of Air Contacts Lite Denial Of Service By packetstormsecurity.com Published On :: Thu, 10 Mar 2011 22:42:22 GMT The Air Contacts Lite iPhone / iPod application suffers from a denial of service vulnerability. Full Article
of Forensic Analysis Of iPhone Backups By packetstormsecurity.com Published On :: Thu, 12 Jul 2012 11:11:11 GMT This article explains the technical procedure and challenges involved in extracting data and artifacts from iPhone backups. Full Article
of Twitter 5.0 Eavesdropping Proof Of Concept By packetstormsecurity.com Published On :: Thu, 22 Nov 2012 18:22:22 GMT The Twitter 5.0 application for iPhone grabs images over HTTP and due to this, allows for a man in the middle attack / image swap. Proof of concept included. Full Article
of Symantec Mobile Encryption For iPhone 2.1.0 Denial Of Service By packetstormsecurity.com Published On :: Mon, 03 Sep 2018 04:44:44 GMT Symantec Mobile Encryption for iPhone version 2.1.0 suffers from a denial of service vulnerability. Full Article
of Hackers Wipe US Servers Of Email Provider VFEmail By packetstormsecurity.com Published On :: Tue, 12 Feb 2019 17:37:49 GMT Full Article headline hacker privacy email data loss
of Microsoft Patches 0-Day Vulnerabilities In IE And Exchange By packetstormsecurity.com Published On :: Wed, 13 Feb 2019 15:01:51 GMT Full Article headline microsoft email flaw patch
of Hackers Could Read Your Hotmail, MSN, And Outlook Emails By Abusing Microsoft Support By packetstormsecurity.com Published On :: Mon, 15 Apr 2019 16:32:54 GMT Full Article headline hacker privacy microsoft email flaw
of Microsoft Outlook Email Breach Targeted Cryptocurrency Users By packetstormsecurity.com Published On :: Tue, 30 Apr 2019 00:59:50 GMT Full Article headline hacker privacy microsoft email data loss cryptography
of The Russians Are Using A Clever Microsoft Exchange Backdoor By packetstormsecurity.com Published On :: Tue, 07 May 2019 14:34:46 GMT Full Article headline government microsoft email russia cyberwar spyware backdoor
of Exim Command Execution Flaw Affects Millions Of Servers By packetstormsecurity.com Published On :: Fri, 07 Jun 2019 15:06:13 GMT Full Article headline email flaw
of Shanghai Jiao Tong University Exposed 8.4TB Of Email Data By packetstormsecurity.com Published On :: Mon, 10 Jun 2019 19:57:39 GMT Full Article headline privacy email china data loss
of Microsoft Warns Of Email Attacks Executing Code Using An Old Bug By packetstormsecurity.com Published On :: Tue, 11 Jun 2019 14:55:53 GMT Full Article headline malware microsoft email flaw
of Facebook Emails Seem To Show Zuck Knew Of Privacy Issues By packetstormsecurity.com Published On :: Thu, 13 Jun 2019 16:06:51 GMT Full Article headline privacy email data loss facebook
of UNICEF Leaks Personal Data Of 8,000 Users Via Email Blunder By packetstormsecurity.com Published On :: Thu, 12 Sep 2019 14:30:26 GMT Full Article headline privacy email data loss
of Apple Mail On macOS Leaves Parts Of Encrypted Emails In Clear By packetstormsecurity.com Published On :: Sat, 09 Nov 2019 13:44:41 GMT Full Article headline privacy email flaw apple cryptography
of Microsoft Exchange Server Flaw Exploited In APT Attacks By packetstormsecurity.com Published On :: Tue, 10 Mar 2020 12:56:23 GMT Full Article headline hacker microsoft email data loss flaw
of Extreme Networks Aerohive HiveOS 11.x Denial Of Service By packetstormsecurity.com Published On :: Wed, 06 May 2020 14:54:35 GMT Extreme Networks Aerohive HiveOS versions 11.x and below remote denial of service exploit. An unauthenticated malicious user can trigger a denial of service (DoS) attack when sending specific application layer packets towards the Aerohive NetConfig UI. This proof of concept exploit renders the application unusable for 305 seconds or 5 minutes with a single HTTP request using the action.php5 script calling the CliWindow function thru the _page parameter, denying access to the web server hive user interface. Full Article
of OpenSMTPD Out-Of-Bounds Read By packetstormsecurity.com Published On :: Tue, 25 Feb 2020 15:32:56 GMT Qualys discovered a vulnerability in OpenSMTPD, OpenBSD's mail server. This vulnerability, an out-of-bounds read introduced in December 2015, is exploitable remotely and leads to the execution of arbitrary shell commands. Full Article
of Island Economies of the Future 2019/20 – the results By www.fdiintelligence.com Published On :: Mon, 10 Jun 2019 07:26:23 +0000 Cyprus is ranked first in fDi’s Island Economies of the Future rankings, followed by the Dominican Republic and Sri Lanka. Cathy Mullan and Naomi Davies detail the results. Full Article
of American Cities of the Future 2019/20 - the winners By www.fdiintelligence.com Published On :: Mon, 10 Jun 2019 07:24:30 +0000 New York continues to reign as leader of fDi’s American Cities of the Future 2019/20 ranking. San Francisco retains second place with Toronto rising to third. Naomi Davies reports. Full Article
of American Cities of the Future 2019/20 – FDI strategy By www.fdiintelligence.com Published On :: Mon, 10 Jun 2019 07:25:52 +0000 A more detailed look at fDi's judges’ top five American Cities of the Future 2019/20 for FDI strategy. Naomi Davies reports. Full Article
of Fintech Locations of the Future 2019/20: London tops first ranking By www.fdiintelligence.com Published On :: Thu, 15 Aug 2019 11:00:49 +0000 London has been named fDi’s inaugural Fintech Location of the Future for 2019/20, followed by Singapore and Belfast. Full Article
of Asia-Pacific Cities of the Future 2019/20 – the winners By www.fdiintelligence.com Published On :: Thu, 15 Aug 2019 11:00:47 +0000 Singapore has retained its place at the top of fDi's Asia-Pacific Cities of the Future ranking, with Shanghai and Tokyo completing the top three list. Full Article
of fDi’s Global Free Zones of the Year 2019 – the winners By www.fdiintelligence.com Published On :: Mon, 14 Oct 2019 08:40:15 +0000 The UAE's DMCC takes home the top prize in fDi’s Global Free Zones of the Year for a fifth consecutive year. Full Article
of Tourism Locations of the Future 2019/20 – FDI Strategy By www.fdiintelligence.com Published On :: Mon, 09 Dec 2019 08:33:03 +0000 Australia tops the FDI Strategy category of fDi's Tourism Locations of the Future 2019/20 rankings, followed by Costa Rica and Azerbaijan. Full Article
of Linux Variant Of Winnti Malware Spotted In Wild By packetstormsecurity.com Published On :: Tue, 21 May 2019 13:36:39 GMT Full Article headline malware linux
of Thousands Of Servers Infected With Lilocked Ransomware By packetstormsecurity.com Published On :: Fri, 06 Sep 2019 14:45:48 GMT Full Article headline malware linux
of Telus Actiontec WEB6000Q Denial Of Service By packetstormsecurity.com Published On :: Wed, 12 Jun 2019 18:44:21 GMT Telus Actiontec WEB6000Q with firmware 1.1.02.22 suffers from a denial of service vulnerability. By querying CGI endpoints with empty (GET/POST/HEAD) requests causes a Segmentation Fault of the uhttpd webserver. Since there is no watchdog on this daemon, a device reboot is needed to restart the webserver to make any modification to the device. Full Article
of Nation-Sponsored Hackers Likely Carried Out Hostile Takeover Of Rival Group's Servers By packetstormsecurity.com Published On :: Thu, 20 Jun 2019 17:00:59 GMT Full Article headline hacker government russia cyberwar iran
of Microsoft Says Iranian Hackers Tried To Hack A US Presidential Campaign By packetstormsecurity.com Published On :: Sat, 05 Oct 2019 14:22:25 GMT Full Article headline hacker government microsoft usa fraud cyberwar iran
of Iranian Internet Attacked Saturday, Knocked Partially Offline By packetstormsecurity.com Published On :: Tue, 11 Feb 2020 15:34:05 GMT Full Article headline government denial of service iran
of Vulnerabilities In Two Schneider Electric ICS Products Reminiscent Of Stuxnet By packetstormsecurity.com Published On :: Fri, 08 May 2020 14:22:40 GMT Full Article headline government malware flaw cyberwar iran scada
of How Many Microsoft Products Can My Nonprofit Request from TechSoup? By feeds.techsoup.org Published On :: Wed, 20 Sep 2017 23:30:00 GMT https://blog.techsoup.org/posts/how-many-microsoft-products-can-nonprofits-request Here is the short answer to the question of how many Microsoft products you can request: You can get 50 of each kind of product in a two-year period — but there are some exceptions. See Microsoft products What do you mean by "each kind of product"? The Microsoft Donation Program divides products into categories called title groups. See the current list of 37. A title group contains products that serve essentially the same purpose, like PowerPoint and PowerPoint for Mac. You can get products from 10 title groups in your two-year cycle. When does this two-year cycle start and end? Is it the calendar year? No. Your nonprofit has its own two-year cycle. Your first cycle started the day you requested your first Microsoft product through TechSoup. You can see when your current cycle ends on your Microsoft Donation Center page. Outlook and PowerPoint are both title groups. Does that mean we can get 50 of each product? That's right. They can be all the Windows version, all the Mac version, or a mixture of the two. And you will be able to request products from eight more title groups. What are the exceptions you mentioned? They have to do with servers. Microsoft offers two licensing models for its server products. Core-based licensing. This licensing is based on the number of cores in the physical processors of your server machines. The product page on TechSoup will tell you whether the server uses this type of licensing. You can request up to 50 of these products from each title group, the same as desktop products. But you might have to request more than one product to fully license all the processors in your server. Non-core-based licensing. You can request a total of five server products that do not use core-based licensing. They can be from a single title group or from different title groups, but the total cannot be more than five. A lot of the title groups are for CALs and MLs. What are the limits for these? You can get 50 from each title group. CALs, or client access licenses, give you access to a server from a device like your desktop computer. MLs, or management licenses, let your device be managed by a management server. Where can I find out more? This article goes into a lot more detail and gives examples of how the various allotments work together. spanhidden Full Article microsoft
of Nonprofit Harnesses Tech to Plant Tens of Thousands of Trees By feeds.techsoup.org Published On :: Thu, 28 Sep 2017 19:35:00 GMT (Please visit the site to view this video) What does it take to make a city greener? In San Francisco, it took a small group of motivated people to come together to create a nonprofit. After the city cut funding for urban forestry 36 years ago, seven individuals decided to take matters into their own hands. They created a nonprofit, Friends of the Urban Forest (FUF). Starting with a Small Budget, FUF Plants Nearly Half San Francisco's Street Trees The organization started off with just a small budget from a leftover city grant. Then it used grassroots efforts to rally neighborhoods throughout the city around urban trees. By empowering and supporting communities and homeowners to plant and care for their own trees, FUF has successfully planted 60,000 of the 125,000 trees in San Francisco. The group eventually even worked with the city to create San Francisco's first ever Urban Forest Plan. FUF Harnesses the Power of Many Volunteers to Plant and Advocate for Trees FUF is a member of TechSoup, and TechSoup's staffers were very excited to reach out for an interview to hear more about the group's impact. My team joined FUF early on a Saturday morning for its volunteer tree planting event in the Portola neighborhood, a part of the city that is lacking street trees. It was cold even by San Francisco standards, but there was an impressive turnout of volunteers present and ready to plant. The executive director of FUF, Dan Flanagan, joined us and told us about his work. "We get to get out in the city and make it greener. We advocate for trees; I always call ourselves the Lorax of San Francisco. We are the only organization in San Francisco that is speaking for the trees." FUF Gets the Chance to Plant Even More Trees … in Neighborhoods That Really Need Them Dan was excited about a recent accomplishment for the organization. San Francisco just passed Proposition E, which opens up major opportunities for the nonprofit. As he said, "It changes the responsibility from street trees and sidewalks away from the homeowners and to the city. As a result, homeowners are no longer responsible, and now we actually get a chance to make the city more green than ever before by planting more trees in neighborhoods that couldn't afford it before." This policy makes the city responsible for maintenance, but it will still require FUF to continue its work of planting the trees. FUF hopes to plant 1,700 trees this year and ultimately hopes to plant 3,000 trees every year. FUF Puts Technology from TechSoup to Work I was curious to find out how FUF was using technology to further its mission. Jason Boyce, individual gifts manager, said: "Here at Friends of the Urban Forest, a lot of our field staff tend to be out in the field all day; technology really needs to be out of the way to allow us to plant. So, as a result, the relationships we build with our community tend to be stronger because we use technology to enable our work, but it doesn't get in the way of our work." Jason explained, "We have been working with ArcMap for years, ... GIS software that TechSoup has provided for us. We use it to plant trees, to figure out where we are going to plant. When we do our plantings, we actually dole out the maps that our volunteers use to do the plantings, and all that comes through ArcMap. We use Adobe Acrobat to put together our tree manuals for our new tree owners and volunteer manuals. We use AutoCAD to put together the permit drawings for our sidewalk gardens. Technology plays a really important role in doing our plantings and making San Francisco more green." FUF Partners with the City to Calculate the Environmental Benefits of Trees Jason also recently worked with the city on the Urban Forest Map, which is an interactive online map that tracks every tree in San Francisco. The map helps calculate the environmental benefits the trees provide, including stormwater mitigation, air pollutants captured, and carbon dioxide removed from the atmosphere. This platform has increased the visibility of the city's urban forest. As Jason said, "We are now at the forefront of cities worldwide that are building software to manage their urban forests. … [This] really gives a lot of benefit to the people living in San Francisco." TechSoup is proud to support organizations like Friends of the Urban Forest by enabling them with the technology they need. That support gives them more time to focus on their impact, like planting trees, or to build the communities that help them thrive. spanhidden Full Article Adobe autodesk
of Microsoft's MileIQ Helps a Nonprofit Show People How to Save Lots of Energy By feeds.techsoup.org Published On :: Thu, 05 Oct 2017 14:26:00 GMT In 2015, the state of Louisiana consumed more energy per capita than any other state, according to the U.S. Energy Information Administration. Although this may not come as a complete surprise — the state's warm, muggy climate makes air conditioning a must — it's clear that Louisiana's energy-use profile needs a drastic transformation. The Energy Wise Alliance (EWA), a small nonprofit based in New Orleans, is determined to do just that. Along the way, the organization has gotten a boost from Microsoft's MileIQ app. MileIQ is a mobile app from Microsoft that automatically tracks the miles you've traveled and records all of your tax-deductible and reimbursable mileage. It's kind of like using a Fitbit, except you're tracking your driving. You can report your business drives on demand and claim your reimbursements or maximize your tax deductions. The average MileIQ user is logging $6,900 per year. Building a More Energy-Efficient Community EWA works to make energy efficiency more accessible to everyone. The organization works primarily with low-income families, tenants, and others who would otherwise be left out of the green energy revolution. EWA accomplishes its goals through both workshops and equipment upgrades at homes and businesses. Its Energy Smart for Kids program teaches students throughout the state how to lead a more energy-efficient lifestyle. These hourlong sessions cover the pitfalls of nonrenewable energy and detail more sustainable alternatives. At the end of each session, EWA volunteers hand out energy-efficiency starter kits so students can apply what they learned at home. Much like the rest of EWA's programs, Energy Smart for Kids serves underserved and underprivileged communities. In fact, many of the schools that EWA serves are Title 1 schools — schools whose students generally come from lower-income households. Aside from schools, EWA also helps nonprofits become more sustainable. Making Nonprofits Greener and More Cost-Efficient Nonprofits can benefit from EWA's work by way of simple but effective power-saving retrofits. EWA also provides volunteer labor and donates the materials for the retrofits, which means added cost savings. And as we all know, cost-saving programs are like gold dust for nonprofits. For example, volunteers from EWA revitalized the Victorian-era headquarters of the Alliance Française, a nonprofit dedicated to preserving Francophone heritage in the New Orleans community, with sustainable retrofits. As part of these upgrades, EWA sealed cracks, gaps, and openings; installed additional insulation; and programmed new thermostats. In addition, EWA gave the Alliance Française's volunteers a hands-on demonstration of behavioral changes so that they could bring this knowledge back home. EWA anticipated that the Alliance Française would save a total of $2,000 to $3,000 as a result of these green improvements. EWA's staff members also actively save money and operate more efficiently through the use of the mile-tracking app MileIQ. Saving Time and Money with MileIQ This method, as you can imagine, was time-consuming, and it brought with it the risk of human error. Most people can't possibly remember every single trip they make with their car, after all. "MileIQ is super accurate and takes the forgetting out of the equation," said Jamie Wine, executive director of EWA. For Kevin Kellup, education coordinator at EWA, MileIQ has been a game-changer. Jamie explained, "Kevin drives like crazy from school to school," racking up miles on his personal car. Now, thanks to MileIQ, Kevin can get more fairly and accurately reimbursed for his constant traveling. The most important benefit of Microsoft's MileIQ for Jamie is that his staff can be correctly reimbursed for mileage. He wants to show staff members that he values their time and effort spent traveling, which MileIQ really helps him achieve. For nonprofits, particularly small ones like EWA, it's always great when the team can receive fair compensation for its hard work. "The staff doesn't get paid much," Jamie said. And considering how important staff members' work is to the community, every penny matters. That's also where TechSoup comes in. TechSoup's Role: "Essential" Through TechSoup, eligible nonprofits can get MileIQ at 80 percent off the subscription rate. "Without TechSoup," Jamie noted, "this huge step up in technology" would not have been possible. The MileIQ discount program from Microsoft has made acquiring MileIQ way easier on the nonprofit's pocket. Having also previously obtained Microsoft Office 365 and QuickBooks Online through TechSoup, Jamie said, "TechSoup is a great equalizer." He mentioned that TechSoup helps a small nonprofit to grow into a technologically advanced organization. He added, "The super discounted products from TechSoup are like the pot of gold at the end of the rainbow." Getting MileIQ Premium Eligible nonprofits can get MileIQ at 80 percent off the individual subscription rate through TechSoup and can request an unlimited number of individual subscriptions. In addition to individual subscriptions, MileIQ is now included with an Office 365 Business Premium license. Nonprofits who currently do not have an Office 365 license can visit Microsoft's Office 365 for nonprofits page to register. This blog post was written by Nicholas Fuchs. spanhidden Full Article microsoft
of 5 Data Security Risks for Nonprofits (and How to Fix Them) By feeds.techsoup.org Published On :: Fri, 13 Oct 2017 19:56:00 GMT Many nonprofits handle sensitive personal information belonging to community members — whether it's names or email addresses or payment information. But are you handling this data properly to prevent a data breach? This post is by no means exhaustive — after all, every nonprofit handles different sorts of data, and each organization has different security needs. That said, these are some practical things to think about when you review your handling of sensitive personal information. #1 Risk: Malware and Software Vulnerabilities The Problem This one may seem obvious, but with so many other security risks out there, it's easy to forget that malware still poses a major threat to your organization's data. How You Can Mitigate It To start, make sure you have antivirus software installed, and that it's up to date. In addition, you'll want to make sure your operating system and any software installed are also up to date, with all security patches installed. Beyond that, be careful what you click on. Don't download and install software from sites you don't trust. Be careful of the email attachments and links you click on — even from people you know. If you aren't expecting a file or link, click with caution. #2 Risk: Ransomware The Problem Ransomware is an especially insidious form of malware that holds your computer or data hostage unless you pay a sum of money to a criminal actor. Oftentimes, ransomware will encrypt your data, preventing you from accessing it. And according to Symantec's Director of Security Response Kevin Haley, some forms of ransomware will threaten to publicly release your data. How You Can Mitigate It Aside from up-to-date antivirus software and taking steps to avoid infection in the first place, there isn't a ton you can do to deal with a ransomware attack once your data's been encrypted. In that case, according to Haley, keeping up-to-date backups of your data is your best bet. That way, you'll be able to get back up and running quickly with minimal data loss. (TechSoup offers backup and recovery solutions from Veritas.) #3 Risk: Public Wi-Fi The Problem Public Wi-Fi is generally fine for some things, such as browsing cat videos on YouTube, or catching up on the headlines. However, for anything involving sensitive personal information, it's a security disaster waiting to happen. Bad actors could potentially eavesdrop on what you're doing while using public Wi-Fi, leaving your data and work open to prying eyes. How You Can Mitigate It First off, avoid using public, unsecured Wi-Fi when handling sensitive information — whether it's internal organizational data or your own personal banking information. Using a wireless hotspot, like those from Mobile Beacon (offered through TechSoup), instead of public Wi-Fi is an easy way to keep your data more secure. If you can't avoid public Wi-Fi, a virtual private network (VPN) is a good option — VPNs secure data between your computer and the website you're visiting. Not all VPNs provide the same level of security, though, and you'll need to make sure your VPN of choice conforms to any data security regulations that your organization may be subject to. See our previous overview of VPNs for more. #4 Risk: Inappropriate Sharing of Sensitive Information The Problem Sharing sensitive information via email, messaging apps, or similar means is a risky proposition. Email is a notoriously insecure method of communication. Email accounts are often the target of data breaches and phishing attacks. (A phishing attack is where an attacker tries to steal your account information by tricking you to enter your account information on a phony login page.) And whether it's through email or messaging app, it's all too easy to accidentally leak data by sharing it with the wrong person. How You Can Mitigate It Avoid sending sensitive information to colleagues via email. It's easier said than done, we know. Maybe you need to share a list of donor contact information with your marketing department, for example. Consider uploading it to a secure file server on your network that can only be accessed by others in the office. If your organization uses a cloud storage service like Box, consider using that instead — so long as it meets your organization's security needs. These cloud storage services usually encrypt data you upload to prevent it from getting stolen. You may also want to consider using constituent relationship management (CRM) software, a tool designed specifically to store and manage your organization's contacts. In addition, pay attention to access permissions. If you can, restrict access to sensitive information to only those who need it. Revisit your permissions settings regularly and update them as needed. To prevent your user accounts from being compromised in the first place, practice good account security hygiene. Use strong passwords and require your staff to use two-factor authentication. #5 Risk: Handling Credit Card Data The Problem A breach involving credit card data can be embarrassing for your organization, but it could wreak financial havoc on your members and supporters. All it takes is for hackers to grab a few pieces of information to rack up credit card debt in your supporters' names. How You Can Mitigate It Securing credit card information is important, but you don't have to make it up as you go. Make sure your organization conforms to payment card security standards. The Payment Card Industry Security Standards Council, as well as banks and credit card issuers, provide guidelines on how to best handle credit card information to prevent breaches. Has your nonprofit recently encountered any other notable risks? Tell us about it in the comments! spanhidden Full Article security symantec2017 privacy databases
of TechSoup Member Little Brothers Friends of the Elderly Works to Alleviate Elder Isolation By feeds.techsoup.org Published On :: Wed, 18 Oct 2017 19:26:00 GMT (Please visit the site to view this video) Older adults are at an increased risk of lacking company and being socially isolated. Recent studies prove that a lack of social relationships is as strong a risk factor for mortality as are smoking, obesity, or a lack of physical activity. Enter Little Brothers. Little Brothers is an effort dedicated to spreading awareness and relieving isolation and loneliness in elders, a problem that often goes unseen. Little Brothers is in 7 U.S. cities and 10 countries worldwide. Its mission is carried out by more than one nonprofit organization. Little Brothers Friends of the Elderly San Francisco facilitates more than 4,000 friendly visits a year. Volunteers are matched with elders in San Francisco, and they form and build a relationship through home visits, outings, or common interests. We recently met with Andrew Butler, the program manager at Little Brothers Friends of the Elderly San Francisco. He explained that many volunteers form a relationship with an elder, and their stereotypes about older people are quickly broken down. "A lot of what we do is creating awareness. I think a lot of the information that we share through training or events really inspires people," said Butler. He also suggested that we speak with a member of Little Brothers Friends of the Elderly San Francisco, Andy Morgan, to get a proper feel for the organization. Andy Morgan is a highly spiritual 86-year-old who loves to read. Originally from Transylvania, Andy came to San Francisco in 1962 and has worked a variety of jobs throughout his life. However, he stresses that he has never defined himself by what he did for a living. Aside from books and his spirituality, Andy values personal relationships and enjoys company. Our conversation with Andy revealed why Little Brothers' impact matters so much. I wanted to ask if you have any main visitors. Andy Morgan: Yeah! I have one main visitor come every week. Rain or shine, he comes and sees me. He brings me food from Trader Joe's, and he does my laundry. Wow, that's a sweet deal. Would you share a particular visit that has stuck with you over the years? There's nothing that stands out; every visit is enjoyable. What we usually do is grab a spiritual book, you know, all those books over there are on spirituality, and we read from it and then we discuss it. I've been on the spiritual path since the 1960s, so if he has any questions, I can try and clarify. I was wondering what makes you happy. What makes me happy? Knowing that my within-ness, that which makes me breathe and which makes me exist, is pure joy and pure love. When you do a lot of meditation, something opens up within you, and I just feel, practically all the time, this feeling of love and joy and peace. Of course no one can maintain that 24/7, but I can always come back. If something goes wrong, I can just remind myself of my true nature. That's beautiful. Thank you so much for opening your home to us. My pleasure; it's been a joy having you guys. Could I just read you one very short poem? It says … Be as a Flower Truth is very simpleA flower does not try to be beautiful.Its True Nature is Beauty.Just by its Very Being. In the same way, when you AwakenTo your true nature,You will naturally exude Love,Compassion, Beauty.It is all you.For it is your True Self. (poem by Robert Adams) TechSoup is proud to support our member, Little Brothers Friends of the Elderly San Francisco, in its mission to spread awareness about and help elders at risk of loneliness and isolation. There are incredible people like Andy all over the world who are at risk of being forgotten. But they should never be. TechSoup provides technology and services to Little Brothers staff members to help run their nonprofit so that they can focus on fighting the effects of elder isolation. spanhidden Full Article
of The Future of Security Threats: New Risks, and an Old Threat Resurfaces By feeds.techsoup.org Published On :: Fri, 20 Oct 2017 14:46:00 GMT Computer and network security is an ever-evolving field. As technology advances, cybercriminals find new ways to exploit vulnerabilities in order to get at your personal, financial, or organizational data. We recently spoke with Symantec's Director of Security Response Kevin Haley to get an idea of what threats you'll face in the next year or two. In short, expect a continuation of common threats like ransomware, as well as the emergence of new threats from connected devices and the so-called Internet of Things. Plus, keep an eye out for the resurgence of an old threat made new. Ransomware with a Twist Ransomware — malicious software that locks your data or otherwise compromises your computer in an attempt to extort money — is not a new threat. It's been around for a number of years in various forms. But according to Haley, a new form of ransomware doesn't just lock your files; instead, it threatens to publicly release your data unless you pay up. For many individuals, this may simply mean an embarrassing leakage of personal data — browser history, emails, photos, and so on. For a nonprofit, especially one that deals with sensitive sociopolitical issues, the possibility of data leakage can have more serious ramifications. It could pose a threat to the community you serve. Email That Looks Like It Came from a Co-worker In traditional phishing attempts, scammers create an email that appears to be from a legitimate source — say, Google, Amazon, or Apple. Then they attempt to steal account information, such as usernames and passwords. But in an emerging form of phishing, hackers may use emails purportedly from co-workers or business associates to try to steal information from your organization. For example, Haley says, you may receive an email from a vendor or a colleague asking for specific pieces of information (such as tax forms) or for money outright. The only problem is that these emails originate from scammers, not your colleagues. And once you email an important piece of information to these impersonators, there's no way to get it back. With proper data handling, though, you can avoid these sorts of nightmares. See our recent post, 5 Data Security Risks for Nonprofits (and How to Fix Them), to learn more. The Internet of Things Can Make People Vulnerable From smart locks to Internet-connected appliances, the Internet of Things promises to change the way we interact with all sorts of items within our homes and offices. But with this comes the potential for security headaches. According to Haley, these "smart" devices are rarely protected properly, and are easy to infect with malware. And this isn't just an issue that may cause problems some years down the line. Last year, as CNET reported, a network of malware-infected DVRs and webcams overloaded a number of popular websites and online services, temporarily knocking them offline. Word Macro Viruses Make a Comeback Perhaps the most surprising threat Haley warned about was the revival of Word macro viruses. Macro viruses use Microsoft Word's macro programming feature — typically used to automate certain tasks within Word — to infect your computer. Macro viruses have been around for many, many years. And Word disables macros by default: If you open a Word document with a macro, you'll have to click a button to tell Word to turn on any macros within that document. With this new wave of macro viruses, however, criminals employ social engineering trickery to goad you into turning on macros, allowing the macro virus to do its thing. Fortunately, you can easily protect yourself from getting infected. First, don't open file attachments from people you don't know. If you receive a Word document with macros from someone you do know, confirm with that person to make sure that they intended to send the macros and that they are safe to run. As Always, Vigilance Is Key Although specific threats may evolve over time, good security practices never go out of style. Use a security software package and keep it updated. Enforce good account security practices within your organization. Don't open file attachments from people you don't know, and don't open unexpected file downloads. Secure all your devices as best you can. And if something seems fishy — perhaps that email from your boss doesn't seem quite right — don't be afraid to question it. By taking small steps like these, you might save yourself — and your organization — some serious pain. spanhidden Full Article security symantec2017
of Keep Your Data Safe: The Joy of Locking Your Computer By feeds.techsoup.org Published On :: Fri, 27 Oct 2017 17:36:00 GMT Here's a simple way to keep your data safe from potential bad actors in one easy step. Are you ready? Here it is: Log out and lock your computer whenever you're not in front of it. That's right, it's so simple it can almost be seen as an analog approach to cybersecurity. But make no mistake, all those in-depth disk encryption efforts can be rendered pointless. If you step away from your computer while it's on and unlocked, anyone passing by can access it. Working Remotely Promotes Data Vulnerability What's perhaps most insidious about someone gaining physical access to your computer is the fact that the attacker doesn't need any advanced technical know-how to steal sensitive information. A momentary lapse in vigilance at work or a coffee shop can result in a data breach of epic proportions. Let's say you're working remotely at your favorite café down the street from your apartment and you get up to put in an order for a late breakfast, forgetting to lock your laptop. During that brief moment, a low-key cybervillian could easily stick a USB drive into your computer and copy any sensitive files about you — or your organization — and leave undetected. Furthermore, if you were logged in to Gmail, your medical records, or your bank account, that malefactor could wreak havoc on your personal and professional life in a matter of minutes. Tips for Protecting Yourself The good news about all of this is that warding off these types of would-be data plunderers is really, really easy — it's simply a matter of using your operating system's screen locking functionality. If you don't want to do this, then at the very least you should log out of any sensitive online accounts whenever you step away from your machine. For each of the following options, be sure you are aware of the password connected to your user login before locking yourself (or anyone else) out. Screen Locking in Microsoft Windows Press Ctrl+Alt+Delete and select Lock this computer Press Windows+L Either of these will lock your computer and require a password to log back in. You can choose Control Panel > Personalization > Screen Saver Settings and set up a screen saver that provides a login screen to get back in once it's been initiated. Screen Locking in macOS On an external keyboard or older laptops, press Ctrl+Shift+Eject On a MacBook Air or Pro Retina, press Ctrl+Shift+Power You can also go to System Preferences > Security & Privacy > General and select Require password immediately after sleep or screen saver begins (provided you have already set up a screen saver by clicking System Preferences > Desktop & Screen Saver). Additional Cybersecurity Resources Find out how to recognize suspicious emails and protect yourself against malware through better password security Check out our recent post on the future of security threats Get more security tips from the National Cyber Security Alliance. National Cyber Security Awareness Month — observed every October — was created as a collaborative effort between government and industry to ensure that all Americans have the resources they need to stay safer and more secure online. Find out how you can get involved. Image: National Cyber Security Alliance spanhidden Full Article security symantec2017 privacy
of Free zones offer safe haven to investors By www.fdiintelligence.com Published On :: Tue, 17 Dec 2019 10:14:37 +0000 The chief executive of Ras Al Khaimah Economic Zone (RAKEZ), shares his views over the perks of free zones in emerging markets. Full Article
of Millions Of Guests Impacted In Marriott Data Breach, Again By packetstormsecurity.com Published On :: Wed, 01 Apr 2020 14:26:34 GMT Full Article headline hacker privacy bank cybercrime data loss fraud
of Microsoft Warns Hospitals About VPN Attacks During Coronavirus By packetstormsecurity.com Published On :: Thu, 02 Apr 2020 13:49:43 GMT Full Article headline hacker microsoft fraud cryptography
of Hackers Steal $25 Million Worth Of Cryptocurrency From Uniswap And Lendf.me By packetstormsecurity.com Published On :: Mon, 20 Apr 2020 15:06:39 GMT Full Article headline hacker bank cybercrime data loss fraud cryptography
of Verisk Maplecroft report predicts civil unrest to continue in 2020 By www.fdiintelligence.com Published On :: Thu, 16 Jan 2020 12:49:05 +0000 Escalation in protests across the globe in 2019 are forecast to persist into the new decade, according to Verisk Maplecroft report. Full Article
of Tirana: 100 years of growth By www.fdiintelligence.com Published On :: Thu, 06 Feb 2020 15:50:33 +0000 Celebrating its centennial, Albania’s capital is ranked among fDi’s top five mid-sized European Cities of the Future 2020/2021 for Cost Effectiveness Full Article
of US tops global soft power ranking By www.fdiintelligence.com Published On :: Thu, 05 Mar 2020 15:49:30 +0000 The US has the world’s strongest soft power, while China and Russia are rising in influence, according to a recent ranking from Brand Finance. Full Article
of UK regions fight for a share of inward investment By www.fdiintelligence.com Published On :: Tue, 25 Feb 2020 13:23:13 +0000 The UK’s prime minister has pledged to rebalance the UK economy away from a dominant London. However, this might require greater incentives for foreign investment in the regions outside of the capital, which are underperforming. Full Article
of fDi’s European Cities and Regions of the Future 2020/21 – Winners By www.fdiintelligence.com Published On :: Mon, 10 Feb 2020 16:15:38 +0000 In spite of the uncertainty caused by Brexit, London retains its position as fDi's European City of the Future for 2020/21, while Paris keeps the regional crown. Full Article
of fDi’s European Cities of the Future 2020/21 – London maintains European pre-eminence By www.fdiintelligence.com Published On :: Mon, 10 Feb 2020 16:21:08 +0000 London has retained its position as fDi’s European City of the Future, while Paris has climbed to second place, knocking Dublin into the third spot. Full Article
of fDi's European Cities and Regions of the Future 2020/21 - FDI Strategy: London and Glasgow take major prizes By www.fdiintelligence.com Published On :: Mon, 10 Feb 2020 16:22:35 +0000 London is crowned best major city in Europe in fDi's FDI Strategy category, with Glasgow, Vilnius, Reykjavik and Galway also winning out. Full Article