness! http://t.c View // Reply // Retweet // Favorite

OpUSA Threatens Banks, Government on May 7

“The group goes on to say U.S. financial institutions will be targeted for attack. ‘Do not take this as a warning,’ the post states. ‘You cannot stop the Internet hate machine from doxes, DNS attacks, defaces, redirects, DDoS attacks, database leaks and admin takeovers.’ The White House website and eight other federal government sites, plus […]

@EamonJavers Just the double Irish, Dutch, BVI Mocha skim latte with a $ in the milk froth. View // Reply // Retweet // Favorite

China Cyberspies Outwit U.S. Stealing Military Secrets

At what point are shareholders able to sue for negligence? That question has been haunting the cyber domain for a decade… “QinetiQ’s espionage expertise didn’t keep Chinese cyber- spies from outwitting the company. In a three-year operation, hackers linked to China’s military infiltrated QinetiQ’s computers and compromised most if not all of the company’s research. […]

RT @EFF: Here are 5 overlooked lessons from the AP subpoenas controversy and other leak investigations: https://t.co/udTSoVZgBT View // Reply // Retweet // Favorite

How to use Tasker

“We are Android users, and we are a pampered bunch. Android is such a flexible mobile OS that our Android devices often act as our personal genies granting our daily mobile wishes, making some of our mobile dreams come true. And, powerful as OEM-provided genies already are, a task control and task automation app such […]

@AlanLLee You are welcome. Just pre-ordered the book. View // Reply // Retweet // Favorite

Sensitive Army database of U.S. dams compromised; Chinese hackers suspected

“U.S. intelligence agencies traced a recent cyber intrusion into a sensitive infrastructure database to the Chinese government or military cyber warriors, according to U.S. officials. “ Source: Sensitive Army database of U.S. dams compromised; Chinese hackers suspected | Washington Free Beacon

RT @counterthreat: Time is getting short to sign up for the next Mirror Image, June 16-21, 2013 in Utah. View // Reply // Retweet // Favorite

New Skype malware spreading at 2,000 clicks per hour makes money by using victims’ machines to mine Bitcoins

If I were a criminal, I’d be doing this. “A new piece of malware propagating across Skype has been discovered that tries to convince the recipient to click on a link. What makes this particular threat different is that it drops a Bitcoin miner application to make the malware author money.” Source: New Skype malware […]

RT @BradThor: The idea that low-level #IRS bureaucrats decided themselves to target the #TeaParty, is like believing #Benghazi was in react… View // Reply // Retweet // Favorite

Cyberattacks Abound Yet Companies Tell SEC Losses Are Few

At some point we need a grand reconciliation. The Intel Community has told us hundreds of billions of dollars are being lost, yet SEC reporting of losses is insignificant. We are our own worst enemy for diplomatic negotiations. “The 27 largest U.S. companies reporting cyber attacks say they sustained no major financial losses, exposing a […]

RT @briankrebs: It's official: @lancejssc and I will be presenting together at Black Hat in Vegas this year! Talk will be on booter industry View // Reply // Retweet // Favorite

White House announces $100 million in funding to help map the human brain

They should team up with that Russian billionaire that wants to build cyborgs. “The Obama administration has officially announced a long-running research project aimed at mapping the human brain. The Brain Research through Advancing Innovative Neurotechnologies (BRAIN) Initiative will launch with around $100 million of initial funding in 2014, supported by the National Institutes of […]

RT @nntaleb: For bitcoin to make it it needs to be banned by a few governments and critiqued by policy makers. Otherwise it will fade. #Ant… View // Reply // Retweet // Favorite

Israel braces for massive cyber-offensive

“Hackers around the world are plotting to strike Israel’s online presence in a coordinated cyber-attack later this week. The effort, known as ‘OpIsrael,’ which is being organized by hacktivist group Anonymous, aims to target the 100 largest websites in the country, especially those of banks, credit card companies, and communications firms. The attack is scheduled […]

Contrast with last tweet “@ooda: Department of Homeland Security Shuts Down Dwolla Payments to and From Mt. Gox | http://t.co/JQyFHN1hCN View // Reply // Retweet // Favorite

Russian Billionaire Wants to Create Cyborgs for Real

“As Digital Trends describes, the ultimate goal is to be able to transfer a person’s mind or consciousness from a living brain into a machine with that person’s personality and memories intact. Freed of physical form, the person would exist in a network similar to the Internet and be able to travel at the speed […]