http://www.zdnet.com/article/a-practical-history-of-plane-hacking-beyond-the-hype-and-hysteria/ By Violet Blue Zero Day May 21, 2015 Headlines and infosec pros alike have been going mental over security researcher Chris Roberts’ alleged mid-flight hacking of a commercial airplane, and his subsequent detainment by the FBI in April. Things got hysterical last weekend when a month-old FBI search warrant application surfaced in headlines hyping the FBI’s belief that Roberts tried to fly the plane by hacking in through the in-flight entertainment system. It remains to be seen whether or not a hacker can make a 747 “do a barrel roll” a la the maddeningly impossible fantasies of CSI Cyber. But as a result, the world is openly wondering whether there’s truth to the assurances from manufacturers and officials that aviation systems are as secure as claimed
Keep your lawn green this summer!
The following five steps will allow you to significantly improve your lawn while saving a tremendous amount of water use throughout the year. The following five steps only take about 30 minutes across the entire year in order to properly improve your specific situation. The simple fact is you do not need to kill off your lawn in order to save significant amounts of water and contribute to the efficiency of water use within California.
By implementing these steps I personally experienced more than 30% reduction in my water use while my neighbors stood in awe of how florescent green my lawn was. When I showed my water bill and the savings to my neighbors they were in complete disbelief because they believed they had to kill off their lawn by reducing their water use to all zero but quite in fact this is not necessary. With proper maintenance, a lawn and your entire yard needs only a fraction of a the water necessary to keep it green and beautiful when you are not properly caring for it.
Step 1. Follow the sun (and the weather).
Often, many of us pay attention to the weather in order to select the right clothing for the day. However many of us ignore the fact that our lawns also need you to adjust your care according to the weather and the amount of sun your lawn will receive. So it is important to note what the weather will be like and the temperature ranges that your lawn will be experiencing along with you during the day.
Step 2. Penetrate your soul (leverage an aerator).
This simple little tool can be used to significantly change the absorption rate of water for your lawn. Imagine that you don’t aerate your lawn, without aeration the water sits on the top layer of soil and if you have a hill or sloped lawn it rolls right off only permeating the very top quarter-inch layer of topsoil. The goal for water efficient lawn is to maintain deep penetration of water into the topsoil and the only way to perform this without overwatering is through aeration. Aeration also has other benefits such as delivering nutrients further into the soil towards the roots of your grass. This is the single most effective way to reduce water usage and it only takes five minutes with this tool found at Home Depot at the following URL: http://www.homedepot.com/p/Hound-Dog-Steel-Spike-Aerator-HDP37/202605484
Step 3. Renew your body (sprinkle some seed).
Re-seeding is an essential step to keeping a quality lawn. Over time and age lawn degrades and the blades of grass simply don’t have the same luster as they once had similar to humans and aging. So it is important to re-seed on a regular basis usually in the springtime. There are many types of seed and you should try and match the type of seed that you already have if at all possible so that you can maintain the look the you desire. For me a simple fescue mix from my local Walmart or Home Depot was sufficient to maintain my own grass in the look that I desired.
Step 4. Take some vitamins (fertilize!).
The next step after aeration is to ensure that your grass has quality nutrients delivered directly to its roots, just like our bodies need vitamins so to do grasses and other shrubs we plant our yards. A simple $10-$15 fertilizer sprinkled across your lawn is sufficient to provide nutrients for almost 6 months and significantly improve the health of your lawn and provide for a florescent green and healthy color. This step takes only minutes once every six months. Ideally you can spread fertilizer with the same handheld spreader you use for the seed.
Step 5. Adjust your clocks! (water at the right time of day).
The final step in this process is to adjust your watering habits or your watering system to accommodate our newly renovated lawn. An unhealthy lawn without these maintenance techniques requires 2 to 3 times as much water, leading guidance from common Internet sources to claim watering must be 8 to 10 minutes per day in order for the desired look. However I have found that For my environmental conditions in Northern California, quite honestly a healthfully maintained lawn only needs one third of the amount of water across to the majority of the year with only exceeding this amount in the highest temperature period of the summer months. The best watering times for grass are during the morning hours between 4 and 5 AM allowing sufficient soak time prior to the sun rising and evaporating the moisture. For my use I also run my water in the afternoon at around 5 PM, ideally you do not want a moist soil all night long to avoid bacteria and moss growth during the evening.
This is a photo of my lawn and my bill usage graph with an over 30% reduction (year over year) in my water use.
http://www.dailydot.com/politics/dox-doxing-protection-how-to/ By Joseph Cox The Daily Dot January 06, 2015 There are few things more startling than seeing your private information released online. It makes you feel vulnerable and on-edge, knowing that anyone has the details necessary to throw a brick through your window at a moment’s notice. The act, known as doxing, has become a popular tactic with activists and trolls alike, with members of Anonymous releasing details on KKK members to Gamergate members publishing the personal information of those the movement opposes. While doxers sometimes use hacking or deception to uncover personal details about their targets, contrary to popular belief “most of the info is public,” according to one researcher who has spent years studying and participating in the practice of doxing. All it takes is the right person to put it all together for devastating effect. The researcher, who asked not to be identified, has gained a deep understanding of the various strategies that are used to generate a profile on someone. He agreed to tell me how it’s done. I’m passing on what I’ve learned, so you can better protect yourself against this privacy-destroying practice. […]
http://www.ft.com/intl/cms/s/0/240e2eb2-2d0c-11e4-8105-00144feabdc0.html By Chris Nuttall FT.com August 26, 2014 The UK’s Prison Service can lock its cells but not its hard drives, it seems – displaying a lack of technical knowhow that “beggars belief”, according to the Information Commissioner’s Office. The information rights regulator has fined the Ministry of Justice £180,000 for a second incident where an unencrypted hard drive went missing – in May 2013 – with sensitive and confidential information about prisoners. After a similar case in October 2011, when an unencrypted hard drive containing the details of 16,000 prisoners was lost, the Prison Service issued new hard drives, which were able to encrypt – or scramble – information on them, to all 75 prisons in England and Wales. However, the ICO’s investigation into the latest incident has found that the Prison Service didn’t realise that the encryption option on the new hard drives needed to be turned on to work correctly. […]
http://online.wsj.com/news/articles/SB10001424052702303417104579544551961937712.html By Andrew Grossman The Wall Street Journal May 5, 2014 WASHINGTON —- A Navy systems administrator assigned to the nuclear reactor department of an aircraft carrier was also the leader of an antigovernment hacking group, prosecutors alleged Monday. Prosecutors say 27-year-old Nicholas Knight, an alleged hacker since age 16, led Team Digi7al, a group that broke into networks belonging to more than 30 governments, companies and individuals throughout 2012 and stole personal information about employees and customers. The group, motivated by a mix of antigovernment politics, boredom and desire to prove itself to the hacking community, then posted some of the information online, according to the charging document filed in federal court in Tulsa, Okla., Monday. Mr. Knight’s arrest is a reminder of the dilemma the government faces as it seeks to recruit young adults with hacker-grade computer chops. Often times, they are indeed hackers. Some aren’t yet ready to give up the darker side of technology or, in the case of Edward Snowden, the former National Security Agency contractor, they hold beliefs that may clash with the Pentagon. […]
I just saw a news release with Greta Van Susteren about Thailand’s participation in the radar data for Flight 370. I myself have been searching online using DigitalGlobe.com’s satellite data in their crowdsourcing effort to search for flight 370. Although I can certainly understand how some people could be upset by the response that Thailand didn’t provide radar data “because they weren’t asked”. This sort of response is typical of Thai culture. My wife is Thai and I think that amoungst many cultures of the world, Thais are some of the most caring and loving people but their cultural norms make others (especially western cultures) feel like they don’t care. Quite in fact it is very common in Thai culture to avoid conflict and stay out of other people’s problems or situations entirely. In Thai culture their perception is that they are giving respect by staying out of other people’s business and affairs unless a Thai is asked directly to get involved. This is a deep rooted belief and likely why they did not get involved to provide data until there was a specific request for them to get involved. I know this runs contrary to Christian beliefs entirely but it is how the culture operates and this situation is likely being misinterpreted. In personal dealings with my own wife and her family I have found this dynamic to be troublesome and cause of some misunderstandings. I am certain that the Thai people care deeply for the loss of flight 370 just as much as any other country. Additionally the Thai government is in disarray adding difficulties to this scenario with severe problems in their parliament and leadership. I ask my fellow countrymen and others to not sit in judgement because of this odd cultural dynamic. My two cents. Peace!
http://healthitsecurity.com/2014/03/17/healthcare-data-encryption-trends-and-methods/ By Patrick Ouellette Health IT Security March 17, 2014 There are varying responses from healthcare organizations and security experts when the question of why an organization would not encrypt its data is posed. For some, it’s a numbers game and their budget simply can’t fit encryption technology. Others philosophically are opposed because they believe, to a degree, it degrades the data. However, there may be a more fundamental reason for a lack of encryption for some organizations: the belief that their “four walls” are enough to protect patient data. Michael Leonard, Director of Product Management for Healthcare IT at Iron Mountain, told HealthITSecurity.com that many organizations don’t encrypt their data for that reason. What encryption trends are you seeing on-site v. off-site within healthcare organizations? Leonard: We see in many organizations a lot of the content is still not encrypted, especially if it’s being stored onsite, and that has been, I think, historically because it’s within their four walls there’s less concern, right or wrong, but there’s less concern that it should be encrypted if it’s in-house, so to speak. I don’t see anybody, at least that we’ve talked to, moving content out into the cloud or out to a managed service provider unless it is encrypted, and that’s clearly a best practice. Also, many of the existing clinical applications don’t really have a native way of encrypting content, so it’s like extra work for the organization to encrypt much of that clinical information. So, we see quite a bit of the content that’s stored within the four walls of an organization as unencrypted. […]
http://variety.com/2014/digital/news/chinas-hackers-to-target-u-s-entertainment-industry-security-firm-warns-1201131720/ David S. Cohen Senior Editor, Features Variety.com March 13, 2014 A new report from cybersecurity firm FireEye warns that the U.S. film and entertainment industries could come under cyberattack from Chinese hackers intent on undermining companies’ content, technology and internal communications. “China’s Soft Power Strategy and Cyber Intrusions: What Hollywood Should Know,” due to be officially published next week, posits that Chinese authorities see U.S. domination of filmed entertainment as a strategic advantage for America, and want that advantage for China. “We judge that links between China’s soft power strategy (in this case, their cultural means of influence) and its designation of ‘creative industries’ as strategic, provides the motivation for groups to commit cyber espionage,” says the report. Of course, FireEye sells threat protection and stands to gain financially if the entertainment industry invests in cyber-security. But cybersecurity expert Hemanshu Nigam, founder of SSP Blue, says China’s cyber threat to the entertainment industry is already well known. “When your’e doing business with a country or company that has very different beliefs than the American value system, there’s always a chance this kind of thing can happen,” Nigam told Variety. […]