Cyber Attack Map

ipvikingNorse has made an attack-map showing live attacks with some delay. I think it is a nice illustration of the frequency of various cyber attacks. However, I am not sure for what other reason than awareness it is useful for. At the time I took the screenshot, it was happening quite a lot all over the place… I wonder how precise such a tool can be.

 

 

NSA of Things using Hardware Implants, Exploits, etc…

What to expect from a standard USB cable?

usb

Probably not surprising, but check out this video from Chaos Communication Congress and the presentation “To Protect and Infect” by Jacob Applebaum to learn more about the speculations of NSAs hardware implants in USB cables, exploits, malware etc. for surveillance, namely: Somberknave, Totechaser, Iratemonk, Monkeycalendar (with references to Karsten Nohls work), Bulldozer, Iron Chef, Cottonmouth, Howlermonkey, CTX4000 (ragemaster RF-flooding) and more.

More about the actual documents presented you find here at Leaksource.

Limit public access to your Facebook profile

Facebook is changing and so is their Privacy Policy.

Some nice features exist limit access to your profile, photos etc. However, keep in mind that Cover Photos cannot be hidden, unless deleted. Access to Profile Picture can be limited, but the thumbnail will remain visible. Please see my old post on Social Media Permissions here:

Following are examples of how the features work.

View As:

face1

 

 

 

 

 

Continue reading “Limit public access to your Facebook profile”