SORT BY Relevancy
It’s been a year since Target was breached, the first in a series of infamous attacks that culminated in a watershed year of retail breaches. Over the past 12 months, retailer after retailer have disclosed that their systems had been infiltrated and customer payment information stolen. Now that the holiday season is about to begin both online and in stores, will this be yet another season of nonstop gifting to cybercriminals? We’ll take look at what to expect from attackers—and their retailer targets.
In this week's episode of Discovering the Truth, Dan Duval will be going it solo to discuss the subconscious. He will be explaining how society can simply be understood as a program that is subconsciously instilled into the members of that society. Pivoting off of this revelation, Daniel will go deep into the functions of the subconscious and how it is revealed in the Bible as the heart. This concept will then be used as a platform to explain how the lives of individuals and even entire societies can be directed by hacking the subconscious. This is going to be and incredible episode you will need to hear more than once and definitely share with your friends!
in Self Help
Jesse Lawler is an entrepreneur, media producer, long-distance cyclist, and devout personal-optimization enthusiast. He is the founder of the mobile app company Evil Genius Technologies, and creator and host of the podcast Smart Drug Smarts.
Jesse's many interests have taken him far afield, including years-long dalliances with green-tech, software engineering, biological science, Hollywood filmmaking, and photography. He has followed a variety of diets, sleep hacks, and exercise regimens, and has been described by his less-experimental peers as "a high-functioning guinea pig."
In his popular podcast, Jesse interviews neuroscientists and leaders in the brain-optimization community, seeking insights to help enhance both his own cognition, and those of his listeners.
UNREDACTED with Rachel Marsden: Lifting the black ink to reveal the covert information and intelligence around global events.
Details about today's guests: www.unredactedshow.com/vault.html
Show website: www.unredactedshow.com
DSMA Live with Cherise, George and Scott with special guest John Costik.
John's son was diagnosed with type 1 diabetes at 4 years old. In order to help his son manage diabetes-he created tools to relieve the constant challenge of managing diabetes.
"There is so much more to be done, and we are not waiting." -John Costick
For more information about John, visit his website at Hacking Type 1 or follow him on twitter, @jcostik
"Hacking Law School: Creative Suggestions for Excellence and Expertise During Your Legal Education" is an unusual, behind-the-podium, 21st century approach to law school in an age where legal jobs for new graduates are scarce and the competition for them is brutal.
Lenese Herbert, Esq. is currently a Professor of Law at Howard Law School. Professor Herbert served as a Visiting Professor at Washington and Lee University School of Law from2007-08. Formerly, Professor Herbert was a Professor at Albany Law School and an Associate Professor of Law at Western New England College School of Law, where she began law teaching as an Assistant Professor in 1999.
Immediately prior to entering law teaching, Professor Herbert served as Assistant United States Attorney for the District of Columbia, criminal and civil divisions; Trial Attorney, Manipulation and Trade Practice Unit, Division of Enforcement, U.S. Commodity Futures Training Commission; and Attorney-Advisor, Chief Counsel's office, U.S. Department of Transportation. Prior to government service, Professor Herbert was a law clerk for George Haley and Associates. Professor Herbert assists attorneys who are seeking assistance with career transition within the law and on issues of career advancement for diverse attorneys.
in Self Help
"Why not say the truth? They didn’t do their best! I got the shaft!" Amy Eden
Our special guest on this episode of GUC is Amy Eden, creator of the outstanding blog, Guess What Normal Is. GWNI caters specifically to the needs of people who grew up in a chaotic childhood environment caused by chronic inconsistency, stress, emotional or physical abandonment and abuse, whether due to addictions, political unrest, war, or a parent’s mental health issues.
Today Amy is with us to disscect the phrase, "They Did The Best That They Could," and explain why she believes that although the phrase may be a well meaning one, it really just doesn't work.
Check out GWNI on Facebook and Twitter
Amy Eden is a writer living in Northern California. Her first book, The Kind Self-Healing Book: Raising Yourself Up with Compassion and Curiosity, will be released in March 2015. Amy works as a video producer for a West Coast-based publishing company. Since 1994, she has worked in publishing, including magazines, blogs, and books. As a freelance writer, she has written articles for Natural Health, Time Out New York, WGBH online, and more.
White hats are known to be the antitisis of all that groups such as anonymous stand for. Anonoymous claims to fight for freedom of information and see the Infosec community as the ones looking to withhold it.
Is it really that simple? Today well know white hat Robin Jacksin of WT Forensics discusses this dynamic and offers a glimpse of the world of a white hat, thier origins and how they see the free exchange of information and information security going hand in hand.
Robin is one of the early winners of DC3 "The annual contest, which started in 2006, is organized through the Department of Defense’s Cyber Crime Center, an agency that works to analyze data from electronic devices to aid in investigations related to everything from criminal matters to counterintelligence efforts (Allison Maier, helenair.com)"
He has been a polarizing figure in the hacking community since theearly days of 4chan and at pone point was believed to be the elusive "grey hat", Jester (@th3j35t3r).
Security threats constantly evolve as attackers find new ways to exploit applications, infrastructure, and users. And sometimes it can be hard to keep up.
Join David Rhoades and Steven Pinkham of Maven Security Consulting (www.mavensecurity.com) and Interop Radio host Curt Franklin as they discuss the latest developers in hacker tools and tricks. They’ll also talk about how IT can fight back, including new products, many of them free, that should be in IT’s tool kit.
Listeners will get up to speed on the state of the art in IT security and be better able to defend themselves and their organizations against new threats. The show will also cover the current landscape in regard to security and compliance legislation to ensure that IT practitioners are up to date on legal requirements to protect corporate data and customer privacy.
Listen live on Thursday August 7 and chat with David, Steven, and Curt for what’s sure to be an engaging and informative hour.
Join Ted Hicks (Dad, Husband & Son) as he moderates the #LNPShow that discusses the latest trends and game changers in parenting, technology, education, sports & product reviews.
Dan Olschwang - creator of the Dawn app, an app that allows parents to easily rate and identify fitting, constructive children’s apps and games. (Are our children lying about their age on social networking sites?) 810PM
Shawn Murphy - Security Expert & Private Giant CEO joins us to tell us how to protect yourself from holiday hackers while shopping online, in stores. 830PM
Samara Douglas - Educator discusses Common Core (experiences / trends / challenges) as we prepare to close out the calendar school year. 845PM
Tune in LIVE every WEDNESDAY at 8PM ET/ 5PM PT. To call in and be a part of the experience or listen via your mobile phone - Dial 347-857-1947. Stream us 24/7 at http://www.blogtalkradio.com/happyhournetwork to listen!
After years of enjoying some of the most secure machines online, lately the vaunted Mac has gotten some worms in its core. Everyone from CBS correspondent Sharyl Attkisson to 17,000 Macs that were recently infected with botnets were reported on media sources. To make matters worse, on October 21, Apple posted a security warning for users of its iCloud online storage service amid reports of a concerted effort to steal passwords and other data from people who use the popular service in China. Even a trio of Google security engineers chimed in by revealong how a design flaw in SSL (Secure Socket Layer) 3.0 could be exploited by criminals. Those hackers could use POODLE to steal browser session cookies, then use the cookies to impersonate victims at websites where they make online purchases, receive email or store files in cloud services. So if you are a mac user, you need to tune into this episode of Working the Web to Win before you come down with a Big Mac Attack.