Skip to main content

Home/ MOBIUS Libraries/ Group items tagged hack

Rss Feed Group items tagged

Justin Hopkins

How Apple and Amazon Security Flaws Led to My Epic Hacking | Gadget Lab | Wired.com - 0 views

  • They could have used my e-mail accounts to gain access to my online banking, or financial services. They could have used them to contact other people, and socially engineer them as well. As Ed Bott pointed out on TWiT.tv, my years as a technology journalist have put some very influential people in my address book. They could have been victimized too. Instead, the hackers just wanted to embarrass me, have some fun at my expense, and enrage my followers on Twitter by trolling.
  • I bought into the Apple account system originally to buy songs at 99 cents a pop, and over the years that same ID has evolved into a single point of entry that controls my phones, tablets, computers and data-driven life. With this AppleID, someone can make thousands of dollars of purchases in an instant, or do damage at a cost that you can’t put a price on.
  •  
    This is the rest of the story of the Wired.com writer who got hacked. It's really alarming how easily this was done and also the *why*. The hackers just liked his 3 character twitter user name (there obviously aren't a lot of short twitter user names) and were out to hijack it. Dude lost the photos of his kids first year and loads of other irreplaceable stuff when they remote wiped his phone and laptop to prevent him from taking his twitter account back.
Jennifer Parsons

Unprofessional Development: Katamari Hack - 2 views

  •  
    A hack you can stick in your browser window to make any web page Katamari Damacy!
  •  
    Can you repost the link? A giant ball just rolled over this page and now it's gone :(
Justin Hopkins

(2) Mind Hacks: Does bouncing your leg improve cognition? - Quora - 2 views

  • Bouncing your leg rhythmically improves cognition if it keeps you focused on your material instead of wishing you could be elsewhere, moving in another way, and therefore distracting you from your text. Your focus on your text and processing that text contribute to improved cognition. Whatever helps -- do it.
  • If you want to improve your cognition, start jumping rope. Aim to improve the number of times you skip rope without tripping the rope -- and improve by at least 1 count every day. Keep a chart. You will see that as your jumprope ability increases, your cognitive ability will also increase. I don't know if it is a 1:1 correlation, or even a causation. I do know there is some correlation because I have seen it in every one of my students.
  • "So why do kids with ADHD fidget and wiggle and run and jump and bounce and scream and play so much? Kids with ADHD are understimulated, which means that their thresholds are so high, that the stimuli in their environment does not cause them to release enough neurotransmitters to fit into all the necessary receptor sites. Messages don't pass from one neuron to another as easily as they do for those of us without ADHD. Their thresholds are high. Kids with ADHD fidget and squirm in order to provide extra stimulation, which translates into more keys fitting into more locks, and they can pass messages efficiently. Ever studied something intensely and then noticed that your leg was bouncing? Same thing. You were bouncing your leg to stimulate yourself and send a sufficient number of neurotransmitters into the synapse. When kids have to stimulate themselves, it can be hard on everyone around them, since this translates into bouncing off the walls."
  •  
    This is pretty remarkable. We've probably all noticed folks who bounce their leg when they're thinking hard about something. I've noticed that lately - having a lot to think about with Evergreen - that I've worked up quite a gum chewing habit. I often stop working to do pushups or whatnot as well. It really does help. Anyway, very cool read.
Justin Hopkins

Google Exec, Others Advise Tight Web Security After Writer Hack - 0 views

  •  
    If you don't already know what 2 factor authentication is - it's the use of a second out of band communication channel that is used in addition to your password. In the case of Google it means that when you go to log in they will send you a text message with a 6 digit numerical code that you'll type in as well. This means that would be hackers would need to not only know your password but also have physical access to your phone.  I've already enabled this feature for Google apps @mobiusconsortium.org - if you'd like to enable it for your account (it takes like 10 minutes to get set up and fix your applications) just let me know. 
anonymous

Generate and keep really secure passwords for free | ITworld - 0 views

  • Of course, they could look for a username that sounds like you in the list of 8 million LinkedIn and EHarmony logins and then just use the password published there, or the ones posted following the hack of 77 million user accounts at Sony or the 130 million credit-card accounts taken from the clearinghouse that processes your credit card payments, or tens of thousands lost by a New York electric utility or the California government services agency you thought was unquestionably trustworthy or the 24 million emails and user names swiped from Zappos or almost anywhere else.
  • you should use a different highly secure password at every site you use.
  • That way, no matter what web-site login database is breached next, your loss can be limited to only the information (or money) on that one site,
  • ...2 more annotations...
  • KeePass -- one of two apps with unquestioned leads; both come with Firefox and Internet Explorer extensions or web sites you can used independently; LastPass – the other of the two leaders. Both are stable, quick, reliable and free;
    • anonymous
       
      I've used LastPass. It's nice, but I prefer to have something local if possible. I'm not really concerned with their security, but it's nice to have your passwords offline.
  • KeePass;
    • anonymous
       
      This one doesn't have a browser integration but it can be kept on a usb key for portability
anonymous

New Attack Breaks Confidentiality Model of SSL, Allows Theft of Encrypted Cookies | thr... - 0 views

    • anonymous
       
      It's worth noting that to execute this attack you have to be on the network of your target and have the ability to execute a man in the middle attack.
  •  
    Two researchers have developed a new attack on TLS 1.0/SSL 3.0 that enables them to decrypt client requests on the fly and hijack supposedly confidential sessions with sensitive sites such as online banking, e-commerce and payment sites. The attack breaks the confidentiality model of the protocol and is the first known exploitation of a long-known flaw in TLS, potentially affecting the security of transactions on millions of sites.
anonymous

Survey Finds Secure Sites Not So Secure | threatpost - 0 views

  •  
    There is quite a bit of alarming data in what the project has gathered, and one of those pieces of information is that more than 148,000 of the sites surveyed are vulnerable to the BEAST attack, which was developed by researchers Juliano Rizzo and Thai Duong and disclosed last year. Their attack uses what's known as a chosen-plaintext attack against the AES implementation in the TLS 1.0 protocol and enables them to use a custom tool they wrote to steal and decrypt supposedly secure HTTPS cookies. The attacker can then hijack the victim's secure SSL session with a site such as an e-commerce site or online banking site.
adrienne_mobius

Changing the Face of Librarianship « Hack Library School - 1 views

  •  
    "You're not familiar with the Incunabula? Are you a librarian?"" If not, that's okay. "Our profession's new demands require librarians who can write regular expressions, tweak stylesheets, and manage databases."
Jennifer Parsons

[Series] Emerging Careers in Librarianship: Data Curation « Hack Library School - 0 views

  • Data curation is defined as “the active and ongoing management of data through its lifecycle of interest and usefulness to scholarship, science, and education.” (GSLIS) The volume of scientific data is growing exponentially across all scientific disciplines. This phenomenon has been termed the “data deluge.” The data deluge is now a fundamental characteristic of e-science and “big science,” especially in disciplines such as physics, astronomy, and earth and atmospheric sciences. Moreover, stakeholders are beginning to recognize the value in sharing data assets with each other and in curation of data for re-use over the long term. Competent information professionals are needed to curate this data for future research and education requirements.
  •  
    After the opening keynote at our conference, this seemed relevant.  I think the need for data curation will become more and more relevant as we move to a paperless society.  Though, given the challenges of what to preserve and how, that day may be long in coming.
1 - 10 of 10
Showing 20 items per page