Supporting and growing the Raspberry Jam community

For almost five years, Raspberry Jams have created opportunities to welcome new people to the Raspberry Pi community, as well as providing a support network for people of all ages in digital making. All around the world, like-minded people meet up to discuss and share their latest projects, give workshops, and chat about all things Pi. Today, we are making it easier than ever to set up your own Raspberry Jam, thanks to a new Jam Guidebook, branding pack, and starter kit.

Raspberry Jam logo over world map

We think Jams provide lots of great learning opportunities and we’d like to see one in every community. We’re aware of Jams in 43 countries: most recently, we’ve seen new Jams start in Thailand, Trinidad and Tobago, and Honduras! The community team has been working on a plan to support and grow the amazing community of Jam makers around the world. Now it’s time to share the fantastic resources we have produced with you.

The Raspberry Jam Guidebook

One of the things we’ve been working on is a comprehensive Raspberry Jam Guidebook to help people set up their Jam. It’s packed full of advice gathered from the Raspberry Pi community, showing the many different types of Jam and how you can organise your own. It covers everything from promoting and structuring your Jam to managing finances: we’re sure you’ll find it useful. Download it now!

Image of Raspberry Jam Guidebook

Branding pack

One of the things many Jam organisers told us they needed was a set of assets to help with advertising. With that in mind, we’ve created a new branding pack for Jam organisers to use in their promotional materials. There’s a new Raspberry Jam logo, a set of poster templates, a set of graphical assets, and more. Download it now!

Starter kits

Finally, we’ve put together a Raspberry Jam starter kit containing stickers, flyers, printed worksheets, and lots more goodies to help people run their first Jam. Once you’ve submitted your first event to our Jam map, you can apply for your starter kit. Existing Jams won’t miss out either: they can apply for a kit when they submit their next event.

Image of Raspberry Jam starter kit contents

Find a Jam near you!

Take a look at the Jam map and see if there’s an event coming up near you. If you have kids, Jams can be a brilliant way to get them started with coding and making.

Can’t find a local Jam? Start one!

If you can’t find a Jam near you, you can start your own. You don’t have to organise it by yourself. Try to find some other people who would also like a Jam to go to, and get together with them. Work out where you could host your Jam and what form you’d like it to take. It’s OK to start small: just get some people together and see what happens. It’s worth looking at the Jam map to see if any Jams have happened nearby: just check the ‘Past Events’ box.

We have a Raspberry Jam Slack team where you can get help from other Jam organisers. Feel free to get in touch if you would like to join: just email and we’ll get back to you. You can also contact us if you need further support in general, or if you have feedback on the resources.


Many thanks to everyone who contributed to the guidebook and provided insights in the Jam survey. Thanks, too, to all Jam makers and volunteers around the world who do great work providing opportunities for people everywhere!

The post Supporting and growing the Raspberry Jam community appeared first on Raspberry Pi.

Source: RaspberryPi – IOT Anonimo

Source: Privacy Online

Source: Zologic

How to Disappear? Is it possible to move through a smart city undetected?

Even in the middle of major city, it’s possible to go off the grid. Last year, the Atlantic profiled a family in Washington, D.C., that harvests their entire household energy from a single, 1-kilowatt solar panel on a patch of cement in their backyard. Insulated, light-blocking blinds keep upstairs bedrooms cool at the peak of summer; in winter, the family gets by with low-tech solutions, like curling up with hot water bottles. “It’s a bit like camping,” one family member said.

If extricating yourself from the electrical grid is, to some degree, a test of moxie and patience, extracting yourself from the web of urban surveillance technology strains the limits of both. If you live in a dense urban environment, you are being watched, in all kinds of ways. A graphic released last month by the Future of Privacy Forum highlights just how many sensors, CCTCV cameras, RFID readers, and other nodes of observation might be eying you as you maneuver around a city’s blocks. As cities race to fit themselves with smart technologies, it’s nearly impossible to know precisely how much data they’re accumulating, how it’s being stored, or what they’ll do with it.

“By and large, right now, it’s the Wild West, and the sheriff is also the bad guy, or could be,” says Albert Gidari, the director of privacy at Stanford Law School’s Center for Internet and Society.

Read full story at CityLab


United States
Date published: 
April 25, 2017
Focus Area: 
Related Topics: 

Source: Cyber Law

Source: Privacy Online

Source: Zologic

Ultimate Minimalist Gaming Desktop Setup! – TekThing Short

I wanted to turn my office space into a peaceful haven of technology fit for video gaming and productivity. Check it out and make sure to subscribe for more!

**Have an idea for network shelving? Let me know in the comments so I can finally upgrade that cable management!**

VELCRO Thin Ties –
Philips Hue Go Light –
Philips Hue Lightstrip Plus –
Dell U3417W –
UT Wire Cable Station –
Anker USB Charger (New Model Available) –
Elago M2 Stand –
Corsair Gaming Wireless Headset –
The Anchor Headphone Stand Mount –
Razer BlackWidow Chroma V2 –
Razer Diamondblack Mouse –
Razer Firefly Mousepad –
Upwrite Updesk –
Sailor Moon Figurart Zero Figure –
Sailor Moon Funko POP! –

My gaming rig, built back in 2015:

Thank You Patrons! Without your support via, we wouldn’t be able to make the show for you every week!
Amazon Associates:

Source: Security news

Source: Zologic

Steal a Car With $22 in Tech, FCC Removes Price Caps, and Punycode is Full of Win – Threat Wire

The FCC still isn’t so keen on internet freedom, a new car could cost as little as $22, and it’s possible to phish people using Unicode. All that coming up now on Threat Wire.

Our Site:
Contact Us:
Threat Wire RSS:
Threat Wire iTunes:
Help us with Translations!


Editor: Perrin Murphy

Youtube Thumbnail credit:

Source: Security news

Source: Zologic

Anomali Weekly Threat Intelligence Briefing – April 25, 2017

Figure 1: IOC Summary Charts. These charts summarize the IOCs attached to this magazine and provide a glimpse of the threats discussed.

Trending Threats

This section provides summaries and links to the top threat intelligence stories from this past week. All IOCs from these stories are attached to this threat briefing and can be used for indicator matching against your logs.

Dridex Style Malspam Pushed Locky Ransomware Instead (April 21, 2017)
Researchers have discovered that malspam messages that follow known Dridex formats are instead sending Locky ransomware to recipients. Actors behind this campaign are sending malicious attachments impersonating payment receipts, and PDFs.
Recommendation: Always be cautious while reading email, in particular when it has attachments or comes with an urgent label or poor grammar. Use anti-spam and anti-virus protection, and avoid opening email from untrusted or unverified senders.
Tags: Malspam, Malware

MilkyDoor Android Malware uses SSH Tunnels to Access Secure Corporate Networks (April 21, 2017)
An Android malware called “Milkydoor” has been discovered to have been present in approximately 200 applications in the Google Play Store (Google has since removed the malicious applications). Researchers estimate that the malicious applications have been downloaded between 500,000 and one million times. Milkydoor uses SSH tunnels to allow the actors access to internal company networks.
Recommendation: Mobile applications should only be downloaded from official locations such as the Google Play Store and the Apple App Store. Websites and documents that request additional software is needed in order to access, or properly view content should be properly avoided. Additionally, mobile security applications provided from trusted vendors are recommended.
Tags: Mobile, Malicious Applications

Cardinal RAT Active for Over Two Years (April 20, 2017)
A new Remote Access Trojan (RAT) called “Cardinal,” has been discovered by Unit 42 researchers. Cardinal has been active for at least two years and is being distributed via malicious macros in Microsoft Excel documents that compile C Sharp source into an executable. Researchers believe that the small amount of samples discovered in the wild is because the malware has remained undetected for an extended period of time.
Recommendation: Ensure that your company’s firewall blocks all entry points for unauthorized users, and maintain records of how normal traffic appears on your network. Therefore, it will be easier to spot unusual traffic and connections to and from your network to potentially identify malicious activity.
Tags: Malware, RAT

Turn The Light On and Give Me Your Passwords (April 19, 2017)
Android users are being targeted with a banking trojan masquerading as a Flashlight application in the Google Play Store (Google has since removed the application). Researchers discovered that the malicious application called “Flashlight LED Widget” has been downloaded approximately 5,000 times. The trojan contained inside the application is capable of using overlays to target certain applications in order to steal banking information or credit card information.
Recommendation: If this application has been downloaded, a user can find in the Settings, Application Manager, and then Flashlight Widget. The application can be uninstalled by booting your device in Safe mode. Even though this application was in the Google Play Store, that is still the safest location to download applications. Additionally, anti-virus applications provided by trusted vendors should be employed.
Tags: Mobile, Malicious Applications

InterContinental Confirms Card Data Breach at Over 1,000 Locations (April 19, 2017)
InterContinental Hotels Group (IHG) has issued a statement confirming that approximately 1,000 of its locations in Puerto Rico and the U.S. have been compromised with information stealing malware. The malware searched for cardholder name, card number, expiration date, and internal verification code. They believe that malware was first present in some IHG payment systems on September 29, 2016 and lasted until December 29, 2016. However, IHG did not identify the unauthorized access until their systems were “investigated in February and March 2017” so it is possible that card data was stolen up until that time.
Recommendation: Customer facing companies that store credit card data must actively defend against Point-of-sales (POS) threats and stay on top of industry compliance requirements and regulations. All POS networks should be aggressively monitored for these type of threats. In the case of malware infection, the affected networks should be repopulated, and customers should be notified and potentially offered fraud protection to avoid negative media coverage and reputation.
Tags: Breach, POS

Flaw in Drupal Exposes 120,000 Sites to Attacks (April 19, 2017)
The security team for the open source Drupal platform have discovered a vulnerability in third-party module called “References.” Drupal did not release additional information about the vulnerability to assist in preventing exploitation, however, the team did release a security patch to fix the problem. Additionally, Drupal stated that they will be releasing more information about this vulnerability in the next few weeks.
Recommendation: Sometimes webmasters discover that one of their sites has been compromised months after the initial infection. Websites, much like personal workstations, require constant maintenance and upkeep in order to adapt to the latest threats. In addition to keeping server software up to date, it is critical that all external facing assets are monitored and scanned for vulnerabilities. The ability to easily restore from backup, incident response planning, and customer communication channels should all be established before a breach occurs.
Tags: Compromised websites

BankBot Trojan Found Lurking on Google Play (April 18, 2017)
An Android banking trojan called “BankBot,” which is based off of leaked source code of a different Android trojan, has been identified to have expanded its target list. Initially the malware was primarily targeting Russian users, but now BankBot is targeting users all over the world in attempts to steal financial data. Researchers discovered a target list that consists of over 400 applications associated with financial institutions around the globe. The malware is being distributed by masquerading as legitimate applications in the Google Play Store, and third-party application stores (Google has since removed the malicious applications).
Recommendation: Always keep your mobile phone fully patched with the latest security updates. Use the Google Play Store to obtain your software, and avoid downloading applications, even if they appear legitimate, from third-party stores. Additionally, do not rely on ratings alone for applications in the Google Play Store, further research into the applications is a good mitigation step because sometimes malicious applications make it into legitimate stores.
Tags: Mobile, Malicious Applications

Fake LinkedIn Emails Phishing Job Seekers (April 18, 2017)
A new phishing campaign has been identified to be targeting LinkedIn users. The actors behind the campaign are attempting to trick recipients into sending their curriculum vitae (CV). With the plethora of personal information contained in a CV, cybercriminals would be able to sell the information on underground forums or use it to further target individuals with additional phishing attacks.
Recommendation: Phishing continues to be one of the easiest ways for cybercriminals to make money quickly with a low level of technical expertise. Educate your employees on the dangers of phishing, how the attacks work, and how to avoid them. This includes the safe and proper use of email as well as web browsing activities.
Tags: Phishing

New Karmen Ransomware-as-a-Service Advertised on Hacking Forums (April 18, 2017)
Malware researchers have discovered a new Ransomware-as-a-Service (RaaS) called Karmen that is being advertised on a Russian cybercrime forum. The ransomware creators advertise multiple features, such as sandbox and virtual machine detection capabilities, undetected by anti-virus vendors, and access to a web-based control panel all available for purchase for $175.
Recommendation: Ransomware is a continually evolving threat. It is paramount to have a comprehensive and tested backup solution in place. If a reproducible backup is not available, there may a decryptor available that can assist in retrieving encrypted files. Additionally, educate your employees about the dangers of downloading applications when they are not offered from the website of the official provider/developer.
Tags: Ransomware, RaaS

CradleCore Ransomware Sold as Source Code (April 17, 2017)
Forcepoint researchers have discovered threat actors engaging in an interesting tactic while selling a new ransomware dubbed “CradleCore.” The cybercriminals behind the malware are offering the source for purchase for a negotiable price starting at 0.35 Bitcoins ($419). This tactic will likely cause new variants to be observed in the wild in the near future because the available source code will allow actors to customize the ransomware.
Recommendation: The ransomware landscape continues to evolve and become a larger cause for concern and potential risk. The use of endpoint prevention systems can make all the difference between infection or not. In the case of any ransomware infection, the victim should avoid paying the ransom, and the infected system should be wiped and reformatted.
Tags: Ransomware

This Phishing Attack is Almost Impossible to Detect on Chrome, Firefox, and Opera (April 17, 2017)
Researcher Xudong Zheng has discovered a new phishing attack that affects multiple web browsers. Zheng cautioned that actors can use vulnerabilities in Chrome, Firefox, and Opera web browsers to display fake domains to steal financial and login credentials. The style of attack that affects said web browsers is a “Homograph” attack which uses Unicode characters in the domain name to make a malicious website appear legitimate.
Recommendation: Your company should have appropriate anti-virus, anti-spam, and policies in place that will prevent your employees from visiting potentially malicious websites. Education is also a great mitigation technique that can assist your company in awareness of the risks posed by visiting less reputable online locations. Additionally, always ensure that your web browser kept up-to-date with latest versions as soon as possible.
Tags: Phishing, Homograph

Observed Threats

This section includes the top threats observed from the Anomali Community user base as well as sensors deployed by Anomali Labs. A ThreatStream account is required to view this section. Click here to request a trial.

Locky Tool Tip
Locky is ransomware that is widely spread via phishing messages. Locky first appeared in early 2016. Locky is strongly correlated with the cyber criminal groups related to the dridex and necurs botnets. Multiple waves of Locky samples are distributed daily. The delivery mechanism has evolved over time. The delivery mechanism has been spam messages with executable attachments, MS Word document attachments using Macros to retrieve then execute Locky, and Zip files that extract JavaScript loaders that retrieve then execute Locky. Hosts compromised by Locky display a ransom-note with instructions on how to decrypt the encrypted files. Encrypted files are renamed .locky or .zepto.
Tags: Locky, Ransomware

Source: Honeypot Tech

Pioneers events: what’s your jam?

We hope you’re as excited as we are about the launch of the second Pioneers challenge! While you form your teams and start thinking up ways to Make it Outdoors with tech, we’ve been thinking of different ways for you to come together to complete the challenge.

Pioneers: Make it Outdoors: Pioneers events

Team up!

In the last challenge, we saw many teams formed as part of after-school coding clubs or as a collection of best friends at the kitchen table. However, for some this may not be a viable option. Maybe your friends live too far away, or your school doesn’t have a coding club. Maybe you don’t have the time to dedicate to meeting up every week, but you do have a whole Saturday free.

If this is the case, you may want to consider running your Pioneers team as part of an event, such as a makerspace day or Raspberry Jam. Over the course of this second cycle, we’ll be building the number of Pioneers Events. Keep your eyes peeled for details as they are released!

HackLab on Twitter

And the HackLab #Pioneers team are off! Hundreds of laughable ideas pouring forth! @__MisterC__ @Raspberry_Pi #makeyourideas

Come together

Maker events provide the chance to meet other people who are into making things with technology. You’ll find people at events who are just getting started, as well as more expert types who are happy to give advice. This is true of Pioneers Events as well as Raspberry Jams.

Marie MIllward on Twitter

Planning new #makeyourideas Pioneers projects @LeedsRaspJam Did someone mention a robot…?

Raspberry Jams are the perfect place for Pioneers teams to meet and spend the day planning and experimenting with their build. If you’re taking part in Pioneers as part of an informal squad, you might find it helpful to come to your local Jam for input and support. Many Jams run on a monthly basis, so you’ll easily find enough time to complete the build over the space of two months. Make sure you carry on sharing your ideas via social media and email between meetings.

The kindness of strangers

If you are a regular at Raspberry Jams, or an organiser yourself, why not consider supporting some teenagers to take part in Pioneers and give them their first taste of making something using tech? We encourage our Pioneers to work together to discover and overcome problems as a team, and we urge all event organisers to minimise adult participation when overseeing a Pioneers build at an event. You can offer advice and answer some questions; just don’t take over.

HullRaspJam on Twitter

Any 11 – 15 year old coders in #Hull we will happily support you to #MakeYourIdeas – Get in touch!

There are many other ways for you to help. Imagine the wonderful ideas you can inspire in teens by taking your own creations to a Raspberry Jam! Have you built a live-streaming bird box? Or modified your bike with a Pi Zero? Maybe you’ve built a Pi-powered go-kart or wired your shoes to light up as you walk?

Pioneers is a programme to inspire teens to try digital making, but we also want to create a community of like-minded teens. If we can connect our Pioneers with the wonderful wider community of makers, through networks such as makerspaces, Coder Dojos, and Raspberry Jams, then we will truly start to make something great.

HackLab on Twitter

Are you 12-15yo & like making stuff? Come to @cammakespace 4 the world’s 1st @Raspberry_Pi #Pioneers Event! #FREE:

Running your own Jam and Pioneers events

For more information on Pioneers, check out the Pioneers website.

For more information on Raspberry Jams, including event schedules and how to start your own, visit the Raspberry Jam website.

Oh, and keep your eyes on this week’s blogs from tomorrow because … well … just do.


The post Pioneers events: what’s your jam? appeared first on Raspberry Pi.

Source: RaspberryPi – IOT Anonimo

Source: Privacy Online

Source: Zologic

Pioneers: the second challenge is…

Pioneers, your next challenge is here!

Do you like making things? Do you fancy trying something new? Are you aged 11 to 16? The Pioneers programme is ready to challenge you to create something new using technology.

As you’ll know if you took part last time, Pioneers challenges are themed. So here’s the lovely Ana from ZSL London Zoo to reveal the theme of the next challenge:

Your next challenge, if you choose to accept it, is…

MakeYourIdeas The second Pioneers challenge is here! Wahoo! Have you registered your team yet? Make sure you do. Head to the Pioneers website for more details:

Make it Outdoors

You have until the beginning of July to make something related to the outdoors. As Ana said, the outdoors is pretty big, so here are some ideas:

Resources and discounted kit

If you’re looking at all of these projects and thinking that you don’t know where to start, never fear! Our free resources offer a great starting point for any new project, and can help you to build on your existing skills and widen your scope for creating greatness.

We really want to see your creativity and ingenuity though, so we’d recommend using these projects as starting points rather than just working through the instructions. To help us out, the wonderful Pimoroni are offering 15 percent off kit for our Getting started with wearables and Getting started with picamera resources. You should also check out our new Poo near you resource for an example of a completely code-based project.

For this cycle of Pioneers, thanks to our friends at the Shell Centenary Scholarship Fund, we are making bursaries available to teams to cover the cost of these basic kits (one per team). This is for teens who haven’t taken part in digital making activities before, and for whom the financial commitment would be a barrier to taking part. Details about the bursaries and the discount will be sent to you when you register.

Your Pioneers team

We’ve introduced a few new things for this round of Pioneers, so pay special attention if you took part last time round!

Pioneers challenge: Make it Outdoors

We’re looking for UK-based teams of between two and five people, aged between 11 and 16, to work together to create something related to the outdoors. We’ve found that in our experience there are three main ways to run a Pioneers team. It’s up to you to decide how you’ll proceed when it comes to your participation in Pioneers.

  • You could organise a Group that meets once or twice a week. We find this method works well for school-based teams that can meet at the end of a school day for an hour or two every week.
  • You could mentor a Squad that is largely informal, where the members probably already have a good idea of what they’re doing. A Squad tends to be more independent, and meetings may be sporadic, informal or online only. This option isn’t recommended if it’s your first competition like this, or if you’re not a techie yourself.
  • You could join a local Event at a technology hub near you. We’re hoping to run more and more of these events around the country as Pioneers evolves and grows. If you think you’d like to help us run a Pioneers Event, get in touch! We love to hear from people who want to spread their love of making, and we’ll support you as much as we possibly can to get your event rocking along. If you want to run a Pioneers Event, you will need to preregister on the Pioneers website so that we can get you all the support you need well before you open your doors.


As always, we’re excited to watch the progress of your projects via social media channels such as Twitter, Instagram, and Snapchat. As you work on your build, make sure to share the ‘making of…’ stages with us using #MakeYourIdeas.

For inspiration from previous entries, here’s the winner announcement video for the last Pioneers challenge:

Winners of the first Pioneers challenge are…

After months of planning and making, the first round of Pioneers is over! We laid down the epic challenge of making us laugh. And boy, did the teams deliver. We can honestly say that my face hurt from all the laughing on judging day. Congratulations to everyone who took part.

Once you’ve picked a project, the first step is to register. What are you waiting for? Head to the Pioneers website to get started!

The post Pioneers: the second challenge is… appeared first on Raspberry Pi.

Source: RaspberryPi – IOT Anonimo

Source: Privacy Online

Source: Zologic

Tinkernut’s do-it-yourself Pi Zero audio HAT

Why buy a Raspberry Pi Zero audio HAT when Tinkernut can show you how to make your own?

Adding Audio Output To The Raspberry Pi Zero – Tinkernut Workbench

The Raspberry Pi Zero W is an amazing miniature computer piece of technology. I want to turn it into an epic portable Spotify radio that displays visuals such as Album Art. So in this new series called “Tinkernut Workbench”, I show you step by step what it takes to build a product from the ground up.

Raspberry Pi Zero audio

Unlike their grown-up siblings, the Pi Zero and Zero W lack an onboard audio jack, but that doesn’t stop you from using them to run an audio output. Various audio HATs exist on the market, from Adafruit, Pimoroni and Pi Supply to name a few, providing easy audio output for the Zero. But where would the fun be in a Tinkernut video that shows you how to attach a HAT?

Tinkernut Pi Zero Audio

“Take this audio HAT, press it onto the header pins and, errr, done? So … how was your day?”

DIY Audio: Tinkernut style

For the first video in his Hipster Spotify Radio using a Raspberry Pi Tinkernut Workbench series, Tinkernut – real name Daniel Davis – goes through the steps of researching, prototyping and finishing his own audio HAT for his newly acquired Raspberry Pi Zero W.

The build utilises the GPIO pins on the Zero W, specifically pins #18 and #13. FYI, this hidden gem of information comes from the Adafruit Pi Zero PWM Audio guide. Before he can use #18 and #13, header pins need to be soldered. If the thought of soldering pins to the Pi is somewhat daunting, check out the Pimoroni Hammer Header.

Pimoroni Hammer Header for Raspberry Pi

You’re welcome.

Once complete, with Raspbian installed on the micro SD, and SSH enabled for remote access, he’s ready to start prototyping.


Tinkernut uses two 270 ohm resistors, two 150 ohm resistors, two 10μf electrolytic capacitors, two 0.01 μf polyester film capacitors, an audio jack and some wire. You’ll also need a breadboard for prototyping. For the final build, you’ll need a single row female pin header and some prototyping board, if you want to join in at home.

Tinkernut audio board Raspberry Pi Zero W

It should look like this…hopefully.

Once the prototype is working to run audio through to a cheap speaker (thanks to an edit of the config.txt file), the final board can be finished.

What’s next?

The audio board is just one step in the build.

Spotify is such an awesome music service. Raspberry Pi Zero is such an awesome ultra-mini computing device. Obviously, combining the two is something I must do!!! The idea here is to make something that’s stylish, portable, can play Spotify, and hopefully also display visuals such as album art.

Subscribe to Tinkernut’s YouTube channel to keep up to date with the build, and check out some of his other Raspberry Pi builds, such as his cheap 360 video camera, security camera and digital vintage camera.

Have you made your own Raspberry Pi HAT? Show it off in the comments below!

The post Tinkernut’s do-it-yourself Pi Zero audio HAT appeared first on Raspberry Pi.

Source: RaspberryPi – IOT Anonimo

Source: Privacy Online

Source: Zologic

TekThing 121 – AMD Radeon RX 580 vs GTX 1060! Logitech G413 Gaming Keyboard, Pi-Hole vs. OpenDNS, UPDATE WINDOWS!!!

Logitech G413 Gaming Keyboard, Pi-Hole vs. OpenDNS, AMD Radeon RX 580 vs GTX 1060, UPDATE WINDOWS NOW!!!
00:43 AMD RX 500 Series GPUs
Is this the fastest GPU from AMD? PCPer’s Ryan Shrout joins us to talk Nvida Titan XP, and how AMD’s new Radeon 580 compares to Nvidia’s 1060!

08:54 Pi-Hole vs. OpenDNS
Sunny writes, “I was wondering if you could look into an open source product called Pi-hole.” She currently uses “OpenDNS and am a very happy customer of it but wanted to see if you could possibly do a comparison.” We explain the differences between a Raspberry Pi-Hole and OpenDNS in video!

19:47 Logitech G413 Gaming Keyboard Review
We love keyboards, and we love modestly priced mechanical keyboards for gaming even more! A full review of Logitech’s G413 Silver and its Romer-G keys is in the video.
There’s no dedicated volume/mute control, but you can hit FUNCTION and the F9-F12,

25:23 Update Windows Now!
In this week’s Threat Wire, Shannon talks about the latest security patches from Microsoft, and the big Shadow Brokers NSA hacking tools dump!

34:57 Do Something Analog…
Like Peter, who wrote, “This is what I did for something analog. I shoveled snow! One once, not twice, not thrice, but six total times across two days,” and sent a photo of the piles of snow he’s been fighting. Thanks, Peter!
Thank You Patrons! Without your support via, we wouldn’t be able to make the show for you every week!
Amazon Associates:

Source: Security news

Source: Zologic

The three ‘B's’ of cybersecurity for small businesses


United States
Large-scale cyberattacks with eye-watering statistics, like the breach of a billion Yahoo accounts in 2016, grab most of the headlines. But what often gets lost in the noise is how often small and medium-sized organizations find themselves under attack.
In the last year, half of American small businesses have been breached by hackers. That includes Meridian Health in Muncie, Indiana, where 1,200 workers’ W-2 forms were stolen when an employee was duped by an email purporting to come from a top company executive. Many small companies are just one fraudulent wire transfer away from going out of business.


Read full article at The Conversation

Focus Area: 
Publication Type: 
Other Writing
Publication Date: 
April 17, 2017

Source: Cyber Law

Source: Privacy Online

Source: Zologic