Global Guerrillas
Tesla's autopilot went live a couple of weeks ago (it's one of the first car brands to do this). Unlike the autopilots and cruise controls of the past, it's an autonomous system. This means it isn't limited to the capabilities you get when you pop it out of the box. It gets better as you train it and provide it with experience. Tesla's AP
Malicious Linux Commands -
From (This article was originally published in Ubuntu Forums but was removed there. Ubuntuguide feels that knowledge about these risks is more important than any misguided attempts to "protect the public" by hiding their potential dangers or protect the (K)Ubuntu/Linux image. The original article has therefore been re-created (and subsequently edited) here.) ATTENTION: It is worthwhile to have some basic awareness about malicious commands in Linux. Always be cautious when running one of these (or similar) commands (or downloaded scripts) that have been "recommended" as a solution to a problem you may have with your computer.
Cyber security - small firms now in the firing line
Small businesses need to upgrade their awareness of - and abilities in - cyber security if they are to avoid becoming the 'soft underbelly' of the UK's fights against hackers and cyber threats. Media Reports about IT security breaches resulting in data loss and other compromises to corporate data integrity usually only make headline news when big name brands are hit. Resultant concerns about reputational damage have spurred many medium-to-large enterprises (MLEs) into reviewing their cyber-security strategies and redoubling their efforts to ensure that their ICT is properly protected - or at least as protected as possible within the context of their risk assessments and IT budgets. Because of their size a lot of the damage can over time be 'managed'. Disproportionate riches The 'Black Hat' intelligentsia are wise to the fact that start-up SMEs often have data assets of a value disproportionate to their company size on their systems.
Secrecy News (Federation of American Scientists)
The number of chronically homeless persons in the U.S. dropped from more than 120,000 in 2008 to around 84,000 in 2014, a new report from the Congressional Research Service notes. The federal government has undertaken to end chronic homelessness by 2017. “One of the reasons that federal programs have devoted resources to ending chronic homelessness […] Read More The national census in 2020 will be the first to rely primarily on the Internet for collecting census data, thereby creating new avenues for fraud and disruption.
Google Dorks
cache: If you include other words in the query, Google will highlight those words within the cached document. For instance, [cache:www.google.com web] will show the cached content with the word “web” highlighted. This functionality is also accessible by clicking on the “Cached” link on Google’s main results page. The query [cache:] will show the version of the web page that Google has in its cache.
Security Notice
Update: July 10, 2015 @ 8:00 PM EST Thank you for taking the time to read our posts and follow our recommended actions after the recent events. Behind-the-scenes, our response has been ongoing. As we mentioned before, we’ve engaged security experts and firms to help us, and we’re working with the authorities to take the appropriate actions. These events have put our systems to the test, and we’re more secure as a result. Security is an ongoing back-and-forth.
INSA Cyber Intelligence Blog
Contributors All blog contributors are members of the Cyber Intelligence Task Force, though some guest submissions may be solicited by task force members. If you would be interested in becoming a contributor or submitting a guest post, INSA encourages you to consider an individual INSA membership. An annual membership is only $20 for students, and $40 for professionals in government and academia. In addition to becoming a blog contributor, INSA membership includes benefits such as access to INSA events and members-only publications.
Google hacking
Basics[edit] The following search query will locate all websites that have the words "admbook" and "version" in the title of the website. It also checks to ensure that the web page being accessed is a PHP file. intitle:admbook intitle:version filetype:php
Introduction to Cyber Security: More free resources from The Open University
Copyrighted image Copyright: © Oksipix 4 | Dreamstime.com 5 - Cyber Security Photo About the course Do you want to better understand online security and protect your digital life, whether at home or work? Perhaps you would like to be able to recognise the threats that could harm you online and the steps you can take to reduce the chances that they will happen to you?
Password crackers
SecTools.Org: Top 125 Network Security Tools For more than a decade, the Nmap Project has been cataloguing the network security community's favorite tools. In 2011 this site became much more dynamic, offering ratings, reviews, searching, sorting, and a new tool suggestion form . This site allows open source and commercial tools on any platform, except those tools that we maintain (such as the Nmap Security Scanner , Ncat network connector , and Nping packet manipulator ).