asterisk2a + it   56

Couple scammed out of £57,000 fear being homeless at Christmas | Money | The Guardian
doesn't even need social engineering. just very targeted, knowing their business, hacking attack (eg phishing through password change see podesta) and remain undetected for a long time just listening in on the email inbox. and jumping in when the situation comes. // in the end encryption didn't help. would help if there were a 2-auth process for those transactions (business ops, business it security) if you cant be 100% sure that your employees fall for phishing, impersonation, or social engineering (there have been reports of secretaries and assistants falling for social engineering to transfer large amounts for bogus but believable business transactions)
phishing  fraud  scam  cyber  IT  security  private  end  user  social  engineering  crime  impersonation  identity 
november 2017 by asterisk2a
Israeli spies 'watched Russian agents breach Kaspersky software' - BBC News
Israeli spies looked on as Russian hackers breached Kaspersky cyber-security software two years ago, US media report.
The Russians were allegedly attempting to gather data on US intelligence programs, according to the New York Times and Washington Post.
Israeli agents made the discovery after breaching the software themselves.
Kaspersky has said it was neither involved in nor aware of the situation and denies collusion with authorities.
Last month, the US government decided to stop using the Russian firm's software on its computers.
The Israelis are said to have notified the US, which led to the ban on Kaspersky programs.
coldwar  cyber  cold  war  hacking  coldwar20  cyberwar  leak  Wikileaks  Israel  Iran  Russia  USA  European  Union  cable  EU  Germany  spying  Lauschangriff  Angela  Merkel  AngelaMerkel  Security  IT  economic  damage 
october 2017 by asterisk2a
Physikalische Grenze der Chip-Entwicklung: Kleiner geht's nicht
"Das mooresche Gesetz ist am Ende", sagt Thilo Maurer. Er erforscht Halbleitertechnologie für IBM. "Es gibt physikalische Grenzen, an denen wir nicht rütteln können." Auch das Fachmagazin "Nature" warnte im Februar von dem nahen Ende des Schrumpfprinzips. Der aktuelle Intel-Chef Brian Krzanich verkündete schon letztes Jahr, dass sich die Entwicklungsdauer von einer Generation von Intel-Mikroprozessoren zur nächsten auf zweieinhalb Jahre verlängern werde. Der von Moore definierte Zeitraum von zwei Jahren war nicht mehr haltbar - auch wenn Krzanich rasch betonte, es könne sich auch nur um eine temporäre Entwicklungsdelle handeln. Das aber erscheint zunehmend unwahrscheinlich. [...] Die Leiterbahnen von heute sind nur noch ein paar Atome breit. Bei solchen winzigen Größen angelangt, kommen die Gesetze der Quantenmechanik ins Spiel, [ 7-5mm & Toshiba said 15mm nand chip not smaller - for 2D. Now R&D focuses on 3D, hight of chip architecture. ]
Moore's  Law  IT  Industry  R&D 
march 2016 by asterisk2a
As unicorn startups send customer service gigs to the hinterland, is Silicon Valley exporting its prosperity, or just dead-end jobs?
In the end, only a couple of the San Francisco Lyft staffers decided to go to Nashville. Some scrambled to find new jobs in the company, and the rest got severance and left. Six months later, two people I talked to are still looking for jobs, in a city that boasts a 3.4 percent unemployment rate. “I feel a little burned by this experience,” said one. “There’s just this understanding that if you work for customer service in the tech world you’re not valued. Those are soft skills, and associated with women, they’re not super valued.” [...] With their skills deemed better suited to Nashville, Lyft’s workers can’t help but internalize another message about whether they belong in increasingly Darwinian San Francisco. “It doesn’t make any fucking sense to live in one of the most expensive areas in the country and work in nonprofit development,” one told me.
Another customer service worker I’d talked to from a big software company decided that if she wanted to stick around the Bay Area, it was time to teach herself to code.
Service  Sector  Jobs  low  pay  working  poor  low  income  precarious  work  squeezed  middle  class  job  creation  job  market  job  insecurity  job  security  Silicon  Valley  part-time  Contractor  outsourcing  self-employment  customer  runway  operating  margin  cost  center  cost  of  living  standard  of  living  costcutting  tax  credit  Precariat  precarious  employment  career  ladder  career  advice  IT  Industry  labour  market 
march 2016 by asterisk2a
Cyber Security Expert Mikko Hyppönen Worries About Extremists With Computers | Re/code
Hypponen said hackers are moving from Europe to Syria, where officials worry they could launch attacks that shut down computer networks or damage critical infrastructure. He said the threat is so serious, a U.S. drone strike this summer targeted a British hacker who, U.S. and European officials said, had become a top cyber expert for the Islamic State in Syria. Authorities believe the hacker led the CyberCaliphate, a hacking group which in January attacked a Twitter account belonging to the Pentagon.
cyber  war  on  Terror  ISIS  cyber  security  IT  internet  security  password  security  online  security  energy  security  Smart  Grid  infrastructure 
october 2015 by asterisk2a
Hacked! - Tech Weekly podcast by Guardian Tech Weekly
book - @War: The Rise of the Military-Internet Complex3 Nov 2015 by Shane Harris // Doomsday Scenarios: breaking the internet, bringing down electricity grid, transportation/infrastructure, nuclear plant, manipulating digital money vault/value exchanges, << low probability - high impact >> distrust/lost trust.
cyber  war  industrial  espionage  scam  phishing  scam  corporate  espionage  cyber  espionage  USA  UK  Cina  Russia  Israel  Five  Eyes  NSA  GCHQ  Surveillance-Industrial  Complex  surveillance  state  military–industrial  foreign  affairs  Hegemony  foreign  policy  Intelligence  foreign  relations  book  Smart  Grid  encryption  Cryptopocalypse  cryptography  cyber  security  IT  password  security  energy  security 
october 2015 by asterisk2a
Cyber attack warning after millions stolen from UK bank accounts | Technology | The Guardian
The NCA added: “Computers become infected with Dridex malware when users receive and open documents in seemingly legitimate emails. The NCA assesses there could be thousands of infected computers in the UK, the majority being Windows users.”
phishing  phishing  scam  cyber  attack  cyber  security  IT 
october 2015 by asterisk2a
U.S. developing sanctions against China over cyberthefts - The Washington Post
[ double standard. probably know that they will be outed come time to have e-mailed trade secrets of other nations big companies to their own national companies, even if it is just for infrastructure or defense contract bids ] The White House is getting ready to issue "unprecedented economic sanctions" against Chinese companies and individuals "who have benefited from their government’s cybertheft of valuable U.S. trade secrets," says the Washington Post. But the Post doesn't explain what those sanctions would be, or why the U.S. is going after individual targets instead of the Chinese government itself. One thing that is clear: Chinese president Xi Jinping is scheduled to visit the U.S. next month.
cyber  war  China  NSA  GCHQ  Five  Eyes  IT  Security  Patent  trade  secret  Europe  Germany  corporate  espionage  cyber  espionage  industrial  espionage  presidency  barackobama  Edward  Snowden  Wikileaks  Julian  Assange  bulk  data  collection  FISA  Court  FISAAA  national  interest  Nationalism  protectionism  Security  False  Flag  on  Terror  smoke  mirror  smoking  gun  Russia  Israel  USA  UK  Courts  Surveillance-Industrial  Complex  surveillance  state  Orwellian  Internet  Privacy  Privacy  military–industrial  Hacking  cyber  attack  cyber  crime  cyber 
september 2015 by asterisk2a
Markus Beckedahl, Andre Meister: Kontrolle ist gut. #Landesverrat ist besser. - YouTube
// Statement von Georg Restle zu der Anzeige wegen Landesverrat gegen die Journalisten Markus Beckedahl und Andre Meister von Netzpolitik.org. - youtu.be/bLuu4ekznT8 // Verschwörung gegen die Freiheit (Doku, ZDF 2014) - youtu.be/HoTW5c2MEYQ // &! O-Ton GroKo - youtu.be/y9pRz5KQ6vo - Eiertanz: Viele, viele naive Fragen zum BND-Skandal // &! http://www.dctp.tv/filme/markus-beckedahl-netzpolitik-org/
netzpolitik  Pressefreiheit  Lügenpresse  Angela  Merkel  GroKo  Surveillance-Industrial  Complex  military–industrial  NSA  GCHQ  Five  Eyes  surveillance  state  Orwellian  BND  corporate  espionage  industrial  espionage  cyber  espionage  cyber  war  USA  Europe  UK  Germany  Vorratsdatenspeicherung  Dataretention  Snoopers  Charter  bulk  data  collection  FISA  Court  FISAAA  Patriot  Act  presidency  barackobama  David  Cameron  encryption  Cryptopocalypse  cryptography  False  Flag  on  Terror  IT  Security  cyber  netzpolitik.org  freedom  of  press  of  Information  Act  National  Security  interest  on  Drugs  organised  crime  cyber  crime  investigative  journalism  journalismus  journalism  Whistleblower  Career  Politicians  No  Representation  social  contract  political  theory  Internet  Privacy  Privacy  Meta  metadata  Big  Wikileaks  Edward  Snowden  Julian  Assange  Secret  Courts  Glenn  Greenwald 
august 2015 by asterisk2a
Erpressung durch Cyberattacken: Angriffsziel Industrieanlage - SPIEGEL ONLINE
Hacker richten mit Cyberangriffen nach Schätzungen von Experten Schäden von Hunderten Millionen Euro an. Sichtbar werden die Attacken auf die Industrie aber selten: Den Tätern geht es um Erpressung.
IT  Security  cyber  war  corporate  espionage  industrial  espionage  cyber  espionage  national  interest  corporate  state  Surveillance-Industrial  Complex  surveillance  state  NSA  GCHQ  military–industrial  Europe  UK  USA  foreign  affairs  China  Russia  Israel  foreign  policy  Intelligence  Intelligence  Agency  foreign  relations 
august 2015 by asterisk2a
Foreign Affairs Expert Leslie Gelb: Masters in Business (Audio) by Bloomberg View | Free Listening on SoundCloud
Leslie Gelb, wrote Pentagon Papers. Which Ellsberg leaked (Whistleblower) - bit.ly/1Lgsq2D // Back in the days, national interests and force was expressed in war and seldomly in economic embargos (Napoleon tried that against British Empire) and there were economic skirmishes (oil/diesel, rubber) in the run-up to WW2 and the first couple of months before USA officially entered WW2. TODAY! National interests are only expressed in economic terms with trade embargoes, tariffs, trade deals and protectionism. Only little military skirmishes here and there and when, the nation tries to hide them from the publics eye (through rouge nations for hire army/special forces, a nations secret services supplying the underground arms trade that doesn't show up on its balance sheet or one of their nations manufacturers. West excluded Russia from recent G8 summit in Munich and made it G7. Russia/Europe/USA playing game of chicken of economic escalation. Or using corporate actors & new cyber war!
Russia  protectionism  embargo  Iran  nuclear  power  USA  Latin  America  corporate  state  national  interest  Nationalism  Europe  UK  cyber  crime  cyber  war  NSA  GCHQ  Surveillance-Industrial  Complex  surveillance  state  Orwellian  corporate  espionage  industrial  espionage  cyber  espionage  Crimea  Crimea  Crisis  presidency  barackobama  vladimirputin  Putin  China  Asia  Pakistan  Drone  Strike  Drone  Warfare  Africa  history  foreign  affairs  foreign  policy  foreign  relations  Afghanistan  Irak  Israel  Gaza-Israel  conflict  Germany  Ukraine  Ukrain  Angela  Merkel  Pentagon  CIA  MI6  Japan  SouthChinaSea  South  Korea  military–industrial  military  intervention  IT  Security  collateral  damage  international  relations  Security  False  Flag  on  Terror  ISIS  al-Qaida  book  G7  G8  United  Nations  Security  Council  NATO  OPEC  Oil  price  Saudi  Arabia  Arab  League  Cuba  Vietnam  WMD  smoking  gun  Syria  Syrien 
august 2015 by asterisk2a
Tech Firm Ubiquiti Suffers $46M Cyberheist — Krebs on Security
via bit.ly/1J55suT // Networking firm Ubiquiti Networks Inc. disclosed this week that cyber thieves recently stole $46.7 million using an increasingly common scam in which crooks spoof communications from executives at the victim firm in a bid to initiate unauthorized international wire transfers. [...] Known variously as “CEO fraud,” and the “business email compromise,” the swindle that hit Ubiquiti is a sophisticated and increasingly common one targeting businesses working with foreign suppliers and/or businesses that regularly perform wire transfer payments. In January 2015, the FBI warned that cyber thieves stole nearly $215 million from businesses in the previous 14 months through such scams, which start when crooks spoof or hijack the email accounts of business executives or employees.
phishing  phishing  scam  spoofing  cyber  security  IT  internet  security  online  security 
august 2015 by asterisk2a
Harvest of Facebook user data prompts calls for tighter privacy settings | Technology | The Guardian
[ It's not free, you are not the customer, you are the ware, your experience and your date is not their first priority - except keeping you on facebook scrolling, consuming, clicking ... ads. ] Software developer exploits loophole to obtain thousands of names, pictures and locations of users who link their mobile phone number with account
Facebook  API  encryption  TOS  Big  Data  Internet  Privacy  Privacy  user  IT  Security  abuse  abuse  of  power 
august 2015 by asterisk2a
Android: Künftig monatliche Updates wegen Stagefright - SPIEGEL ONLINE
Der Grund für den Unterschied: Apple kann Software-Updates direkt an die Nutzer seiner Geräte verteilen, Google ist auf die Handyhersteller angewiesen. Diese müssen Updates an das jeweilige Gerät anpassen und testen, was meist länger dauert. Das Resultat: Obwohl Zimperium die Sicherheitslücke schon im April an Google gemeldet, Google ein Update entwickelt und an die Hersteller geschickt hat, hatte laut der Wirtschaftszeitung "Forbes" bis Ende Juli hat noch kein einziger Hardware-Hersteller die Sicherheitslücke geschlossen.
iOS  ecosystem  Android  fragmentation  Google  IT  Security  exploit  Apple  philosophy  architecture  Open  Source 
august 2015 by asterisk2a
Russia will fork Sailfish OS to shut out pesky Western spooks
Paranoia over NSA tampering spurs de-Westernisation drive // well only the Paranoid survive. [...] Russia’s Minister of Communications and Mass Media, Nikolai Nikiforov, has taken part in talks to form a consortium that will aid Russia in developing a custom mobile OS, reportedly a forked version of Jolla’s Sailfish OS, to lessen its dependence on Western technology. Nikiforov held a working meeting last week with the leadership of Hong Kong-based Sailfish Holdings, developer of the quietly admired Sailfish OS. Alongside other participants, the parties involved discussed the use of open-source software in the public and private sectors, taking into account technical, economic and political factors, the latter of which is expected to include United States’ interference with exported technologies.
Open  Source  Russia  corporate  espionage  industrial  espionage  cyber  espionage  NSA  Five  Eyes  Nationalism  barackobama  presidency  Europe  GCHQ  UK  Foreign  Intelligence  affairs  relations  2015  cyber  war  encryption  Angela  Merkel  Leadership  Career  Politicians  No  Representation  human  rights  Privacy  Internet  Privacy  Cryptopocalypse  cryptography  national  interest  False  Flag  on  Terror  on  Drugs  organised  crime  backdoors  backdoor  IT  Security  exploit  Germany  FRance  surveillance  Surveillance-Industrial  Complex  surveillance  state  Orwellian  corporate  state  manufactured  consent  Cold  propaganda  populism  Pressefreiheit  Lügenpresse  Vorratsdatenspeicherung  Snoopers  Charter  investigative  journalism  Whistleblower  tracking  bulk  data  collection  democracy  freedom  freedom  of  press  Secret  Courts  FISA  Court  FISAAA  BND  military–industrial 
august 2015 by asterisk2a
Android-Smartphones: 950 Millionen Geräte durch Sicherheitslücke bedroht - SPIEGEL ONLINE
bit.ly/1S80wJW "Built on tens of gigabytes of source code from the Android Open Source Project (AOSP), the leading smartphone operating system carries a scary code in its heart. Named Stagefright, it is a media library that processes several popular media formats. Since media processing is often time-sensitive, the library is implemented in native code (C++) that is more prone to memory corruption than memory-safe languages like Java. [...] Unlike spear-phishing, where the victim needs to open a PDF file or a link sent by the attacker, this vulnerability can be triggered while you sleep. Before you wake up, the attacker will remove any signs of the device being compromised and you will continue your day as usual – with a trojaned phone. // Opportunism, publishing exploit/vulnerability to public without giving Google & Co enough time to fix it. Just to make money ... "[we can protect protect] enterprise customers from Stagefright vulnerability."
Android  IT  Security  Google  exploit  memory  corruption  phishing  ethical  machine  Mozilla  Mozilla  Foundation 
july 2015 by asterisk2a
LinkedIn and Spiceworks Profiles are the Modern Resume - Daily Blob - March 3, 2014 - YouTube
No Writing of Resume/CV. Just Cover letter with "Find me on:" Github, LinkedIn and Spiceworks Profile. And maybe Twitter too. And personal website/blog (professional & personal). Stackexchange? << Places of your professional online persona.
Online  Persona  Profile  Social  Network  career  advice  career  IT  Professional  GitHub  linkedin  programmers  Developer 
july 2015 by asterisk2a
Sicherheitshysterie nach britischem Urteil gegen Vorratsdatenspeicherung: „Tausende Leben in Gefahr“ | netzpolitik.org
Die Notwendigkeit der technisierten Überwachung wird gar nicht mehr hinterfragt, die gerichtlichen Backpfeifen an die britische Regierung stattdessen in grotesker Weise kommentiert. So titelt beispielhaft der Telegraph in Anlehnung an eine Aussage der britischen Innenministerin Theresa May: Thousands of lives at risk after High Court rules snooping powers unlawful. // theguardian.com/world/surveillance - bit.ly/1fa4mQP // &! bit.ly/1CMnrUg &! bit.ly/1DoKqiZ - Why appeasing governments over encryption will never work. David Cameron & the director of the FBI have both asked for ‘backdoors’ to be included in encryption software [...] Keys Under Doormats: Mandating insecurity by requiring government access to all data and communications, is worth reading in full. It concludes that proposals for backdoors are “unworkable in practice, raise enormous legal and ethical questions, and would undo progress on security at a time when internet vulnerabilities are causing extreme economic harm”.
Snoopers  Charter  Vorratsdatenspeicherung  DRIPA  data  retention  law  bulk  data  collection  propaganda  surveillance  surveillance  state  Orwellian  False  Flag  War  on  Terror  ISIS  ISIL  Surveillance-Industrial  Complex  military–industrial  UK  GCHQ  MI5  Met  Police  abuse  of  power  transparency  accountability  democracy  Secret  Courts  Five  Eyes  British  Empire  populism  Lügenpresse  manufactured  consent  corporate  state  NSA  Career  Politicians  Tony  Blair  presidency  barackobama  David  Cameron  society  Gesellschaft  European  Union  Internet  Privacy  Privacy  human  rights  self-censorship  encryption  Cryptopocalypse  backdoors  backdoor  FBI  MI6  cyber  corporate  espionage  industrial  espionage  cyber  espionage  Intelligence  Agency  Foreign  Intelligence  national  interest  protectionism  economic  damage  IT  Security  policy  folly  policy  error 
july 2015 by asterisk2a
NSA und GCHQ spähen Anti-Viren-Hersteller wie Kaspersky aus - SPIEGEL ONLINE
[ Washington, even Obama doesn't know about the true extent. NSA, Five Eyes, for profit military and intelligence complex is an entity that is OVER Washington. Because telling Washington would be a National Security risk. ] Frisch veröffentlichte Snowden-Unterlagen zeigen, wie der amerikanische und der britische Geheimdienst gezielt Anti-Viren-Software austricksen und deren Hersteller ausforschen. In den Dokumenten taucht auch ein deutscher Anbieter auf. [...] Der britische Geheimdienst GCHQ und die amerikanische NSA haben gezielt Anti-Viren-Hersteller ausspioniert. Ziel war es offenbar, Wege zu finden, die Virenschutzprogramme auszutricksen: Die Schadsoftware der Geheimdienste sollte von den Programmen unentdeckt bleiben.
NSA  GCHQ  Five  Eyes  surveillance  state  Cryptopocalypse  encryption  backdoors  backdoor  TrueCrypt  Edward  Snowden  Reverse  Engineering  FISA  Court  Secret  Courts  UK  USA  presidency  barackobama  Stasi  2.0  Imperialism  False  Flag  corporate  espionage  industrial  espionage  cyber  espionage  cyber  war  IT  Security  cyber  crime  cyber  cyber  attack  Privacy  Internet  Privacy  Antivirus  Orwellian  Empire  vested  interest  interest  groups  national  interest  military–industrial  complex  Intelligence  Agency  Foreign  Intelligence  Cold  relations  policy  affairs  Wikileaks  cablegate  Career  Politicians  No  Representation  Totalitarian  Despotism  oligarchy  oversight  transparency  democracy  Washington  Security 
june 2015 by asterisk2a
US targets 'insider trading' hackers - BBC News
He said that the SEC had asked for information on the tactics of the hackers - who often target employees with phishing emails that take them to fake websites that steal passwords and other information. The SEC has not confirmed who is involved in its investigation.
phishing  phishing  scam  cyber  war  cyber  espionage  corporate  espionage  industrial  espionage  SEC  IT  Security 
june 2015 by asterisk2a
Cyberangriff auf Bundestag: Offenbar auch Rechner von Regierungsmitgliedern betroffen - SPIEGEL ONLINE
[ if they were able to install a trojan/malware/bot - it is most likely to be the case of highly customized targeted phishing attack on peoples email address. could be gov backed. most likely (Israel, China, USA, UK, Russia, ...) New/customized, not recognizable by existing signatures known - thus antivirus useless, only recognizable by looking at logs and co. ] Fachleute halten es sogar für möglich, dass weite Teile der Bundestags-IT komplett neu konfiguriert werden müssen. [...] Sicherheitshalber wurden Ende vergangener Woche Teile des Bundestags-Systems zeitweise heruntergefahren. Darunter fielen offenbar auch Laufwerke des Parlamentarischen Untersuchungsausschusses zur Aufklärung der BND/NSA-Spionageaffäre. <<< [ Frage fuer die BPK wie kompetent sind Bundestagsabgeordnete? Sicherheitstraining? ] // 1 Tag spaeter bit.ly/1IPJmK7 Ermittler vermuten Geheimdienst hinter Cyberangriff &! bit.ly/1LcaCBI Die Bundesregierung zerstört aktiv [...] vertrauen. &! tcrn.ch/1R4xrLu bit.ly/1LpTngO
cyber  war  corporate  espionage  industrial  espionage  cyber  espionage  cyber  crime  cyber  security  cyber  attack  Germany  DAU  phishing  IT  password  security  GroKo  Career  Politicians  Angela  Merkel  trust  confidence  No  Representation  Vorratsdatenspeicherung  surveillance  state  Orwellian  BND  Internet  Privacy  Privacy  corruption  abuse  of  power  apathy  Protest  Kultur  short-term  thinking  short-term  view 
may 2015 by asterisk2a
Law changed to allow GCHQ hacking ... just as GCHQ hauled into court for hacking • The Register
[ unaccountable, free for all to hack anything that is in the domestic interest, can be corporate intelligence, trade secrets, patents, corporate documents & communications; Russia, China, Germany, Brazil, India. The NEW COLD WAR. see also 2015 BND affair with selectors. ] Government legislation to exempt GCHQ from prosecution on charges of illegal hacking has been passed and come into effect – apparently torpedoing an ongoing claim against the surveillance agency being heard by the Investigatory Powers Tribunal. Last July, a coalition of internet service providers and international organisations teamed up with Privacy International to take legal action against GCHQ. Their claim, which arrived in court today, has been hobbled by what the privacy warriors said was the revelation that the government had quietly ushered through legislation amending the Computer Misuse Act to exempt GCHQ and law enforcement from prosecution, and did so while the case was ongoing.
cyber  war  cyber  attack  GCHQ  on  Terror  organised  crime  on  Drugs  accountability  surveillance  state  Orwellian  2015  corporate  espionage  industrial  espionage  cyber  espionage  NSA  USA  UK  presidency  barackobama  David  Cameron  encryption  Europe  trade  secret  corporate  intelligence  Airbus  Five  Eyes  Agency  domestic  interest  abuse  of  power  corruption  FISA  Court  FISAAA  Patriot  Act  Act  Courts  Cold  Cold  2.0  BND  selector  Wall  Street  Internet  Privacy  IT  Security  geopolitics  Foreign  National  Security  globalisation  globalization 
may 2015 by asterisk2a
Bargeld: Peter Bofinger will Münzen und Scheine abschaffen - SPIEGEL ONLINE
http://www.spiegel.de/wirtschaft/soziales/bargeld-abschaffen-eine-schraege-debatte-muenchau-kolumne-a-1034256.html // Geld hat exakt drei Funktionen - juristisch wie ökonomisch. Es ist Zahlungsmittel, Zahlungseinheit und ein Mittel zur Wertaufbewahrung. Bei den ersten zwei Funktionen gibt es keinen Unterschied zwischen Bargeld und E-Geld, zumindest keinen prinzipiellen. Ob Sie mit E-Karte bezahlen oder mit Euroscheinen: Ihr Zahlungsmittel ist akzeptiert und die Einheit ist immer der Euro. Wer also von geprägter Freiheit spricht, kann logischerweise nur die dritte Funktion des Geldes meinen, die Wertaufbewahrung. [...] Scheine sind kein Geld, nur ein Versprechen [trust & confidence] // would allow to tax bank and asset accounts in a deposit haircut move like in Cyprus, would be easier to monitor ie spending (anonymized and aggregated) and cash outflows/capital flight &! http://www.bbc.co.uk/news/business-32778196
fiscal  policy  cash  Bargeld  society  economic  history  deposit  haircut  fiat  currency  fiat  money  trustagent  trust  confidence  currency  debasement  Debt  Super  Cycle  monetisation  monetization  ECB  centralbanks  cyber  war  cyber  crime  cyber  security  IT 
may 2015 by asterisk2a
Kommentar: Warum die aktuellen Erkenntnisse über das Versagen des Kanzleramtes bei BND-Aufsicht schon lange abzusehen waren | netzpolitik.org
"Beihilfe." // &! Eiertanz: Viele, viele naive Fragen zum BND-Skandal - youtu.be/y9pRz5KQ6vo // &! Wirtschaftsspionage für Amerika? "Das Ganze ist ein Riesenskandal", sagt Hans-Christian Ströbele (Grüne) zur BND-Spitzelaffäre. - on.fb.me/1GznzV8 profiling of EU politicians, policy makers as well as EADS, EuroCopter and other stuff, shows that War on Terror, Drugs, and organised crime as a pretence is wrong to a certain extent, it shows that power corrupts and absolute power corrupts absolutely. // &! Der BND-Skandal - Worum geht's eigentlich? youtu.be/pcGzfv-Fndc // &! on.fb.me/1POvdPJ - Was ist mit der Bundeskanzlerin? Wann spricht sie zum BND-Skandal? // German intelligence agency knew NSA was spying on European leaders as early as 2008 - bit.ly/1DEvH3h "It was too worried about the NSA retaliating by limiting the information it shares." Stockholm Syndrome. No Leadership. Only Career Politicians.
surveillance  state  Orwellian  NSA  BND  cyber  espionage  corporate  espionage  industrial  espionage  Five  Eyes  GCHQ  Angela  Merkel  barackobama  presidency  GroKo  Career  Politicians  transparency  democracy  No  Representation  FBI  Torture  accountability  profiling  military–industrial  complex  cyber  crime  cyber  security  cyber  war  Foreign  Intelligence  policy  affairs  USA  World  Police  relations  corruption  abuse  of  power  Edward  Snowden  Privacy  Internet  Privacy  encryption  IT  National  security  cybersecurity  online  security 
april 2015 by asterisk2a
Aaron Levie (Box): The First $250m in ARR - YouTube
IPO growth-stage party round, Investors work understanding SAAS business, but do not understand it 110%. "Our growth is dependent on the level of investment (sales, marketing) we put into, we have no head ceiling. [...] Investors go, after explaining for 30 minutes, from IBM cash flow investors to a16z type doubling down [invest more in user acquisition due to lock-in and LTV for SAAS. [...] Box's disruption playbook via lots of layers/stacks (integrated, worry free) for enterprise; loss prevention, security, search, clouds storage, audit & compliance (ie HIPPA). [...] Marrying a frictionless consumer experience best practices (phablet, smart phone, tablet, desktop) with Enterprise 2.0/SAAS feature set, enabling lift of productivity and connectedness. Turning themselves into a strategic layer for Fortune 500 companies and ousting Oracle, IBM and MSFT (legacy infrastructure, see Sony hack). Box is pitching a modern architecture, not just cloud. [...] Building what customer asks for.
IPO  Box  Enterprise  2.0  SAAS  DropBox  Google  Drive  One  Drive  Microsoft  Google  Amazon  Cloud  Drive  Apple  iCloud  Spideroak  disruption  cyber  security  internet  security  IT  online  security  Salesforce  Aaron  Levie  Start-Up  lesson  Start-Up  advice 
april 2015 by asterisk2a
Former Homeland Security head tells Pando why he doesn’t trust his fitness data to the cloud | PandoDaily
“One shouldn’t default to the position that connecting everything is perfect.” Chertoff tells Pando he also applies a kind of digital “Washington Post test” to his activities that require him to allow any of his data to be captured by a product or service. (That’s a reference to the litmus test among politicians of a certain vintage, weighing whether they’d be ok with the Washington Post finding out and printing a particular thing they’ve done or said.) All of us, Chertoff says, should treat our data online with the same degree of care with which we guard our reputation. [...] [ book “Terms of Service"] [...] It also wasn’t that long ago that Apple had a major security breach with iCloud. You can’t change your fingerprint. But the safest way to guard sensitive information is not to collect it in the first place. [ everything in the cloud is at risk. period, private data that can, if stole, put your well-being at risk, should not be there without merit/reason.]
Internet  Privacy  Privacy  Cloudstorage  IT  Security  cyber  online  password  Public  Life  Twitter  Facebook  self-censorship  quantified  self  IoT 
april 2015 by asterisk2a
Cyber-attacks hit British Airways, GitHub and Slack - BBC News
[the weakest link] A spokesman for BA said that it believed only "a small number" of its frequent flyers were affected. "This appears to have been the result of a third party using information obtained elsewhere on the internet, via an automated process, to try to gain access to some accounts," he said.
cyber  attack  phishing  cyber  security  cyber  crime  IT 
march 2015 by asterisk2a
Apple iOS Hardware Assisted Screenlock Bruteforce | Hacker News
So it cuts power before the iPhone can store that a failed attempt occurred. It's such a simple, stupid, wonderful idea. I love it. Kudos to whoever came up with it.
Hacking  white  hat  hacker  black  hat  hacker  security  NSA  GCHQ  Five  Eyes  cyber  security  Privacy  Internet  Privacy  online  security  IT  Apple  password  security 
march 2015 by asterisk2a
President Obama: The Re/code Interview - YouTube
slick downplay, comparing cyber war & industrial, coroporate cyber espionage (breaking in into Gemalto for SIM encryption keys) with basketball. And also tapping the phone of Angela Merkel ... &! http://youtu.be/td7Dcsco-WY "Obama on the state of the world: the extended Vox conversation" - is he a realist or just a coward!? /// >> http://www.bbc.co.uk/news/technology-31545050 &! http://www.spiegel.de/netzwelt/netzpolitik/nsa-und-gchq-haben-sim-karten-schluessel-von-gemalto-erbeutet-a-1019515.html &! Silicon Valley subbed him on his proposals and road show 20 min away from their door, is a tell tale what they think of him saying one thing and what the NSA&Co put them through and demands (see Yahoo!'s case with the FISA Court) - tcrn.ch/17ovyqD &! If it were a private person were hack into and steal Gemalto encryption keys, the person would be thrown in jail FOREVER! youtu.be/bIpNXh9Nh9k?t=16m32s &! NSA, GCHQ, Five Eyes like to bully people to do X for them & drop possible charges.
presidency  barackobama  NSA  USA  Gemalto  SIM  encryption  cyber  war  GCHQ  governance  on  Terror  Cryptopocalypse  cryptography  corporate  espionagem  industrial  espionage  espionage  cyber  espionage  UK  Five  Eyes  Internet  Privacy  Privacy  human  rights  Stasi  Stasi  2.0  organised  crime  on  Drugs  ethical  machine  Checks  and  Balances  Separation  of  powers  democracy  abuse  of  power  David  Cameron  cyber  crime  cyber  attack  cyber  securityr  IT  Security  surveillance  state  Orwellian  FISA  Court  FISAAA  Secret  Courts  Silicon  Valley 
february 2015 by asterisk2a
The NSA Reportedly Stole Millions Of SIM Encryption Keys To Gather Private Data | TechCrunch
The American National Security Agency (NSA), and the British Government Communications Headquarters (GCHQ), similar clandestine intelligence agencies, stole SIM card encryption keys from a manufacturer, allowing the groups to decrypt global cellular communications data. [...] “NSA and GCHQ basically have the keys to decyrpting mobile communications anywhere in the world, even without the participation of local communication carriers (which, even if not much, acts as some check on intelligence agency behavior). It’s the equivalent of these agencies having printed doorkeys for the front doors to millions or even billions of homes around the world, just in case they one day decided they needed to get in. Frankly, people should have no faith in the security of global mobile communications.” >> CLU’s Christopher Soghoian - "Steal millions of crypto keys and then complain publicly that encryption is a problem. The UK and US govs are shameless."
NSA  GCHQ  governance  War  on  Terror  encryption  Cryptopocalypse  cryptography  corporate  espionage  industrial  espionage  espionage  cyber  espionage  USA  UK  Five  Eyes  Internet  Privacy  Privacy  human  rights  Stasi  Stasi  2.0  presidency  barackobama  organised  crime  War  on  Drugs  ethical  machine  Checks  and  Balances  Separation  of  powers  democracy  abuse  of  power  David  Cameron  Gemalto  cyber  crime  cyber  attack  cyber  security  cyber  IT  surveillance  state  Orwellian 
february 2015 by asterisk2a
Linux Journal - Wikipedia, the free encyclopedia
In early July 2014 it was revealed that the NSA's XKeyscore program targeted readers of Linux Journal, which the NSA considers an "extremist forum". // &! NSA: Linux Journal is an "extremist forum" and its readers get flagged for extra surveillance - http://www.linuxjournal.com/content/nsa-linux-journal-extremist-forum-and-its-readers-get-flagged-extra-surveillance // &! NSA targets the privacy-conscious - http://daserste.ndr.de/panorama/aktuell/NSA-targets-the-privacy-conscious,nsa230.html "Merely searching the web for the privacy-enhancing software tools outlined in the XKeyscore rules causes the NSA to mark and track the IP address of the person doing the search. Not only are German privacy software users tracked, but the source code shows that privacy software users worldwide are tracked by the NSA." - visiting site X puts you on watch list/collect data list - ie Wikileaks, Tor, Linux Journal, CCC unter anderem !+& bit.ly/1sZSWV9 >> leads to self-censorship like in East Germany.
NSA  Internet  Privacy  Privacy  human  rights  XKeyscore  Linux  CCC  activism  activists  Hacktivism  target  targeting  GCHQ  encryption  cryptography  Cryptopocalypse  IT  Security  cyber  cyber  war  cyber  espionage  corporate  espionage  industrial  espionage  espionage  FISA  Court  FISAAA  Foreign  Intelligence  Five  Eyes  presidency  barackobama  Stasi  Stasi  2.0  history  backdoor  backdoors  abuse  of  power  surveillance  state  Orwellian  Big  Data  Meta  Data  Unix  Google  Search  Tor  VPN  anonymity  self-censorship  free  speech  freedom  of  press  freespeech  free  press  Pressefreiheit  Meinungsfreiheit  Information  wants  to  be  free  knowledge  M 
february 2015 by asterisk2a
Kaspersky claims US spies can infect computers with malware that is almost impossible to detect | PandoDaily
NSA has found a way to infect computers targeted for surveillance with malware that is almost impossible to detect and even harder to remove. Kaspersky Lab says in its report that a threat actor known as the Equation Group made this possible by infecting firmware used in hard drives made by the world’s top manufacturers. // &! Reddit - bit.ly/1ATpm6v >> According to Kaspersky, getting the malicious code into a drive’s firmware is not an easy task, and can’t be done with help of public tools, meaning that the NSA had to have access to source codes for hard drives produced by these companies. [meaning they asked for access (and or intercepted orders) when OEM orders came from targeted countries/firms? or spoof hw vendor sites and let them download the manipulated firmware] &! bit.ly/19vzSpI - ie Iran and Russia.
NSA  CIA  surveillance  state  Orwellian  Foreign  Intelligence  corporate  espionage  cyber  espionage  espionage  industrial  espionage  GCHQ  Five  Eyes  backdoor  backdoors  corporate  values  corporate  governance  ethical  machine  FISA  Court  FISAAA  Regin  Whistleblower  rootkit  cyber  war  Iratemonk  Firmware  nls_933w.dll  USB  Air  Gap  cyber  security  cyber  attack  cyber  crime  USA  presidency  barackobama  Stuxnet  organised  crime  human  rights  cryptography  Cryptopocalypse  encryption  IT  on  Terror  Malware  Internet  Privacy  Privacy 
february 2015 by asterisk2a
Start Ups Should Prioritize Security, Even at the Earliest Stages - YouTube
>> weakest link is human being in the middle - thus need advisory/consulting/one person hire whose sole focus is it to make the org and tech secure and the people savvy. &! &! Five Easy Steps to Secure Your Startup - https://www.youtube.com/watch?v=SBWHWCFm9xQ - 1. get rid of MS Office - use Google Docs or other secure online secure office docs replacement / 2. Use ONE dedicated machine for online banking/finance (netbook) / 3. two-factor authentication - especially email / 4. do background checks / 5. plus teach savvyness in password choice and tools, general awareness and general security issues ie targeted phishing etc etc - on regular (updated) basis ... "most if not all attacks start with phishing"
IT  Security  Start-Up  lesson  Start-Up  advice  cyber  war  cyber  attack  DDoS  encryption  cryptography  Cryptopocalypse  cyber  cyber  crime  internet  online  password  phishing  phishing  scam  two-factor  authentication 
february 2015 by asterisk2a
The Post Antivirus Cybersecurity Industry - YouTube
waiting for a signature to occur (virus to knock on the door) is obsolete.
IT  Security  cyber  cyber  attack  cyber  war  cyber  crime 
february 2015 by asterisk2a
I challenged hackers to investigate me and what they found out is chilling | PandoDaily
see Planning section; all the vectors of attack // and the weakest component is almost always the human being in some sort of way.
corporate  espionage  cyber  espionage  industrial  espionage  espionage  Foreign  Intelligence  NSA  CIA  surveillance  state  Orwellian  IT  Security  cyber  internet  online  password  cyber  war  cyber  attack  cyber  crime  FISA  Court  Warrant  wiretapping  FISAAA  black  hat  hacker  white  hat  hacker  phishing  phishing  scam 
february 2015 by asterisk2a
With the help of Pinterest, Twitter, and others, a new Facebook platform wants to keep the web secure | PandoDaily
The service is called ThreatExchange, and companies like Yahoo, Twitter, and Pinterest have all agreed to share threat information with each other via the boringly-named tool. But these companies aren’t the only ones worried that information about digital threats isn’t shared as well as it could be. A new agency, the Cyber Threat Intelligence Integration Center, has been formed to facilitate similar sharing amongst various intelligence agencies. ThreatExchange and CTIIT were both formed out of the belief that digital threats are a puzzle whose pieces are held by various groups. The only way to solve that puzzle, then, is to convince everyone to share their pieces. Otherwise the puzzle will always be incomplete. // what if NSA abuses knowledge this org got (of US companies) to abuse the knowledge via FISA Court injunction not to release it to public knowledge - ie to compromise and or steal intelligence from non-US firms.
IT  Security  cyber  encryption  ThreatExchange  Silicon  Valley  internet  online  cryptography  Cryptopocalypse  DDoS  NSA  CIA  BND  Five  Eyes  surveillance  state  Orwellian  Intelligence  Agency  Foreign  Intelligence  transparency  governance  accountability  Europe  China  FISA  Court  FISAAA  ethical  machine  cyber  espionage  corporate  espionage  industrial  espionage  cyber  attack  cyber  war  cyber  crime 
february 2015 by asterisk2a
Data stolen in Anthem data breach was not encrypted
The Health Insurance Portability and Accountability Act (HIPAA) states that health insurance companies such as Anthem are not required to encrypt the data stored on their servers. Encryption is recommended if the health insurer believes it will mitigate risk, but ultimately the lack of requirements leaves it down to each organization to decide whether or not they encrypt data. Anthem spokeswoman Kristin Binns told The Wall Street Journal that the company encrypts personal data when it’s moved in or out of the database but not when it’s stored, a practice she said is common in the industry.
encryption  cyber  security  IT  corporate  governance  ethical  machine  HIPAA  self-regulation  regulators  regulation 
february 2015 by asterisk2a
Lenovo to buy IBM's low-end server unit for $2.3 billion | Reuters
It would not be easy for Lenovo turn around the server unit, however. IBM's low-margin server business has posted seven quarters of losses as clients move to the cloud. "To generate costs synergy, Lenovo will need to move most of the manufacturing from IBM's existing facility in Virginia to Asia while keeping some R&D in the U.S.," Lau said. The server business being sold by IBM, which produced low-cost x86 servers, competes with Hewlett-Packard Co and Dell but lags both in market share. + http://www.bloomberg.com/news/2014-01-23/lenovo-to-buy-ibm-server-unit-for-2-3-billion-amid-pc-slump.html "[S]egment’s gross margin -- the percentage of sales remaining after taking out production costs -- also is getting squeezed. It fell 3.5 percentage points to 36 percent last year. That compares with an 89 percent margin for its software business."
IBM  Lenovo  Cloudstorage  cloudcomputing  margin  commoditization  commodity  business  SaaS  Service  Industry  Enterprise  Services  IT  Industry 
february 2014 by asterisk2a
BBC News - MPs call for '32% salary increase'
> So much for "we are all in it together."

survey found that 69% thought they were underpaid on their current salary of £65,738.

The average level suggested for the appropriate level of pay was £86,250.
we  are  all  in  it  together  UK  austerity  Politics  2013  trust  trustagent  confidence 
january 2013 by asterisk2a
Aus für Traditionsbank Wegelin bedroht Schweizer Finanzbranche - SPIEGEL ONLINE
Zum ersten Mal hat eine Schweizer Bank gestanden, Amerikanern beim Steuerbetrug geholfen zu haben - das Traditionshaus Wegelin zahlt dafür mit seiner Existenz. Auch großen Instituten drohen teure Verfahren. Der Streit könnte zum Ende des Bankgeheimnisses führen.

[...] Bankenexperte Kunz vermutet, dass Wegelin sich den US-Behörden als eine Art Kronzeuge angedient hat - und so die Höhe der Strafe drücken konnte. "Ich hätte mit einer höheren Summe gerechnet", sagt Kunz. Die Bank wollte zu diesem Vorwurf auf Nachfrage nicht Stellung nehmen.

- UK came into agreement w Swiss
- GER came into agreement w Swiss
- France is introducing +75% tax rate for the wealthy
Julius  Bär  Credit  Suisse  sovereign  debt  crisis  2013  2012  GFC  greatrecession  society  culture  France  UK  we  are  all  in  it  together  austerity  Germany  Bankgeheimnis  Schweizer  Bankgeheimnis  taxevasion  USA  bank  crisis  banking  crisis  Switzerland  Wegelin 
january 2013 by asterisk2a

related tags

2.0  3D  Aaron  abuse  accountability  Act  activism  activists  Adobe  advice  affairs  Afghanistan  Africa  Agency  AI  air  Airbus  al-Qaida  algorithm  all  Amazon  America  and  Android  Angela  AngelaMerkel  anonymity  Antivirus  apathy  API  Apple  Arab  Arabia  architecture  are  artificial  Asia  Assange  attack  augmented  austerity  authentication  automation  backdoor  backdoors  Balances  bank  Bankgeheimnis  banking  barackobama  Bargeld  be  Belgacom  Big  Bitdefender  black  Blair  BND  book  Box  British  bulk  Bundestags  business  Bär  cable  cablegate  Cameron  career  cash  CCC  Celeb  Celebgate  center  centralbanks  Charter  Checks  China  CIA  Cina  class  Cloud  cloudcomputing  Cloudflare  Cloudstorage  cold  coldwar  coldwar20  collateral  collection  commoditization  commodity  complex  computing  confidence  conflict  consent  contract  Contractor  corporate  corruption  cost  costcutting  Council  Court  Courts  creation  Creative  Creatives  credit  crime  Crimea  crisis  cryptography  Cryptopocalypse  Cuba  culture  currency  customer  cyber  cybersecurity  cyberwar  Cycle  damage  DARPA  data  Dataretention  DAU  David  DDoS  debasement  debt  democracy  deposit  Despotism  Developer  disrupting  disruption  domestic  DRIPA  Drive  Drone  DropBox  Drugs  Eating  ECB  economic  ecosystem  Edward  embargo  Empire  employment  encryption  end  energy  engineering  Enterprise  error  espionage  espionagem  ethical  EU  Europe  European  exploit  Eyes  Facebook  False  FBI  fiat  Firmware  FISA  FISAAA  fiscal  Five  Flag  Flash  folly  forecast  foreign  Foundation  fragmentation  FRance  France  fraud  free  freedom  freespeech  Future  G7  G8  gap  Gaza-Israel  GCHQ  Gemalto  geopolitics  Germany  Gesellschaft  GFC  GitHub  Glenn  globalisation  globalization  Google  governance  greatrecession  Greenwald  Grid  GroKo  groups  gun  hacker  hacking  Hacktivism  haircut  hat  Hegemony  HIPAA  history  HTML5  human  IBM  iCloud  identity  image  Imperialism  impersonation  in  income  industrial  Industry  Information  infrastructure  innovation  innovator  insecurity  intelligence  interest  international  internet  intervention  investigative  iOS  IoT  IPO  Irak  Iran  Iratemonk  Is  ISIL  ISIS  Israel  it  Japan  job  Jobs  journalism  journalismus  Julian  Julius  Kaspersky  knowledge  Korea  Kultur  labour  ladder  Latin  Lauschangriff  law  Leadership  League  leak  Lenovo  lesson  Levie  Life  linkedin  Linux  living  low  Lügenpresse  M  machine  Malware  manufactured  Manufacturing  margin  market  markets  Meinungsfreiheit  memory  Merkel  Met  Meta  metadata  MI5  MI6  Microsoft  middle  military  military–industrial  mirror  Mobile  monetisation  monetization  money  Moore's  Mozilla  n00d  national  Nationalism  Nations  NATO  neoconservatism  neoconservatives  neoliberal  neoliberalism  Network  netzpolitik  netzpolitik.org  NHS  nls_933w.dll  No  NSA  nuclear  of  Oil  oligarchy  on  One  online  OPEC  Open  operating  organised  Orwellian  outsourcing  oversight  Pakistan  part-time  password  Patent  Patriot  pay  Pentagon  Persona  philosophy  phishing  Police  policy  political  Politicians  Politics  poor  populism  power  powers  Precariat  precarious  prediction  predictions  presidency  press  Pressefreiheit  price  printing  Privacy  private  Professional  Profile  profiling  programmers  propaganda  protectionism  Protest  Public  Putin  quantified  quantum  R&D  recognition  Regin  regulation  regulators  relations  Representation  retention  Reverse  rights  Ring  Robotics  rootkit  runway  Russia  SAAS  SaaS  Salesforce  Saudi  scam  Schweizer  Search  SEC  secret  Sector  security  securityr  selector  self  self-censorship  self-employment  self-regulation  Separation  Service  Services  short-term  Silicon  SIM  Smart  smoke  smoking  Snoopers  Snowden  social  society  Software  Source  South  SouthChinaSea  sovereign  speech  Spideroak  spoofing  spying  squeezed  standard  Start-Up  Stasi  state  Street  Strike  Stuxnet  Suisse  Super  SuperFish  surveillance  Surveillance-Industrial  Switzerland  Syria  Syrien  target  targeting  tax  taxevasion  Terror  The  theory  thinking  ThreatExchange  to  together  Tony  Tor  Torture  TOS  Totalitarian  tracking  trade  Trading  transparency  Trojan  Trojaner  TrueCrypt  trust  trustagent  Twitter  two-factor  UK  Ukrain  Ukraine  Union  United  Unix  USA  USB  user  Valley  values  vested  Vietnam  view  vladimirputin  Vorratsdatenspeicherung  VPN  W3C  Wall  wants  war  Warfare  Warrant  Washington  we  Wegelin  Whistleblower  white  Wikileaks  wiretapping  WMD  work  working  World  XKeyscore 

Copy this bookmark:



description:


tags: