Category Archives: Science

Mediating role of emotional labor in the association between emotional intelligence and fatigue among Chinese doctors: a cross-sectional study

bmcpublichealth.biomedcentral.com - The result of the present study showed that the mean score of fatigue was 8.02 ± 3.39 among Chinese doctors of Shenyang, Liaoning Province, and it was higher than the result of a previous study in th…


Tweeted by @3rdPillarHealth https://twitter.com/3rdPillarHealth/status/1020368116302442496

Encyclopedia of Cyber Warfare

tobem.com - This definitive reference resource on cyber warfare covers all aspects of this headline topic, providing historical context of cyber warfare and an examination its rapid development into a potent tec…


Tweeted by @CyberToolsBooks https://twitter.com/CyberToolsBooks/status/1020351527347720197

Counter Intelligence – Demonfuzz Records

redbullradio.com - That would be the the James Brown-penned and -produced Lyn Collins song “Think (About it)”, which has been sampled on more than 2,000 tracks, making it the third most-sampled track of all time.


Tweeted by @redbull_radio https://twitter.com/redbull_radio/status/1020319920775548929

Jason Abbey on LinkedIn: “To prevent a catastrophic situation caused by cyber crimes, stolen IP, or industrial espionage, companies should develop a multistep plan that prioritizes the value of data, determines the most critical and sensitive aspects of the business, and applies security measures accordingly. #ThomasForIndustry”

linkedin.com - To prevent a catastrophic situation caused by cyber crimes, stolen IP, or industrial espionage, companies should develop a multistep plan that prioritizes the value of data, determines the most criti…


Tweeted by @JasonAbbey https://twitter.com/JasonAbbey/status/1020280275685830656

icu svn reorg

docs.google.com - The ICU Subversion repository is being reorganized to combine icu, icu4j and tools in a common trunk. This will permit creating unified change lists covering both ICU4C and J, and tagging or branchin…


Tweeted by @kosikfl https://twitter.com/kosikfl/status/1020147170152833024

11 Ways (Not) to Get Hacked – Kubernetes

kubernetes.io - Kubernetes security has come a long way since the project's inception, but still contains some gotchas. Starting with the control plane, building up through workload and network security, and finishi…


Tweeted by @HCP_407 https://twitter.com/HCP_407/status/1020066466736066560

Threat Hunting Benefits

resources.infosecinstitute.com - Organizations are constantly being challenged by an increasing number of cybersecurity threats. As the severity and frequency of attacks rise, there is a call for a more proactive approach: threat hu…


Tweeted by @MigoKed https://twitter.com/MigoKed/status/1020060576813387776

Cyber Strategy

global.oup.com - Some pundits claim cyber weaponry is the most important military innovation in decades, a transformative new technology that promises a paralyzing first-strike advantage difficult for opponents to de…


Tweeted by @CyberStatecraft https://twitter.com/CyberStatecraft/status/1020038075521601536

Advanced persistent threat – Wikipedia

en.wikipedia.org - An advanced persistent threat is a set of stealthy and continuous computer hacking processes, often orchestrated by a person or persons targeting a specific entity. An APT usually targets either priv…


Tweeted by @ArthurSimpkins https://twitter.com/ArthurSimpkins/status/1019670963607126016

Frequent Smart Phone, Internet Use Linked To Symptoms Of ADHD in Teens

Most teens today own a smartphone and go online every day, and about a quarter of them use the internet "almost constantly," according to a 2015 report by the Pew Research Center. Now a study published this week in JAMA suggests that such frequent use of digital media by adolescents might increase their odds of developing symptoms of attention deficit hyperactivity disorder. From a report: "It's one of the first studies to look at modern digital media and ADHD risk," says psychologist Adam Leventhal, an associate professor of preventive medicine at the University of Southern California and an author of the study. When considered with previous research showing that greater social media use is associated with depression in teens, the new study suggests that "excessive digital media use doesn't seem to be great for [their] mental health," he adds. Previous research has shown that watching television or playing video games on a console put teenagers at a slightly higher risk of developing ADHD behaviors. But less is known about the impact of computers, tablets and smartphones.

Read more of this story at Slashdot.

CCDCOE

ccdcoe.org - In 2018, the NATO Cooperative Cyber Defence Centre of Excellence (CCDCOE) will be proud to host the tenth anniversary Conference on Cyber Conflict, CyCon X. To celebrate the decennial milestone, memb…


Tweeted by @DropTha_Mic25 https://twitter.com/DropTha_Mic25/status/1019541455889629184

Blackgear Cyberespionage Campaign Resurfaces, Abuses Social Media for C&C Communication – TrendLabs Security Intelligence Blog

blog.trendmicro.com - Blackgear (also known as Topgear and Comnie) is a cyberespionage campaign dating back to 2008, at least based on the Protux backdoor used by its operators. It targets organizations in Japan, South Ko…


Tweeted by @Gate_15_Analyst https://twitter.com/Gate_15_Analyst/status/1019534662589472768

Air Force Reserve

afreserve.com - Overview: The mission statement of the U.S. Air Force is to fly, fight and win...in air, space and cyberspace. The emerging 21st Century battleground is cyberspace; the computer networks and communic…


Tweeted by @AirForceReserve https://twitter.com/AirForceReserve/status/1019356092437016581

Traces of Lost Society Found in ‘Pristine’ Cloud Forest

Deep in Ecuador's lush Quijos Valley, a society thrived -- and then disappeared. But a lake preserved its story. From a report: In the 1850s, a team of botanists venturing into the cloud forest in the Quijos Valley of eastern Ecuador hacked their way through vegetation so thick they could barely make their way forward. This, they thought, was the heart of the pristine forest, a place where people had never gone. But they were very wrong. Indigenous Quijo groups had developed sophisticated agricultural settlements across the region, settlements that had been decimated with the arrival of Spanish explorers in the 1500s. In their absence, the forest sprung back. This process of societal collapse and forest reclamation is described in a new study published today in Nature Ecology and Evolution. The Quijos Valley lies in one of the most biodiverse cloud forests in the world, along a pre-Columbian trade route that linked the rich Amazonian lowlands with the high Andes. Thousands of people lived there centuries before the Spanish arrived, farming maize, squash, beans, and even passionfruit in poor soil of the valley floor. The study's researchers found a tiny lake in the valley and dug down into the silt at the bottom, pulling up a plug of sediment that had built up over the last 1000 years -- and found evidence of human occupation going back to the very oldest part of the core. In the oldest layers, scientists found tiny pieces of pollen -- swept from the valley and the surrounding forest into the lake by wind -- from maize and other plants that only grow in open, airy conditions, which told them that humans were cultivating plants on the valley floor. They also found plenty of charcoal bits, indications that people had lit fires nearby.

Read more of this story at Slashdot.

How To: Social Media Listening and Tools

igniteaction.co - “Finding information is what I do, everything has some sort of importance in context,” says Margaret Alldredge. As a social media professional who “listens” for clients, Alldredge searches for and fi…


Tweeted by @luciox34 https://twitter.com/luciox34/status/1019129089376993280

Giving Back in DFIR – Magnet Forensics Inc.

magnetforensics.com - A few months back I was on my way to BSides NoVa, having a conversation with someone competing in the CTF about where his team would donate the prize money to if they won. I suggested some organizati…


Tweeted by @DFIRTraining https://twitter.com/DFIRTraining/status/1019010574997286912

The 5 pillars of cloud data management

networkworld.com - As more and more businesses adopt cloud services, seizing on the latest software tools and development methodologies, the lines between them are blurring. What really distinguishes one business from …


Tweeted by @shanebrighton https://twitter.com/shanebrighton/status/1018887088526315525

%%title%%

thebetterindia.com - Just imagine being able to know what Dr A P J Abdul Kalam, who expired in July 2015, would have thought about today’s test firing of the supersonic missile or any other current issue of his interest.…


Tweeted by @thebetterindia https://twitter.com/thebetterindia/status/1018830172991180800

A Day in the life of an Analyst

analyticbridge.datasciencecentral.com - A typical day in the life of an Analyst An Analyst works on varied projects with multiple deliverables and varied duties depending on the business objectives. However there are some tasks that can be…


Tweeted by @DataScienceCtrl https://twitter.com/DataScienceCtrl/status/1018585745446129669

Threat Hunting Methodologies

resources.infosecinstitute.com - Threat hunting is a proactive and iterative approach to detecting threats. It falls under the active defense category of cybersecurity since it is carried out by a human analyst, despite heavily rely…


Tweeted by @MigoKed https://twitter.com/MigoKed/status/1017880270299639810

IOCs and Artifacts

resources.infosecinstitute.com - Unusual behavior of information technology assets within an organization may be a hint that the organization is undergoing a cyberattack. Threat-hunting teams will often assess the environment for co…


Tweeted by @Myinfosecfeed https://twitter.com/Myinfosecfeed/status/1017816597870862336

Data Science Roles: Who Does What?

edlitera.com - As Duke Economics professor Dan Ariely once famously said, big data is a lot like teenage sex: everyone talks about it, no one really knows how to do it, everyone thinks everyone else is doing it, so…


Tweeted by @Edlitera https://twitter.com/Edlitera/status/1017408650292236288