Dit jaar is de Week van de Veiligheid!

Zologic en CyberPrevent steunen de Week van de veiligheid want cybercrime komt veel meer voor dan je denkt!

Je hoopt dat je er nooit mee te maken krijgt, een diefstal, spookfacturen of erger nog: een cyberoverval . Als het je dan toch overkomt, wil je weten hoe jij en je personeel moeten handelen.

Elke vorm van cybercrime heeft specifieke aandachtspunten. Maar met een aantal algemene stelregels kunt u de kans om slachtoffer te worden van cybercrime al flink verkleinen.

Hoe kan ik voorkomen dat ik slachtoffer word van cybercrime?

  • Wees terughoudend met het geven van persoonsgegevens op het internet. Denk daarbij niet alleen aan uw eigen gegevens, maar ook aan die van klanten, leveranciers en personeel. Eenmaal op internet geplaatste gegevens blijven ‘voor eeuwig’ beschikbaar.
  • Geef nooit uw inlog- of pincode af, ook niet als het verzoek afkomstig lijkt van een betrouwbare afzender.
  • Verwijder verdachte e-mails direct en klik nooit op een link die in de e-mail staat.
  • Zorg voor een goed werkende firewall. Een CyberPrevent houdt al het inkomende en uitgaande dataverkeer in de gaten en beoordeelt of iets doorgelaten kan worden of niet.
  • Houd uw software up-to-date. Sommige softwarefouten worden laat ontdekt en vormen een serieus beveiligingsrisico. Softwareleveranciers brengen regelmatig updates van hun software uit, zorg dat u deze updates automatisch installeert.
  • Ga niet onbezonnen in op aanbiedingen per mail maar verifieer altijd eerst of u met een bonafide instelling te maken heeft.Controleer het webadres, voordat u een betaling doet. Als een site nieuw voor u is, check dan altijd bij wie u inkoopt. Of het nu om een bank, een leverancier of een klant gaat.
    Stelt u zichzelf de volgende vragen:
    – Is het een bestaand bedrijf?
    – Staan alle contactgegevens vermeld?
    – Staan er privacy-, leverings- en betaalvoorwaarden op de site?
  • Blijf alert bij online betalingen. Een veilige betaalomgeving herkent u aan:
    – een beveiligde webpagina begint altijd met https, waarbij de ‘s’ staat voor secure
    – een hangslotje. Hier kunt u op klikken om de details van de site te controleren.
  • Zorg voor een back-up van uw documenten.
  • Doe altijd aangifte bij de politie wanneer je bedrijf te maken heeft gehad met cybercrime.
  • Bespreek bovenstaande zaken ook met uw personeel.

Speciaal om jou hierover te informeren, is er de Week van de Veiligheid. Ben jij voorbereid op criminaliteit? Bekijk de veiligheidsmiddelen die je helpen om je business veiliger te maken .  Download dan de poster en hang deze op in de kantine van jouw onderneming.

Wil je nog meer doen om cybercriminaliteit te voorkomen? Kijk dan ook eens naar het menu aan de linkerkant van deze pagina, gebruik de materialen en ga van start. Organiseer bijvoorbeeld een groepstraining, doe een veiligheidsscan, volg samen met je personeel een van de online trainingen of bestel de brochures voor meer veilige gevoel binnen uw organisatie.

 

Make a PIR speaker system

I enjoy projects that can be made using items from around the home. Add a Raspberry Pi and a few lines of code, and great joy can be had from producing something smart, connected and/or just plain silly.

The concept of the IoT Smart Lobby Welcoming Music System fits into this category. Take a speaker, add a Raspberry Pi and a PIR sensor (both staples of any maker household, and worthwhile investments for the budding builder), and you can create a motion-sensor welcome system for your home or office.

[DIY] Make a smart lobby music system for your office or home

With this project, you will be able to automate a welcoming music for either your smart home or your smart office. As long as someone is around, the music will keep playing your favorite playlist at home or a welcome music to greet your customers or business partners while they wait in the lobby of your office.

The Naran Build

IoT makers Naran have published their Smart Lobby build on Instructables, where you’ll find all the code and information you need to get making. You’ll also find their original walkthrough of how to use their free Prota OS for Raspberry Pi, which allows you to turn your Pi into a Smart Home hub.

Naran Prota IoT Sensor Speaker System

Their build allows you to use Telegram Bot to control the music played through their speaker. The music begins when movement is sensed, and you can control what happens next.

Telegram Bot for a Sensor Speaker System

It’s a great build for playing information for visitors or alerting you to an intrusion.

Tim Peake Welcoming Committee

A few months back, I made something similar in the lobby at Pi Towers:  I hid a sensor under our cardboard cutout of ESA astronaut Tim Peake. Visitors walking into the lobby triggered the sensor, and were treated to the opening music from 2001: A Space Odyssey.

Sadly, with the meeting rooms across the lobby in constant use, the prank didn’t last long.

Alex J’rassic on Twitter

In honour of the #Principia anniversary, I pimped out cardboard @astro_timpeake at @Raspberry_Pi Towers. Listen. https://t.co/MBUOjrARtI

If you’re curious, the Christmas tree should be a clue as to why Tim is dressed like a nativity angel.

The Homebrew Edition

If you’re like me, you learn best by doing. Our free resources allow you to develop new skills as you build. You can then blend the skills you have learned to create your own interesting projects. I was very new to digital making when I put together the music sensor in the lobby. The skills I had developed by following step-by-step project tutorials provided the foundations for something new and original.

Why not make your own welcoming system? The process could teach you new skills, and develop your understanding of the Raspberry Pi. If you’d like to have a go, I’d suggest trying out the Parent Detector. This will show you how to use a PIR sensor with your Raspberry Pi. Once you understand that process, try the Burping Jelly Baby project. This will teach you how to tell your Raspberry Pi when to play an MP3 based on a trigger, such as the poke of a finger or the detection of movement.

From there, you should have all the tools you need to make a speaker system that plays an MP3 when someone or something approaches. Why not have a go this weekend? If you do, tell us about your final build in the comments below.

The post Make a PIR speaker system appeared first on Raspberry Pi.


Source: RaspberryPi – IOT Anonimo

Source: Privacy Online

Source: Zologic

Source: Firedot Sensor

TekThing 115 – Nintendo Switch, Brave Browser Review, 1More Quad Driver, V-Moda Forza, Audeze iSine, Best Earbuds!

Nintendo Switch Battery Help, Brave Browser Review, 1More Quad Driver, V-Moda Forza, Audeze iSine, Best Earbuds!
——
01:31 Ninteno Switch
We’ve got Legend of Zelda™: Breath of the Wild, and a full review of Nintendo’s new home/mobile system in the video, including a tip on how to increase its battery life!
http://www.nintendo.com/switch/
http://amzn.to/2njDKBq
My portable battery for the Nintendo Switch:
Charging the Switch: http://amzn.to/2mLoSza
Charging the Switch: http://amzn.to/2njjQ9m

17:38 Brave Browser Review
Marcus writes, “Could you please review the brave browser on your show – are there any advantages over Chrome?” Absolutely! We talk about Brave browser’s built in ad blocking and privacy protection features, the Brave Payment system, and why you might want to run it in the video!
https://brave.com/

27:27 Best Earbuds!
1More’s Triple Driver earbuds are one of the best bargains in great audio we’ve heard… we review 1More’s new Quad Driver In-Ear, V-Moda’s Forza, and talk about the amazing Audeze iSine 10 and 20 in ear planar magnetic headphones!
https://usa.1more.com/products/triple-driver-in-ear-headphones
http://amzn.to/2mnP53O
https://usa.1more.com/products/1more-quad-driver-in-ear-headphones
http://v-moda.com/forza/
http://amzn.to/2njumh9
http://www.audeze.com/product-catalog/in-ear

38:53 Is My VPN Safe???
Doug writes ask@tekthing.com, “You have convinced me that having a VPN is necessary when using public WiFi. A few years ago, I bought a 3 year subscription to VPN Unlimited before a trip overseas. Have you heard anything about VPN Unlimited? Is it one of the decent ones, or should I look elsewhere?” We discuss VPN Unlimited’s features in the review, whether it works with Torrents, and why activists might want to look elsewhere (Props to TechRader for that one!) in the video!
https://www.vpnunlimitedapp.com/
http://www.techradar.com/reviews/pc-mac/software/utilities/keepsolid-vpn-unlimited-1325618/review

44:45 Do something Analog!
Like finding a 24 hour diner and getting an amazing breakfast on at 2AM!!!
——
Thank You Patrons! Without your support via patreon.com/tekthing, we wouldn’t be able to make the show for you every week!
https://www.patreon.com/tekthing
——
EMAIL US!
ask@tekthing.com
——
Amazon Associates: http://amzn.to/2gm9Egf
Subscribe: https://www.youtube.com/c/tekthing
——
Website: http://www.tekthing.com
RSS: http://feeds.feedburner.com/tekthing
THANKS!
HakShop: https://hakshop.myshopify.com/
——
SOCIAL IT UP!
Twitter: https://twitter.com/tekthing
Facebook: https://www.facebook.com/TekThing
Reddit: https://www.reddit.com/r/tekthingers
——

Source: Security news

Source: Zologic

Source: Firedot Sensor

Small European cybersecurity companies capitalise on an expanding market with EU support

The threat from cybercriminals shows no sign of abating, opening up opportunities for European companies to develop new tools to fight against threats – and win a greater share of one of the fastest growing markets in the IT sector.
Source: Cybersecurity and digital privacy newsletter

Source: Privacy Online

Source: Zologic

Source: Firedot Sensor

The WikiLeaks CIA release: When will we learn?

Location

United States

The WikiLeaks CIA release: When will we learn?

This article was originally published on The Conversation. Read the original article.

Richard Forno, University of Maryland, Baltimore County and Anupam Joshi, University of Maryland, Baltimore County

This week’s WikiLeaks release of what is apparently a trove of Central Intelligence Agency information related to its computer hacking should surprise no one: Despite its complaints of being targeted by cyberattackers from other countries, the U.S. does a fair amount of its own hacking. Multiple federal agencies are involved, including the CIA and the National Security Agency, and even friendly nations. These latest disclosures also remind us of the cybersecurity truism that any electronic device connected to a network can be hacked.

As cybersecurity researchers conducting a preliminary review of the data released in what WikiLeaks calls “Vault 7,” we find the documents mostly confirm existing knowledge about how common hacking is and how many potential targets there are in the world.

This round of leaks, of documents dating from 2013 to 2016, also reinforces perhaps the most troubling piece of information we already knew: Individuals and the government itself must step up cyberdefense efforts to protect sensitive information.

Almost everything is hackable

For years, security experts and researchers have warned that if something is connected to the internet it is vulnerable to attack. And spies around the world routinely gather intelligence electronically for diplomatic, economic and national security purposes.

As a result, we and others in the cybersecurity community were not surprised by the 2013 revelations from former NSA contractor Edward Snowden. We knew that the spying programs he disclosed were possible if not likely. By contrast, the general public and many politicians were astounded and worried by the Snowden documents, just as many citizens are surprised by this week’s WikiLeaks disclosure.

One element of the new WikiLeaks “Vault 7” release provides more insight into the scope of government spying. In a project called “Weeping Angel,” CIA hackers and their U.K. counterparts worked to turn Samsung F8000 smart television sets into remote surveillance tools. Hacked TV’s could record what their owners said nearby, even when they appeared to be turned off.

The fact that the CIA specifically targeted smart televisions should serve as yet another a wake-up call to the general public and technology manufacturers about cybersecurity issues inherent in modern devices. Specifically, “smart home” and Internet of Things devices represent a massive vulnerability. They are open to attack not only by government organizations seeking intelligence on national security information, but terrorists, criminals or other adversaries.

It’s not necessarily a good idea to have always-on and network-enabled microphones or cameras in every room of the house. Despite many of these devices being sold with insecure default settings, the market is growing very rapidly. More and more people are buying Google Home or Amazon Echo devices, Wi-Fi enabled baby monitors and even internet-connected home-security equipment.

These have already caused problems for families whose devices overheard a TV newscaster and ordered dollhouses or whose kids were tracked by a teddy bear. And large parts of the internet were disrupted when many “smart” devices were hijacked and used to attack other networked systems.

Phones were a key target

The CIA also explored ways to take control of smartphone operating systems, allowing the agency to monitor everything a phone’s user did, said or typed on the device. Doing so would provide a way around post-Snowden encrypted communications apps like WhatsApp and Signal. However, some of the CIA’s methods of attack have already been blocked by technology vendors’ security updates.

The CIA’s apparent ability to hack smartphones casts doubt on the need for officials’ repeated calls to weaken mobile phone encryption features. It also weakens the government’s claim that it must strengthen surveillance by not telling tech companies when it learns of security weaknesses in everyday products. Just like the door to your house, technological vulnerabilities work equally well in providing access to both “good guys” and “bad guys.”

Ultimately, as a society, we must continue to debate the trade-offs between the conveniences of modern technologies and security/privacy. There are definite benefits and conveniences from pervasive and wearable computing, smart cars and televisions, internet-enabled refrigerators and thermostats, and the like. But there are very real security and privacy concerns associated with installing and using them in our personal environments and private spaces. Additional problems can come from how our governments address these issues while respecting popular opinion and acknowledging the capabilities of modern technology.

As citizens, we must decide what level of risk we – as a nation, a society and as individuals – are willing to face when using internet-connected products.

We’re frequent attackers – but bad defenders

The WikiLeaks release also reconfirms a reality the U.S. might prefer to keep quiet: While the government objects to others’ offensive cyberattacks against the United States, we launch them too. This isn’t news, but it hurts America’s reputation as a fair and aboveboard player on the international stage. It also also reduces American officials’ credibility when they object to other countries’ electronic activities.

Leaks like this reveal America’s methods to the world, providing plenty of direction for adversaries who want to replicate what government agents do – or even potentially launch attacks that appear to come from American agencies to conceal their own involvement or deflect attribution.

But perhaps the most disturbing message the WikiLeaks disclosure represents is in the leak itself: It’s another high-profile, high-volume breach of information from a major U.S. government agency – and at least the third significant one from the secretive intelligence community.

Perhaps the largest U.S. government data loss incident was the 2014 Office of Personnel Management breach that affected more than 20 million current and former federal workers and their families (including this article’s authors). But the U.S. has never truly secured its digital data against cyberattackers. In the 1990s there was Moonlight Maze; in the 2000s there was Titan Rain. And that’s just for starters.

Our government needs to focus more on the mundane tasks of cyberdefense. Keeping others out of key systems is crucial to American national security, and to the proper function of our government, military and civilian systems.

Achieving this is no easy task. In the wake of this latest WikiLeaks release, it’s certain that the CIA and other agencies will further step up their insider-threat protections and other defenses. But part of the problem is the amount of data the country is trying to keep secret in the first place.

We recommend the federal government review its classification policies to determine, frankly, if too much information is needlessly declared secret. Reportedly, as many as 4.2 million people – federal employees and contractors – have security clearances. If so many people need or are given access to handle classified material, is there just too much of it to begin with? In any case, the information our government declares secret is available to a very large group of people.

If the U.S. is going to be successful at securing its crucial government information, it must do a better job managing the volume of information generated and controlling access to it, both authorized and otherwise. Granted, neither is an easy task. However, absent fundamental changes that fix the proverbial cult of classification, there likely will be many more WikiLeaks-type disclosures in the future.

Richard Forno, Senior Lecturer, Cybersecurity & Internet Researcher, University of Maryland, Baltimore County and Anupam Joshi, Oros Family Professor and Chair, Department of Computer Science & Electrical Engineering, University of Maryland, Baltimore County

This article was originally published on The Conversation. Read the original article.

The Conversation


Source: Cyber Law

Source: Privacy Online

Source: Zologic

Source: Firedot Sensor

Pi-powered Baby Busy Board

What’s small, squishy and guaranteed to be more interested in a springy door stopper than in the £100 toy you just bought for them?

A baby.

The author as a baby

This is me as a baby. I was going to use a standard Google Images baby, but instead I figured I’d use me. So here I am. Me in my infant form. Adorbs, right?

Sure, they’re cute. And that post-bath baby smell is intoxicating. We continue to spend our hard-earned money on toys for them, and they continue to be more interested in the box the toy came in. Perhaps it makes sense to give up on expensive toys, and get creative with various bits from around the house instead.

With this in mind, allow me to introduce the Pi-powered Busy Board: a pi-connected collection of things and stuff that make noises when you touch them. Aka Noisy Baby Paradise.

PI Powered Busy Board demo

I made a busy bored using a raspberry pi that can be found @ https://www.instructables.com/id/PI-Powered-Busy-Board/

Keeping baby busy

Kenny Lilly, father of a squishy baby from across the pond, used random noise makers from around his house and coupled them with a Raspberry Pi 3, an Adafruit Capacitive Touch HAT and some Bare Conductive paint.

Raspberry Pi Busy Baby Board

Kenny used stencils to create attractive shapes with the paint. He then hammered copper-plated nails through from the front of the busy board to the back, to create connections between the paint and the HAT.

Raspberry Pi Busy Baby Board

He used the Adafruit Python library to control the touch functions of the HAT. When the user interacts with the stenciled images, the HAT produces appropriate audio playback.

Raspberry Pi Busy Baby Board

Kenny used a second piece of wood to make the back of the board, and built a frame using thinner pieces of wood to create a space inside. The  electronics are sandwiched inside the Busy Board, and the whole build is then powered by a USB battery, like the one you may keep in your bag to recharge your mobile phone. Finally, with a small speaker connected to the Pi, the build was complete.

The full how-to for building the Pi-powered Busy Board can be found on Kenny’s Instructables page. And if there are any health and safety concerns regarding a small, slobbery baby playing with conductive paint, Bare Conductive assure their customers that their paint is safe and child-friendly. So there you have it. Baby Paradise.

Raspberry Pi Busy Baby Board

Have you used a Raspberry Pi to appease your infant overlord? Share your project in the comments below.

The post Pi-powered Baby Busy Board appeared first on Raspberry Pi.


Source: RaspberryPi – IOT Anonimo

Source: Privacy Online

Source: Zologic

Source: Firedot Sensor

International Women’s Day: Girls at Code Club

On International Women’s Day and every day, Raspberry Pi and Code Club are determined to support girls and women to fulfil their potential in the field of computing.

Code Club provides computing opportunities for kids aged nine to eleven within their local communities, and 40 percent of the children attending our 5000-plus UK clubs are girls. Code Club aims to inspire them to get excited about computer science and digital making, and to help them develop the skills and knowledge to succeed.

Big Birthday Bash Code Club Raspberry Pi Bag

Code Club’s broad appeal

From the very beginning, Code Club was designed to appeal equally to girls and boys. Co-founder Clare Sutcliffe describes how she took care to avoid anything that evoked gendered stereotypes:

When I was first designing Code Club – its brand, tone of voice and content – it was all with a gender-neutral feel firmly in mind. Anything that felt too gendered was ditched.

The resources that children use are selected to have broad appeal, engaging a wide range of interests. Code Club’s hosts and volunteers provide an environment that is welcoming and supportive.

Two girls coding at Code Club

A crucial challenge for the future is to sustain an interest in computing in girls as they enter their teenage years. As in other areas of science, technology, engineering and maths; early success for girls doesn’t yet feed through into pursuing higher qualifications or entering related careers in large numbers. What can we all do to make sure that interested and talented young women know that this exciting field is for them?

The post International Women’s Day: Girls at Code Club appeared first on Raspberry Pi.


Source: RaspberryPi – IOT Anonimo

Source: Privacy Online

Source: Zologic

Source: Firedot Sensor

Hak5 2126 – How to Write Bash Bunny Payloads & Contribute on GitHub

Writing Payloads for the Bash Bunny and contributing to the library on Github, this time on Hak5!
——————————-
Shop: http://www.hakshop.com
Support: http://www.patreon.com/threatwire
Subscribe: http://www.youtube.com/hak5
Our Site: http://www.hak5.org
Contact Us: http://www.twitter.com/hak5
Threat Wire RSS: https://shannonmorse.podbean.com/feed/
Threat Wire iTunes: https://itunes.apple.com/us/podcast/threat-wire/id1197048999
——————————

Bash Bunny GitHub: https://github.com/hak5/bashbunny-payloads

Bash Bunny: http://www.bashbunny.com

Bash Bunny Wiki: http://wiki.bashbunny.com/#!index.md

Hack Across the Planet: http://www.hackacrosstheplanet.com

We will be at AusCERT in May!

Source: Security news

Source: Zologic

Source: Firedot Sensor

Breaking Down Language Barriers in Smart Buildings

Have you ever wondered why the buildings that we live and work in aren’t smarter? I have. For example, why can’t the conference room I’m sitting in sense more people entering the room and dynamically increase the airflow through the vents? And why can’t the trash bins in the restroom be equipped with sensors that can automatically push a notification to the facilities team when they’re full, ensuring on-demand versus schedule-based maintenance?

Getting building systems to communicate with each other can take a lot of effort. One of the reasons connecting building systems together can be so difficult is many original equipment manufacturers (OEMs) use a homegrown data language within their system that has no meaning to the outside world. In other words, there’s a language barrier.

Let’s say we want to know the supply air temperature for an air handling unit (AHU), one vendor might term that BACnet point as “AHU1:Temperature” and another vendor might map the same BACNET point as “FLOOR1:AHU:Temperature”. Since there is no standardization at this layer, you would ultimately need a systems integrator to “map” these points together to create a consistent data model.

Also, temperature on its own lacks context, so we need additional data to decide whether anything needs to happen. Does the data reflect actual or target temperature? Which zone and floor within a building does it belong to? And are there occupants in that space?

 

The wheel of connectivity includes data, information, analytics, insight and action.

Standardizing system data

What’s needed is a standardized method for describing data, making it easier to analyze, visualize and derive value from our operational data. In fact, this is a main objective of Project Haystack, an open-source initiative created to streamline the integration of data from the Internet of Things (IoT).

Members of the initiative are standardizing semantic data models and web services with the goal of helping end users and solution providers unlock value from the vast quantity of data being generated by the smart devices found in our homes, buildings, factories and cities. This work currently targets applications in automation, control, energy, HVAC, lighting and other environmental systems.

I am thrilled to announce that Intel is joining Project Haystack as a Founder Member.  My colleague Rita Wouhaybi will be the technical liaison into Project Haystack, and I will serve as the business liaison and board member.

 

What Is Project Haystack?

Project Haystack is a community-driven standards body for defining semantic data models that ultimately bring meaning to smart device data. These efforts are also known as semantic tagging, metadata, or data modeling. The initiative is developing the following capabilities:

  • Metadata: A simple, extensible, and flexible tagging system to support a wide range of devices and setups.
  • Taxonomy: A library of tagging models to represent the data from a wide variety of equipment based on members’ proposals.
  • Communication protocol: A highly efficient REST API to simplify the exchange of Haystack tagged data among devices and across different applications.
  • Reference software implementations: Code implementations to ease integration into applications and products using various programming languages and platforms such as Java, C++, node.js, Dart, Niagara and Python.

 

Intel joins Project Haystack

Intel is participating in Project Haystack to help improve the data interoperability of building systems and accelerate end-user adoption of IoT-enabled smart building solutions. “As a developer and implementer of smart building technology, Intel’s involvement will raise the awareness of Project Haystack among a broader set of end users and solution providers, so they too can benefit from Project Haystack’s standardized data models,” said John Petze, executive director of Project Haystack.

“Project Haystack is the only standards body focused on defining standardized data models for building systems and objects; however, its data model framework is also applicable to industrial, manufacturing, retail, energy and other market segments that Intel serves. We will actively encourage other IoT standards bodies focusing on device interoperability to explore the extensibility of Project Haystack,” said Sunita Shenoy, director of smart building solutions at Intel.

 

Interoperability through standard data models

In partnership with other industry-wide organizations, Intel is working to establish IoT data standards and messaging protocols that allow vendors to provide integrated solutions. Likewise, Project Haystack is helping remove data model barriers that are inhibiting interoperability, thereby enabling more innovative, scalable and cost-effective solutions for smart buildings.

I believe that Intel’s membership in Project Haystack has the potential to accelerate end user adoption of IoT-enabled smart building solutions.

For more information about Intel’s solutions for smart buildings, visit intel.com/IoT/smartbuilding. To learn about the latest in Intel IoT developments, subscribe to our RSS feed for email notifications of blog updates, or visit intel.com/IoTLinkedInFacebook and.

 

Source: Network News

Source: Firedot Sensor

FCC Stays Privacy Regulations, CloudPets Ignores Hack, and 32 Million Yahoo Accounts Hacked – Threat Wire

The FCC stays privacy regulations for consumers, 32 million total yahoo accounts were hacked with that cookie problem a few months ago, and CloudPets is really digging themselves into a grave with this toy hack. All that coming up now on Threat Wire.

——————————-
Shop: http://www.hakshop.com
Support: http://www.patreon.com/threatwire
Subscribe: http://www.youtube.com/hak5
Our Site: http://www.hak5.org
Contact Us: http://www.twitter.com/hak5
Threat Wire RSS: https://shannonmorse.podbean.com/feed/
Threat Wire iTunes: https://itunes.apple.com/us/podcast/threat-wire/id1197048999
——————————

Links:

https://apps.fcc.gov/edocs_public/attachmatch/DOC-341937A1.pdf
https://www.hak5.org/episodes/threatwire/are-hacker-counterattacks-legal-threat-wire
https://transition.fcc.gov/Daily_Releases/Daily_Business/2017/db0301/DOC-343702A1.pdf
https://apps.fcc.gov/edocs_public/attachmatch/FCC-16-148A5.pdf
https://arstechnica.com/tech-policy/2017/02/fcc-head-ajit-pai-you-can-thank-me-for-carriers-new-unlimited-data-plans/
https://arstechnica.com/information-technology/2017/03/paid-data-cap-exemptions-can-still-be-big-despite-rise-of-unlimited-data/
https://arstechnica.com/information-technology/2017/03/robocalls-begone-fcc-seeks-to-block-calls-from-spoofed-numbers/
https://www.fcc.gov/news-events/blog/2017/03/02/springing-forward-public-interest-fcc%E2%80%99s-march-agenda

https://arstechnica.com/security/2017/03/marissa-mayer-forgoes-bonus-after-yahoo-botches-hack-investigation/
https://www.cnet.com/news/yahoo-says-forged-cookie-attack-accessed-about-32m-accounts/
https://investor.yahoo.net/secfiling.cfm?filingID=1193125-17-65791&CIK=1011006&soc_src=mail&soc_trk=ma

https://www.troyhunt.com/data-from-connected-cloudpets-teddy-bears-leaked-and-ransomed-exposing-kids-voice-messages/
http://www.networkworld.com/article/3175225/security/smart-teddy-bears-involved-in-a-contentious-data-breach.html

Youtube Thumbnail credit:
https://morningconsult.com/wp-content/uploads/2016/02/Ajit-Pai-2-1024×681.jpg

Source: Security news

Source: Zologic

Source: Firedot Sensor