csrollyson + security   259

Opinion: We have a common responsibility to fight anti-refugee rhetoric - UNHCR Canada
Powerful story of healing. #Canada host of #Vietnamese #refugee now sponsoring #Syrian refugee. Rare story of empathy for fear-driven suspicion of refugees
19eyz  bullsi  refugee  canada  pointofview  exceptional  story  vietnam  syria  empathy  politics  fear  security  job  host  relationship  economy  community 
5 weeks ago by csrollyson
Early History of the Kryptonite Bicycle Lock
The origins and early history of the Kryptonite lock, up until the K4
cycling  history  lock  security  company  invention  mechanic  design  photo  founder  1987 
10 weeks ago by csrollyson
Survival of the Richest – Future Human – Medium
Sobering must-read: insight into fabulously wealthy hightech investor fears—and what they mean to you and me
hightech  billionaire  fear  security  apocalypse  climate  change  environment  professor  Q3  2018  csrblogcomment  imsight  reflection 
july 2018 by csrollyson
How Israel Caught Russian Hackers Scouring the World for U.S. Secrets - The New York Times
Israeli hacking team discovers Russia hackers’ use of Kaspersky antivirus software to steal USA agency secrets: antivirus software “the perfect tool”
hacker  team  israel  computer  security  antivirus  backdoor  usa  spy  agency  cia  nsa  fbi  russia  2017  q3  espionage  expose 
may 2018 by csrollyson
Don’t let Brexit undermine Ireland’s peace | Hillary Clinton | Opinion | The Guardian
Hillary Clinton remembers the importance of women in nogitiating the Good Friday Agreement
ireland  brexit  border  pointofview  clinton  history  women  politics  poverty  security  civil  war  terror 
april 2018 by csrollyson
Sex workers fear violence as US cracks down on online ads: 'Girls will die' | US news | The Guardian
Legislation shuts websites that let sex workers screen and verify clients, sex work just got much more dangerous
sexuality  prostitution  Q2  2018  news  legislation  craigslist  backpage  social  network  usa  security  website 
april 2018 by csrollyson
Software helps power utilities w #grid #management amid #climate #change disruption #hacking & other risks
electric  power  grid  technology  management  distribution  software  compatibility  security  load  brownout  risk  detroit 
february 2018 by csrollyson
What Went Wrong In Hawaii, Human Error? Nope, Bad Design
Superb: deconstructing faulty design behind the error producing the Hawaii missile panic
hawaii  false  alarm  missile  Q1  2018  design  system  analysis  example  exceptional  howto  human  factors  centered  menu  interface  security 
january 2018 by csrollyson
Moving to HTTPS on WordPress | CSS-Tricks
Some good advice for repairing links after transitioning to https
SSL  wordpress  howto  security  administration 
december 2017 by csrollyson
In-Depth HTTP to HTTPS Migration Guide for WordPress
Excellent step by step guide to transitioning your site to https
wordpress  administration  security  howto  guide  migration 
december 2017 by csrollyson
Russia's Cyberwar on Ukraine Is a Blueprint For What's to Come | WIRED
MUSTread: Cyberspace is not a target, it's a medium to attack critical infrastructure of whole countries
cyber  war  russia  ukraine  usa  story  example  2017  Q2  hack  power  electric  grid  election  attack  security  military  malware  howto  railroad  alabama  Sandworm  poland  government  pension  defense  crashoverride  utility 
october 2017 by csrollyson
Inside an Epic Hotel Room Hacking Spree | WIRED
Fascinating long story of open source #hotel #key #hack
hotel  hospitality  hack  story  key  security  drug  addiction  arizona  jail  open  source 
august 2017 by csrollyson
Myspace Security Flaw Let Anyone Take Over Any Account Just By Knowing Their Birthday | WIRED
How #MySpace #breach enabled easy account
takeovers (check your acct, change pw)
myspace  breach  Q3  2017  hack  security  social  network 
july 2017 by csrollyson
Hackers Came, but the French Were Prepared - The New York Times
How the Macron campaign fought off the #russia election #cyber #attack
france  election  attack  hack  russia  putin  analysis  q2  2017  cyber  macron  phishing  computer  politics  security 
may 2017 by csrollyson
Cyber Terrorism - How Real is the Threat?
Broad introduction to #cyber #war and civilian targets #IoT a major threat
cyber  war  civilian  IoT  target  q2  2016  security  terrorism 
march 2017 by csrollyson
In-Depth Analysis of a Criminal Organization Targeting WordPress Websites
Excellent: brief analysis of criminal org attacking #wordpress sites to sell counterfeit sport apparel
criminal  counterfeit  sport  apparel  analysis  q1  2017  ukraine  china  spam  malware  wordpress  attack  security  host  website  example  ecommerce  copyright 
march 2017 by csrollyson
The principles of trust and evolution of trust: PwC
A management consulting view of #trust in #business emphasizes #hightech, #economy
pwc  trust  management  consulting  economy  politics  q1  2017  hightech  security 
march 2017 by csrollyson
Wired - October 2016 by min-mag.com - issuu
@Google #jigsaw: Tries to protect people against cyber bullying [but nuance is everything, machines need work]
google  digital  twitter  bully  politics  thug  russia  intimidation  internet  cyber  jigsaw  privacy  security 
january 2017 by csrollyson
IoT Platforms: Exploring 10 Dimensions of the IoT Technology Stack
Useful discussion of the components of #IoT #infrastructure and other components
iot  stack  network  application  adoption  howto  security  model  device  integration  2cdo  cdo  2csra  2snr 
september 2016 by csrollyson
Articles | AFP
Not a pretty picture: #HCI/human factors meets #security & systems/policies very hard to use
human  centered  design  security  interview  password  fsi  engineering  social  media  Q3  2016  organization  change  I.T.  policy  hospital  example  workaround  2ghcj  2csrollyson  2snr  2cdo  cco  behavior  economics 
august 2016 by csrollyson
A New Wireless Hack Can Unlock 100 Million Volkswagens | WIRED
Oops! Millions #VW #Skoda #Audi vehicles worldwide exposed
To keyless entry, theft #connected #car
automotive  security  hack  Q3  2016  vw  key  theft  audi  skoda  global  radio  iot  smart  connected  car  snafu  2csra  2ghcj  2cdo  2execguide 
august 2016 by csrollyson
A Letter From G.O.P. National Security Officials Opposing Donald Trump - The New York Times
50 #national #security officials warn: #Trump "would be the most reckless President in American history"
usa  politics  president  election  trump  security  military  q3  2016  republican  state  department  international  global  NATO  2ghcj  2csrollyson 
august 2016 by csrollyson
Israel Cyber Security Showcase - June 28
Superb presos by #Israel startups featuring commercialized military grade software & solutions
israel  security  hack  panel  chicago  2016  Q3  military  technology  commercialization  startup 
july 2016 by csrollyson
Clever Attack Uses the Sound of a Computer’s Fan to Steal Data | WIRED
Research: ingenious hacking method on #military & air-gapped systems cyber security
security  hacker  research  Q2  2016  israel  military  malware  airgap  attack  ciso  cio  2csra  2snr 
june 2016 by csrollyson
What the Mark Zuckerberg Hack Means for the State of Cybersecurity | ZeroFOX
How #password #reuse adds value to #SocialMedia #hacks & dark market pricing; What to do #security
social  media  security  Q2  2016  facebook  twitter  linkedin  pinterest  instagram  news  zuckerberg  password  hack  Enterprise  howto  reuse  engineering  2csrollyson 
june 2016 by csrollyson
Wordfence Forensic Team and Site Cleaning Officially Launches - Wordfence
PSA> Have you been #hacked? Simple service gets you clean, online & prevention #kudos #wordpress (I'm a client)
wordpress  security  hack  service  launch  q2  2016  exceptional  remedy  clean  prevention  2snr  2csra  2csrollyson  malware  server  analysis  code 
june 2016 by csrollyson
Flash From The Past: LinkedIn Hacked | ZeroFOX
PSA: the new #LinkedIn #hack, what you need to know (plz share) #security
linkedin  Q2  2016  hack  security  dark  web  history  2012  password  login  howto  cyber  crime  2execguide  facebook  social  network 
may 2016 by csrollyson
Global Surveillance Law Security Comparison Tool
Useful tool globally compares surveillance law by jurisdiction/type/topic
law  legal  tool  surveillance  global  comparison  website  country  security  government  2ghcj  2csrollyson  2csra  2cdo  2snr 
april 2016 by csrollyson
Panama Papers: Email Hackable via WordPress, Docs Hackable via Drupal - Wordfence
Analysis of #PanamaPapers #hack: How attacker entered #LawFirm #WordPress > #email > #enterprise documents
wordpress  panama  papers  Q2  2016  security  hack  analysis  casestudy  law  professional  services  firm  email  credential  login  plugin  database  drupal  2snr  2csra  2ghcj  2sbs  2cdo 
april 2016 by csrollyson
Responsibility for Vehicle Security and Driver Privacy in the Age of the Connected Car
Analyst @IDC on #privacy, #security, #safety issues with #connected #autonomous car that dampen adoption
connected  car  autonomous  report  security  privacy  idc  Q1  2016  safety  smartphone  assistance  liability  reference  friction  adoption  fear  2cdo  2csra 
april 2016 by csrollyson
How Attackers Gain Access to WordPress Sites - Wordfence
MUSTread if you host #WordPress instances/sites: Attacker stats + how-to checklist for keeping secure
wordpress  security  survey  Statistics  q1  2016  howto  guide  plugin  bruteforce  blog  software  platform  website  malware  phishing  hack  theme  hosting  exceptional  list  2csra  2execguide  2sbs  2eglii  2snr 
march 2016 by csrollyson
Fake Frappa-Photos: The Great Coffee Instagram Scam
Helpful glimpse into #Instagram scams, yep, it's the latest darling of malware distributors #kudos
instagram  q1  2016  scam  malware  security  starbucks  example  photo  social  media  criminal  2execguide 
march 2016 by csrollyson
Apple is right not to break its own encryption! And not just for the obvious reasons...
EXCELLENT: Concise post on the real threat behind well-meaning govt request to break into iPhones #nobackdoor
privacy  security  backdoor  q1  2016  terrorism  government  exceptional  apple  ios  encryption 
february 2016 by csrollyson
Political Correctness Is Dying, Even in France | PJ Media
France minister quits over crackdown on naturalized citizens; shift in poltical correctness?
pointofview  france  immigrant  government  q1  2016  speculation  colony  security  terrorism  politics  guilt  slave  2ghcj 
february 2016 by csrollyson
Social Media Security Blog | ZeroFOX
Great security blog, tons of useful info & reports featuring #social #media, #engineering
security  phishing  malware  blog  howto  cdo  cco  reference  research  global  virus  clickbait  social  media  engineering  2csra 
january 2016 by csrollyson
The battle to bring your own app - CIO
Useful primer on #BYOA (Bring Your Own Application), totally enabled by #cloud
BYOA  CIO  q1  2015  consumerization  enterprise  cloud  IT  policy  governance  security  productivity  2csra  2snr  2sbs 
december 2015 by csrollyson
How the NSA uses behavior analytics to detect threats | CIO
NSA #cloud #security follows #amazon practices, adds proprietary #behavior #analytics to detect exceptions
government  security  cloud  q4  2015  nsa  survelllance  internal  external  behavior  analytics  big  data  clearance  permission  cio  interview  2cdo  2csra 
december 2015 by csrollyson
What You Need to Know to Be Culturally Literate in 2016 | WIRED
Emerging trends in science, design, business, security & culture + links to posts #kudos
report  reference  2015  Q3  science  design  business  security  culture  usa  pioneer 
november 2015 by csrollyson
Ten Ways To Improve The Customer Experience Of Air Travel - Forbes
Horrible #CX flying @united fr Mumbai>NJ + suggests to improve #customer #experience
airline  customer  Experience  Q4  2015  list  india  united  class  food  airport  security  service  experiential  delay  flight  attendant  alienation  travel  2cdo  2ghcj 
october 2015 by csrollyson
Five Best File Encryption Tools
Compares the best encryption software as of Q1 2015
encryption  disk  tool  software  comparison  q1  2015  security 
september 2015 by csrollyson
For discerning hackers, malware is so last year | InfoWorld
Grim & predictable: Hackers #social #engineer into corp systems using legit creds, leave few tracks
security  Enterprise  malware  Q3  2015  social  engineering  intrusion  breach  hack  theft  phish  2ghcj  2csra  2cdo 
september 2015 by csrollyson
Did Lenovo install malware on laptops?
Scandalous: #Lenovo installs malware on machines to serve ads, opens malware exploit
chrome  lenovo  malware  security  policy  Q1  2015  scandal  laptop  web  bank  SSL  compromise  2snr  2sbs 
february 2015 by csrollyson
This Is What Your Face Looks Like to Facebook — Matter — Medium
FACEbook indeed: MUSTsee graphical depiction of how human faces "look" to face recognition algorithms
big  data  facebook  face  recognition  video  Algorithm  photo  composite  security  camera  Platform 
november 2014 by csrollyson
Here’s Why Public Wifi is a Public Health Hazard — Matter — Medium
(White) hacking case study: shows various hacker tools that steal phone, tablet & laptop data, creds, bank acct info, control of machine
wifi  wireless  network  security  hack  exposé  casestudy  amsterdam  cafe  public 
october 2014 by csrollyson
What the Elizabethans Teach us About Cyber-Security - The Analogies Project
Fascinating example of secret messaging and espionage + parallels to cyber security & hacking #Kudos #fb
history  security  england  example  elizabeth  mary  scotland  france  spain  espionage  spy  agent  message  plot  treason  cyber  diligence  training  tudor  government  exceptional 
september 2014 by csrollyson
MUSTsee=>#Cycling design genius: this seat has an integrated lock, secures seat & bike in seconds
cycling  lock  security  innovation  q3  2014  kickstarter  product  accessory  urban 
september 2014 by csrollyson
Seven privacy settings you should change immediately in iOS 8 | ZDNet
SUPERB guide to privacy features in iOS (#Apple) devices+concepts apply to all #mobile devices & mobile #privacy #kudos #fb
ios  iphone  mobile  privacy  security  guide  howto  exceptional  tracking  LBS  advertising  device  password  lock  screen 
september 2014 by csrollyson
Criminal Card Games - NYTimes.com
Complains about increasing #data breaches; offers no solutions
pointofview  data  malware  Enterprise  breach  q3  2014  target  homedepot  tjmaxx  retail  pointofsale  credit  card  i.t.  security  privacy 
september 2014 by csrollyson
Exodus: Why Europe's Jews Are Fleeing Once Again
Report details new European antisemitism: how it manifests thru right shift [frustrated people], Europe jihad & Middle East events
antisemitism  jew  europe  france  belgium  england  greece  attack  security  emigration  germany  berlin  budapest  q3  2014  palestine  israel  terror  jihad  islam  government  history  social  media  music 
august 2014 by csrollyson
« earlier      
per page:    204080120160

related tags

#csrollyson  2cdo  2csra  2csrollyson  2eglii  2execguide  2fb  2ghcj  2li  2sbs  2snr  2tw  4S  11hob  11smb  13mom40  15app9  15usbird  17bern  19eyz  47thstreet  88srsp  111cruc  accessory  ach  acquisition  action  activism  Actualités  addiction  administration  administrator  adobe  adoption  advertising  afghanistan  agency  agent  agreement  aid  air  airbag  airgap  airline  airport  al-qaida  al.Qaida  alabama  alarm  algorithm  alienation  alliance  allwritsact  alternative  amazon  america  amsterdam  analysis  analytics  android  anonymous  antisemitism  Antitheft  antivirus  Apache  apocalypse  app  apparel  apple  application  architecture  Argentina  arizona  asia  assassination  assault  assistance  at&t  attack  attendant  audi  australia  autism  automotive  autonomous  backdoor  backpage  backup  bank  bar  beach  behavior  belgium  berlin  Beta  big  bike  billionaire  biography  biology  bitcoin  blackberry  blackmail  blog  Blogs  bluetooth  bmw  border  botnet  brand  brazil  breach  brexit  bric  brownout  browser  brute  bruteforce  budapest  budget  bug  bullsi  bully  business  BYOA  cafe  california  camera  canada  car  carbon  card  case  casestudy  casino  cco  CD  cdo  cellular  centered  central  CEO  chain  change  channel  chemistry  chicago  child  china  chip  Christmas  chrome  cia  cio  ciso  CISPA  citizen  city  civil  civilian  class  clean  clearance  cleversafe  clickbait  Client  climate  clinic  clinton  cloud  CMO  code  coffee  collaboration  Collapse  college  colony  comcast  commercialization  communications  community  company  comparison  compatibility  competency  competition  composite  compromise  computer  computing  confession  conflict  congress  connected  constitution  consulting  consumer  consumerization  contract  control  convention  cookie  cooperation  copyright  corruption  cost  council  counter  counterfeit  counterterrorism  country  court  crack  craigslist  crashoverride  credential  credit  crime  crimea  criminal  crisis  csrblogcomment  culture  customer  cyber  cycling  dark  data  database  ddos  deal  dealer  debate  debit  decision  defect  defense  deficit  delay  deloitte  democrat  department  design  detroit  development  device  digital  diligence  diplomacy  disclosure  discussion  disk  disruption  dissident  distribution  document  domain  drm  dropbox  drug  drupal  dubai  eavesdrop  ebay  ecommerce  economics  economy  ecosystem  education  election  electric  elizabeth  email  emergency  emigration  empathy  employee  employer  employment  encryption  energy  engineering  england  enom  enterprise  Enterprise2.0  entertainment  entrepreneur  environment  equifax  error  espionage  Ethics  europe  evernote  example  exceptional  exchange  executive  exit  experience  experiential  exploit  explorer  expose  exposé  extension  external  extortion  face  facebook  factors  fake  false  family  fastfood  fbi  fear  feature  feed  finance  Financialservices  firefox  firm  Flash  flaw  flight  foeign  follower  food  force  forces  ford  forgery  foriegn  fortress  foundation  founder  foursquare  france  fraud  free  freemium  friction  fsi  Gadget  gameroom  gawker  generation  geny  genz  geosocial  germany  global  globalization  GM  Gmail  godaddy  google  google+  governance  government  greece  grid  group  groupof8  growth  guardian  guide  guilt  hack  hacker  hardware  hate  hawaii  health  healthcare  help  highschool  hightech  history  hole  home  homedepot  hongkong  hospital  hospitality  host  hostage  hosting  hotel  house  howto  HR  https  human  humor  hungary  i.t.  ibm  idc  identity  identité  ignition  image  immigrant  immigration  immune  imsight  india  infographic  infrastructure  innovation  insight  instagram  insult  insurgency  integration  intellectual  intelligence  interface  interference  internal  international  internet  interview  intimidation  intrusion  invention  ios  iot  ipad  iphone  iran  iraq  ireland  irs  islam  israel  IT  itunes  jail  japan  jew  jigsaw  jihad  job  jobsearch  journalism  journalist  kabul  karzai  kerry  key  keycard  keylogger  kgb  kickstarter  label  laptop  Laptops  lasvegas  latin  launch  law  lawsuit  lawsuite  LBS  leader  leadership  leak  learning  lebanon  legal  legislation  lenovo  liability  liberty  life  light  linkedin  linux  list  load  local  lock  login  losangeles  machine  Macintosh  macosx  macron  mali  mall  malware  management  manager  manila  manufacturing  map  market  marketing  mary  MBP  mckinsey  mcommerce  mechanic  media  medicaid  Medical  medicare  medicine  meeting  mentor  menu  message  microsoft  migration  military  millennial  missile  mitigation  mobile  model  modern  munge  music  myspace  ménace  nation  nations  nationstate  native  nato  navy  negotiation  network  New.York.City  news  newspaper  ngo  Nigeria  nonprofit  nsa  nuclear  obama  offer  ohare  Oil  omni  Onity  online  open  Opensource  ord  organization  outage  palestine  panama  panel  papers  parent  passport  passwird  password  payment  paypal  PC  pdf  pension  pentagon  permission  permissions  persistency  personal  perspective  Petroleum  philippines  phish  phishing  phone  photo  physiology  pinterest  pioneer  piracy  Pivacy  plateforme  platform  plot  plugin  plus  pointofsale  pointofview  poison  poland  police  policy  politician  politics  polonium  poverty  power  prc  precaution  prediction  presentation  president  prevention  Prey  printer  prism  privacy  procurement  product  productivity  professional  professor  program  property  prostitution  pub  public  putin  pwc  q1  q2  q3  q4  q32015  quality  quantum  question  quit  racism  radiation  radio  railroad  rank  ransom  rating  reaction  reality  recognition  record  recovery  Recruiter  recruiting  reference  reflection  refugee  regime  regulation  relationship  remedy  report  republican  research  resources  retail  retirement  reuse  review  rfid  RIM  risk  room  roussef  rss  rural  russia  safari  safety  Sandworm  sarcasm  Satire  saudiarabia  SCADA  scam  scan  scandal  science  scotland  screen  search  secret  security  sensor  Separatism  server  service  services  sex  sexuality  shop  shoplifting  shopping  siri  skoda  skype  slave  smallbusiness  smart  smartphone  smb  smoke  snafu  snapchat  snoop  snowden  social  society  software  Solution  source  southafrica  spain  spam  special  speculation  spoof  sport  spy  ssh  SSL  stack  standard  stanford  starbucks  startup  state  statistics  stevejobs  store  story  strategy  street  student  summer  summit  surveillance  survelllance  survey  Survival  sustain  sustainability  sweden  switzerland  Symantec  symptom  syria  system  sécurité  tablet  tactic  tar  target  tax  TCS  team  technology  teen  Telecom  terminal  Termination  terror  terrorism  tesla  thalium  theft  theme  thought  threat  thug  tjmaxx  tool  totalitarian  tracking  trade  tradeoff  train  training  transformation  transit  transparency  travel  treason  triathlon  trojan  trump  trust  TSA  tudor  tumblr  tunnel  Turkestan  TV  twitter  tyranny  ubiquitous  Uighur  uk  ukraine  Union  united  UNIX  urban  usa  usaf  user  ussr  utility  value  valueprop  vendor  verizon  video  vieprivée  vietnam  violence  virtual  virus  vision  voip  vpn  vulnerability  vw  wallstreet  war  weapon  web  web2.0  Web3.0  webmaster  website  whatsapp  whitepaper  wifi  wikileaks  wikimedia  windows  wireless  Wisconsin  women  wordpress  work  workaround  Worm  xml  yahoo  zip  zuckerberg 

Copy this bookmark: