It’s moved beyond tradition and into the realm of meme that Apple manages to dominate the news cycle around major industry events all while not actually participating in said events. CES rolls around and every story is about HomeKit or its competitors, another tech giant has a conference and the news is that Apple updated some random subsystem of its ever-larger ecosystem of devices and software.
Category: Fity Feeds
Li-Fi gets office install in Philips lighting
Broadband data-over-light, sent through lighting fixtures commonly seen in commercial buildings, moves a step closer to possible mass adoption through an apparently functioning smart-office installation in Paris.
Reddit Bans Community Dedicated to Dark Web Markets
Reddit has banned /r/DarkNetMarkets, the site’s biggest community dedicated to discussions related to Dark Web marketplaces —sites dedicated to selling illegal products varying from weapons, drugs, malware, data breaches, DDoS services, fraud services, and more.
Zuckerberg responds to Cambridge scandal, will block data access of unused apps
Zuckerberg’s response to Cambridge scandal omits why it delayed investigating
Things you should consider learning before trying to learn to hack
So you want to learn how to hack?
Well there’s a few things you should learn how to do before learning to hack. Some of these may be obvious to some but its not to everybody. Hacking is not something you can just learn to follow steps and practice like learning to play an instrument or learning to ice skate. Hacking is a type of complex problem solving using multiple skill sets and advanced knowledge of psychology, security, networking, computer hardware, programming, debugging and math. There is no one single path to learn how to hack, Everybody does it differently and their own way. The following is a list of things you should be very familiar with before you even consider trying to start hacking as a hobby. You don’t need to follow these in any particular order but they are all equally important so if there is anything you are not familiar with I suggest starting there. If anybody has something to add such as learning resources or additional advice feel free to post below and I will add it if I think it may help.
Facebook Fallout Continues as Politicians Call For Legal Action
A legal backlash against Facebook’s latest controversy is starting to gain momentum. Lawmakers from around the country are calling for investigations into Facebook after the company revealed that the data of 50 million platform users had leaked through a third-party app.
Marketers Need to Stop Focusing on Loyalty and Start Thinking About Relevance
If your customer retention strategy relies on “buying” loyalty with rewards, rebates, or discounts, it is coming at a high cost. And these days, it could also mean that you’re giving up something priceless: your relevance.
GDPR: Chip away at the stone
In our work with clients on the General Data Protection Regulation (GDPR) (Regulation [EU] 2016/679), we have generally not seen organizations accomplish full compliance all at once. Instead of a full-on project, the actions we’ve seen have been addressed a little at a time. One client said they were just “chipping away at the stone,” which reminded me of a tune I hadn’t heard in a long while from Aerosmith: “Chip Away the Stone” (a very underplayed song by the way for how good it is, with the B-side live version even better. Click on the link or go to YouTube to listen to it… You won’t be sorry). With only 20% of organizations compliant by the deadline of May 25, 2018, that means you better get-a-chippin’.
How to Use AlientVault SIEM for Threat Detection & Incident Response
Malware comes via attachments, malvertising, man-in-the-middle, man-in-the-browser, social engineering and countless other vectors. Even the most stringent of binary whitelisting can be quickly…
CyberByte steals Malwarebytes’ intellectual property
At Malwarebytes, we frequently examine apps for detection as Potentially Unwanted Programs (PUPs). These are programs that exhibit a wide variety of bad behaviors, but aren’t actually outright malware. Unfortunately, there are many supposed antivirus programs that fit this category.
5 Steps to a Painless Checkout Process
Checking out is the heart and soul of the e-commerce experience. When it goes well, you’ve got happy customers who are likely to return. When it doesn’t, your business can suffer.
Growing Mistrust Threatens Facebook After Data Mining Scandal
As Facebook reels from the scandal over hijacked personal data, a movement to quit the social network gathered momentum Wednesday, portending threats to one of the most powerful internet firms.
Google Cloud gains federal certification, adds a suite of new security features
Google Cloud, the fastest growing cloud business in an booming industry, announced a long list of new security features on Wednesday including denial-of-service protection, data transparency and a “Cloud Security Command Center” designed to give customers visibility into where sensitive data is located, firewall rules and resource deployment.
Sam Darnold Dazzles in Rainy USC Pro Day After Not Throwing at Draft Combine
Ron Jenkins/Getty Images
After choosing not to throw at the NFL Scouting Combine, quarterback Sam Darnold showcased his skills for scouts on Wednesday during USC’s pro day.