-
Russia admits that it has moved troops in Ukraine - Telegraph
-
8 МИ-24 и 3 МИ-8. Другое видео российских вежливых-боевых вертолетов над Севастополем.. - YouTube
-
Amsterdamse VVD wil camera's met gezichtsherkenning - Security.NL
-
GIAC Forensics, Management, Information, IT Security Certifications
-
Strikes, fouls aplenty in 2014 RSA Conference boycott, MLB HoF vote
-
SANS researchers warn RSA attendees about 2014 attack techniques
-
Drone Cargo Ships Will Make the Real World Work Like the Internet | Wired Business | Wired.com
-
Cryptocurrency-Stealing Malware Landscape | Dell SecureWorks
-
More Than 100 Flavors Of Malware Are Stealing Bitcoins -- Dark Reading
-
String of Social Media Scandals Plagues Military - NBC News.com
-
Fixing Trust Through Certificate Transparency | Threatpost | The first stop for security news
-
Fischer: Gay Activists Are 'Jack-Booted Homofascist Thugs' | Right Wing Watch
Friday, 28 February 2014
links of the day 03/01/2014 (a.m.)
Thursday, 27 February 2014
links of the day 02/28/2014 (a.m.)
-
« Ianoukovitch avait des aspects très sympathiques, avec de profonds complexes »
-
Ukrainians in Crimea seek protection and peace | Voices of Ukraine
-
Journalism Safety Organizations | Global Investigative Journalism Network
-
Investigative Journalism Organizations | Global Investigative Journalism Network
-
Investigative Journalism Manuals | Global Investigative Journalism Network
-
Center for Public Integrity | Investigative journalism from a nonprofit newsroom
-
International Journalism Network, Journalism Opportunities | IJNet
-
ICFJ - International Center for Journalists | Advancing Quality Journalism Worldwide
-
Online Journalism Review — Focusing on the future of digital journalism
-
Pew Research Center's Journalism Project | Understanding News in the Information Age
-
RSS it for Me! - RSS generator for Twitter (previously 'RSS 4 Twitter')
-
Search Europa - search engine for the 28 million europa.eu pages
-
Henk van Ess heet u welkom bij Voelspriet - zoekmachine, zoeknieuws, zoekhulp en zoekforum
-
Journalist's Toolbox Update: Feb. 25, 2014 - The Journalist's Toolbox
-
Publications | United Nations Educational, Scientific and Cultural Organization
-
Investigative “Stakeholder Media” Emerge in U.S., France | Global Investigative Journalism Network
-
Озброєні цивільні влаштували блокпости на в'їзді Криму - YouTube
-
verzekeringen-houthalen.be hacked. Notified by InvisableHacker
-
www.vruchtbaarheidscalculator.be hacked. Notified by Jingklong
-
Geld Janukovich niet veilig in Zwitserland - Buitenland - De Morgen
-
Veiligheidstroepen op de Krim in alarmtoestand - Buitenland - De Morgen
-
Rusland heeft 3,65 miljard euro investeringen voor de Krim - Buitenland - De Morgen
-
Poetin stuurt 'de Russische Klitsjko' naar de Krim - Buitenland - De Morgen
-
Opgefokte mannen en heel veel belangen: vijf vragen over de Krim - Buitenland - De Morgen
-
Europe - Oped: ‘Tymoshenko had her chance, now it's time to hit reset’ - France 24
-
Crimean parliament seizure inflames Russian-Ukrainian tensions - live | World news | theguardian.com
-
A Key NSA Overseer's Alarming Dismissal of Surveillance Critics - Conor Friedersdorf - The Atlantic
-
Ukrainian Journalists Rush To Fish Out Deposed President's Dirty Secrets
-
New FBI boss says cyber crime, not terrorism, is top of Feds' todo list • The Register
-
U.S. wants to store bulk metadata longer for defense in metadata privacy lawsuits | PCWorld
-
Cyber-Criminal Interest in Digital Currency Soaring: Dell SecureWorks
-
EE BrightBox routers can be hacked 'by simple copy/paste operation' • The Register
-
Schneier: NSA snooping tactics will be copied by criminals in 3 to 5 years • The Register
-
House of Representatives Committees – Parliament of Australia
-
Drones in the sky - technological marvel or threat to privacy?
-
Robot Swarm: A Flock Of Drones That Fly Autonomously : The Two-Way : NPR
-
US attorney general calls for data-breach notification law - Computerworld
-
Mt.Gox has VANISHED. So where have all the Bitcoins gone? • The Register
-
'Black Phone': This handset will SELF-DESTRUCT in 30 seconds • The Register
-
You can run, but you can't hide from IRST - Southern Maryland News
-
Homeland Security Today: Survey: Organizations Overlook Powerful New, Unknown Cyberthreats
-
Homeland Security Today: Companies Lack ‘BYOD’ Security, Study Found
-
Free Email Exposure Check (EEC) | Phishing Attack Surface | KnowBe4
-
Scientists demonstrate first contagious airborne WiFi virus | ScienceBlog.com
-
First contagious WiFi computer virus goes airborne | The Daily Caller
-
Healthcare organizations under siege from cyberattacks, study says - latimes.com
-
Pentagon Unveils Electro-Magnetic Spectrum Strategy | DoD Buzz
-
DoD, industry must learn to share radio spectrum as it grows more scarce - FederalNewsRadio.com
-
Army removes 588 troops from sensitive jobs - FederalNewsRadio.com
-
Navy to build its 'information dominance' forces through new command - FederalNewsRadio.com
-
Spy Chief James Clapper: We Can’t Stop Another Snowden - The Daily Beast
-
EU-parlement wil toetreding Oekraïne tot Europese Unie - Buitenland - De Morgen
links of the day 02/27/2014 (p.m.)
-
Nieuw Vlaams logo zegt Vlaming niets - Binnenland - De Morgen
-
Peumans (N-VA) moet niet weten van nieuw Vlaams logo - Wetstraat - De Morgen
-
Stromae heeft zijn zinnen op Rwanda gezet - Muzieknieuws - De Morgen
-
Verkoop onbetrouwbare financiële producten binnenkort verboden
-
Lanoye: "Discours westerse pers over Oeganda is bijna racistisch"
Tuesday, 25 February 2014
links of the day 02/26/2014 (a.m.)
-
Zeus variant hit Software-as-a-service applications
"The SaaS Security firm vendor Adallom, detected a malware-based campaign against Salesforce.com users, the Zeus variant used implements the web crawling capabilities to grab sensitive business data from the CRM. The attacks originated from Salesforce employee’s home computer, this variant of Zeus trojan crawled the site and created a real-time copy of the user’s Salesforce.com instance that included all the company account data. “We’ve been internally referring to this type of attack as “landmining”, since the attackers laid “landmines” on unmanaged devices used by employees to access company resources. The attackers, now bypassing traditional security measures, wait for the user to connect to *.my.salesforce.com in order to exfiltrate company data from the user’s Salesforce instance.” reported the official post issued mt Adallom. Experts at Adallom discovered the campaign because noted approximately 2GB of data been downloaded to the victim’s computer in a few minutes, the malware authors exploited Zeus Web inject capabilities for the purpose of data harvesting and exfiltration."
-
A Snapshot: 6 Rorschach Tests on the State of the International Order | Brookings Institution
-
The Danger of the New Internet Choke Points | Internet Society
-
Massachusetts Joins New Jersey In Demanding Police Warrants For Cell Phone Tracking
-
Why NSA Spying On The German Chancellor's Aides Matters | Bustle
-
UN Official: Israel Guilty Of ‘Inhuman’ And ‘Degrading’ Apartheid
-
Secretive Netflix-Comcast Deal Destroys Promise Of Net Neutrality
-
The Truth Behind Lazarenko’s Assets Recovery | Anticorruption Action Center
-
Robot cops take over streets of Kinshasa to tackle traffic chaos - CNN.com
-
Caphaw Banking Malware Distributed via YouTube Ads - The Hacker News
-
First Tor-Based Android Malware Spotted in the Wild - The Hacker News
"The Android Malware dubbed as 'Backdoor.AndroidOS.Torec.a', using Tor hidden service protocol for stealth communication with Command-and-Control servers. Researchers detected that the Trojan is running from .Onion Tor domain and working on the functionality of an open source Tor client for Android mobile devices, called 'Orbot', thus eliminating the threat of the botnet being detected and blocked by law enforcement authorities, although often it's not clear how many devices has been infected by this malware till now. "
-
Russian Ships Carrying Soldiers Said To Be En Route To Sevastopol
-
“WhatsApp Tricks” Apps Subscribe Android Users to Premium Mobile Services
-
5 Best WhatsApp alternatives with end-to-end Encryption - The Hacker News
-
Silent Circle's Blackphone - Privacy and Security Focused Smartphone for $629 - The Hacker News
-
Hackers can use common anti-theft tool to wipe devices remotely | ITProPortal.com
-
Anonymous targets 'Facebook Pedophiles' POSTs forces Facebook to take them down | TechWorm
-
U.N. Office Criticizes Australia Detention Policies - NYTimes.com
-
New iOS flaw makes devices susceptible to covert keylogging, researchers say | Ars Technica
-
Search for compromised Bitcoin addresses | Support | Trustwave
-
The real reason behind the confiscation of my passport | Islam21c
-
Breach Level Index | Data Breach Database & Risk Assessment Calculator
-
Pirate sites reportedly generate a whopping $227 million a year in ad revenue | Tech String
-
Apparent Theft at Mt. Gox Shakes Bitcoin World - NYTimes.com
-
ECB: New report on card fraud shows online fraud increased in 2012
-
Mt. Gox, once the world’s largest Bitcoin exchange, shuts down | Ars Technica
-
Major bitcoin exchange is insolvent, companies say - The Washington Post
-
Mt. Gox CEO Mark Karpeles Resigns from Bitcoin Foundation Board
-
Fiatleak - watch the world's currencies flow into BTC in realtime
-
How Ukraine Destroyed the Myth of Russia’s Great Power - Carnegie Europe
-
Charred bodies of the wounded found in remains of burnt Trade Union building | Voices of Ukraine
-
Eyewitness Account: Peaceful March Turned Bloody | Euromaidan PR
-
Conspiracy Theories by Cass R. Sunstein, Adrian Vermeule :: SSRN
-
Robert Reich: WhatsApp is everything wrong with the U.S. economy - Salon.com
-
Dwangsom dreigt voor privacyschending WhatsApp - Tech & Media - VK
-
Arizona passes law allowing shopkeepers to refuse to serve gay people
-
Harriet Harman admits paedophile group joined her civil liberties group in the 1970s
-
The Ukrainian oligarchs living it large in London - Telegraph
-
Publications | Centre for International Governance Innovation
-
Anonymous in Context: The Politics and Power behind the Mask
links of the day 02/25/2014 (p.m.)
-
Worse than Wal-Mart: Amazon's sick brutality and secret history of ruthlessly intimidating workers
-
The shelfie: the ultimate antidote to the selfie » Spectator Blogs
-
The Etonian, the SNP and the Black, Black Oil » Spectator Blogs
-
Found documents which Pshonka Yanukovych asked to enter a state of emergency
-
The list of needs of victims of Volyn activists Yevromaydanu
-
The head of the U.S. Treasury urged Ukraine to resume talks with the IMF,
-
Deputy Prime Minister Vilkul instructed to stop any payments, other than salary
-
Computer requirements of social insurance fund for 205 million. | OUR MONEY
-
National Bank has at times increased spending on mobile communication and 1.6 million | OUR MONEY
-
In regular Regions found the villa on the Spanish coast and an apartment in Barcelona | OUR MONEY
-
The sotnyk who turned it around: We had to break them down | Euromaidan PR
-
Was Ukrainian Police Shooting Deliberate? - Video on NBCNews.com
-
It is necessary to start the mechanism of civil arrest - Igor Lutsenko
-
Euromaidanpr - Look closely at the photo below. Closely! These are...
-
Filaret called Orthodox "immediately" join | Ukrainian Pravda _Zhyttya
-
Celestial hundreds of Instagram. Photo | Ukrainian Pravda _Zhyttya
-
First "antyterrorystycheskaya" - ohne capital in. Photo Essay | Ukrainian Pravda _Zhyttya
-
"Depeche Mode" canceled concert in Kiev | Ukrainian Pravda _Zhyttya
-
Three dozen Kiev berkutivtsiv fled together with weapons | Ukrainian Pravda
-
In the State Duma denies expedited issuance of passports in the Crimea, Russian | Ukrainian Pravda
-
Blog Eugene shank: Treasures Pshonka - A photo of the house bloody Attorney General
-
Zhirinovsky wants to ban "anti-Russian" artists from Ukraine | TabloID
-
Scriabin turned to eastern regions and urged not to fight. VIDEO | TabloID
-
Primeur in Spanje: 21-jarige veroordeeld voor "terroristische tweets"
-
Brusselse OCMW's: "De sociale situatie staat hier op ontploffen"
Monday, 24 February 2014
links of the day 02/25/2014 (a.m.)
-
Stop Censorship: Media must answer for censorship, lies and hate speech :: khpg.org.ua
-
Why Russia Doesn’t Understand the Uprising in Ukraine | Vanity Fair
-
Ukraine: Drone view of Maidan on morning after deadly Kiev clashes - YouTube
-
MP Moskal Releases Details on Perpetrators of Violence Against Protesters | Euromaidan PR
-
AN EYEWITNESS ACCOUNT OF THE NIGHT OF FEBRUARY 19th in the BATTLE FOR MAIDAN | Euromaidan PR
-
sorchan27@yahoo.co.uk bessie mjhiscock@gmail.com euphoria geedormehl@yahoo.co. - Pastebin.com
-
benchimolbruno@hotmail.com bene.palmieri@gmail.com benedetta.fallucchi@gmail.c - Pastebin.com
-
ian.mason@scotish-southern.co.uk ianarl stasa.strazisar@gmail.com logatecof5 d - Pastebin.com
-
Euromaidan: The Dark Shadows Of The Far-Right In Ukraine Protests
-
Inside ousted Ukrainian president Viktor Yanukovych's palace – video | World news | theguardian.com
-
Yanukovych secretly lived with girlfriend, Mezhyhirya explorers discover
Sunday, 23 February 2014
links of the day 02/24/2014 (a.m.)
-
"The Plague" returns to deface EC Council website | CSO Blogs
-
Back Track announced of its Closing - Cyber Kendra - Latest news on Technology and Cyber Security
-
draft-loreto-httpbis-trusted-proxy20-01 - Explicit Trusted Proxy in HTTP/2.0
-
Android iBanking Trojan Source Code Leaked Online - The Hacker News
-
Top 10 worst state-sponsored hack campaigns: From PRISM to Stuxnet and Mask - IT News from V3.co.uk
-
The Wild Wild Web: YouTube ads serving malware | Bromium Labs
-
Revealed: The Secrets of YIFY-Torrents' Network | TorrentFreak
-
Behind iPhone's Critical Security Bug, a Single Bad 'Goto' | Threat Level | Wired.com
-
Reading Between the Lines of Redacted NSA Documents | Threat Level | Wired.com
-
Why AT&T's Surveillance Report Omits 80 Million NSA Targets | Threat Level | Wired.com
-
Google will 'know you better than your intimate partner' — RT News
-
U.S. now bugging German ministers in place of Merkel - report | Reuters
-
Блог Євгена Чубука : Скарби Пшонки - фоторепортаж з будинку кривавого генпрокурора
-
The Medieval—and Highly Effective—Tactics of the Ukrainian Protests — War is Boring — Medium
-
Diploweb.com, revue geopolitique, articles, cartes, relations internationales