Professional Documents
Culture Documents
Cyber Men and Ladies
Cyber Men and Ladies
Cyber Men and Ladies
https://www.scribd.com/document/391453542/Cyber-Men-and-Ladies
---
System76 might not be the only Linux PC manufacturer on the market, but it's certainly one, if not
the, top Linux PC companies around. Offering pre-built Linux laptops, servers, and desktops,
System76 made the foray into the operating system space with its Pop!_OS, an Ubuntu derivative
which concentrates on makers and do-it-yourself (DIY) fanatics. However, System76 isn't just
providing a customized Linux distro. Now, the Denver, Colorado-based company prepares to launch
a set of open-source desktops.
https://www.electromaker.io/blog/article/system76-prepares-for-new-desktop-launch
---
Can lightning strike twice? The Teclast F7 which we reviewed previously has become an ideal laptop
for cost conscious-makers, needing a slim and light laptop but with a full 1080p screen.
The Teclast F5 is a much smaller laptop, in fact, it is smaller than a sheet of A4 paper at 27.4cm x
18.8cm x 1.2cm and it is light weighing only 1.1kg so you will not notice it in your rucksack.
Specifications
OS: Windows 10
128GB SSD
Bluetooth 4.2
WIFI: 802.11b/g/n/ac
1MP Webcam
Micro HDMI
1
2
https://www.electromaker.io/blog/article/teclast-f5-laptop-review
---
https://www.bellingcat.com/
British blogger Eliot Higgins and his investigative website Bellingcat make headlines around the
world. Eliot Higgins isn’t your typical journalist. A former video gamer, in the past he’s worked for a
bank, an oil rig company even a lingerie firm. Unlike old-school foreign correspondents, he uses
‘armchair analytics’ – what he calls ‘open source’ materials like Facebook, twitter and Google earth
to try to uncover what’s really going on in far away conflicts. Chemical weapons in Syria, the
downing of Malaysian Airlines flight MH17 over Ukraine and the attempted poisoning of Sergei and
Julia Skripal in Salisbury, he’s had one scoop after another. Mark Coles tries to discover more about
the man and how he is a pioneer in digital investigative journalism.
https://www.bbc.co.uk/programmes/p06nxbnd
---
https://www.gearbest.com/laptops/pp_1245434.html?wid=1433363¤cy=GBP&vip=4264395
&gclid=CjwKCAjwx7DeBRBJEiwA9MeX_LvoM1wTtqiCvLZdu_BlA2ceB0iaJvIpaQSJu-
_Incr31Jar9S6fdBoCmmcQAvD_BwE
---
https://uk.gearbest.com/laptops/pp_009491412269.html?wid=1433363¤cy=GBP&vip=14752
948&gclid=CjwKCAjwx7DeBRBJEiwA9MeX_Obvbg3pjWueCIuTzDAo2_P1d_x6bRtcNTewV_RCOvZWH
B4TNz2GnBoCaJoQAvD_BwE
2
3
---
Teclast
http://www.teclast.com/en/tablet.html
---
Electromaker
Electromaker is a free online publishing platform that showcases exciting projects built by makers
from around the globe. It also features news, review and tutorials on exciting hardware.
https://www.electromaker.io/?ref=producthunt
---
Notes Plus
Notes Plus is a powerful note-taking tool that has enabled many people to go completely paperless.
It was one of the few feature-rich iPad apps released right after the first iPad’s debut. Since 2010, it
has gone through 30 version upgrades and 3 complete overhauls, resulting in 8 million update
downloads by almost one million users.
http://www.writeon.cool/notes-plus/?ref=producthunt
---
https://www.peopleintouch.nl/
---
Blackbox
3
4
We are building a smart note-taking mobile app that instantly transcribes audio, makes voice
searchable and provides summary keywords for every conversation.
Professionals spend enormous amount of time taking notes during meetings and recalling what was
discussed during the meeting. Blackbox helps them do it instantly. Free 14 days trial & $8/month
premium.
https://www.blackboxai.tech/
---
Battreminder
Battreminder is a light-weight minimal browser extension, which lets you track your laptop's battery
level and reminds you with a sound notification when the battery is fully charged!
https://chrome.google.com/webstore/detail/battreminder/eolgelhflgphiebnjopklpnplinmemfi?ref=p
roducthunt
https://github.com/aniketkudale/battreminder?ref=producthunt
---
https://www.politico.eu/why-go-pro/
---
Meet Helm, the startup taking on Gmail with a server that runs in your home
Fee-based service couples the security of a private server with the reliability of the cloud.
https://arstechnica.com/information-technology/2018/10/meet-helm-the-startup-taking-on-gmail-
with-a-server-that-runs-in-your-home/?via=indexdotco
---
4
5
Vinpok Split
Vinpok Split is the perfect on-the-go external touchscreen monitor that turns your laptop into a full-
blown desktop. Weighing only 1.4lbs, this 15.6’’ monitor is your ultimate tool for boosting your
efficiency. 1080P high resolution and touchscreen functionality. Compatible with smartphone/ PS4 /
XBOX One / Nintendo Switch
https://www.indiegogo.com/projects/vinpok-split-best-on-the-go-touch-screen-monitor#/
https://split.vinpok.com/?ref=producthunt
---
Valossa
Valossa provides unparalleled AI-powered video recognition and content intelligence capabilities.
Oulu, FI
Team: lauripen
Valossa provides unparalleled video recognition and content intelligence capabilities to capture new
value of video. Valossa AI is a world-leading technology platform that enables a completely new
generation of analytics and content profiling tools bringing forward new ways of monetizing video.
The roots of the video AI company Valossa are in one of Europe’s leading computer science and AI
labs at the University of Oulu in Finland. During the years in the university research labs, the team
had seen how the world moved beyond text, with video playing a greater role in our daily
communication. This spawned an idea to use technology to automatically understand what we are
viewing and apply the latest techniques to meet the emerging needs of content producers globally.
Since their founding in 2015 Valossa has built next generation video intelligence tools for the benefit
of the businesses working with video.
http://valossa.com/
@ValossaInc
http://valossa.com/
---
New York City startup Clarifai thinks it can lighten the load with the help of artificial intelligence (AI).
It today announced an end-to-end moderation solution that taps computer vision to parse the
5
6
content of user-generated photos and videos, and, when it detects something offensive or
objectionable, flag them appropriately. It launches this week in public beta.
https://venturebeat.com/2018/10/16/clarifais-ai-can-detect-explicit-content-in-images-and-videos/
---
The one thing every serious world traveler needs to pack: Escape the Wolf – Personal Security
Handbook for the Traveling Professional.
Blend into the local culture more effectively using these insights on cultural practices, traditions and
customs.
Once only available to defense contractors and government employees, this same level of expert
advice is now available to the business traveler.
The author, Clinton Emerson, is a respected authority on mitigating risk for global travelers within
government security circles. In Escape the Wolf, he shares expertise in coping with various threats,
or wolves, that lurk in today’s world based on 20 years of government experience, his civilian travels
and being raised in Saudi Arabia.
In Escape the Wolf, travelers learn how to recognize, assess and avoid threats ranging from common
crime, illness, natural disasters, corporate espionage, or even terrorism using Escape the Wolf’s
proven Total Awareness? System.
Order a copy today for yourself and your employees who travel abroad to:
identify, avoid and minimize threats, and learn how to escape from threatening situations
know the key steps to take before you even set foot outside your front door
https://www.amazon.co.uk/gp/product/B0099BJENU/ref=oh_aui_d_detailpage_o02_?ie=UTF8&psc
=1
---
Signal is made for you. As an Open Source project supported by grants and donations, Signal can put
users first. There are no ads, no affiliate marketers, no creepy tracking. Just open technology for a
fast, simple, and secure messaging experience. The way it should be.
6
7
https://signal.org/
---
Safe
When used properly, ICLOAK can turn even virus infested computers into a secure computer. It's
designed to use anonymous networks like Tor to browse the internet Anonymously without leaving
any trace of internet activity on the computer.
Simple
With the touch of a button even the most non-technical person can secure their own computer.
Welcome to the world of knowing that you are using some of the best, most sophisticated tools that,
until now have only been the province of hackers, security professionals, governments and criminals.
Powerful
This tiny device contains an entire secure computer environment that you can use at home, at work,
or wherever you go. Until now, security pros, governments, hackers and cyber criminals have been
able to use these tools. Now, all of us have access to powerful security tools to protect our
passwords, money, safety and security.
https://icloak.me/
---
Camelot
https://github.com/socialcopsdev/camelot?ref=producthunt
---
SyncStop prevents accidental data exchange when your device is plugged into someone else’s
computer or a public charging station. SyncStop achieves this by blocking the data pins on any USB
cable and allowing only power to flow through. This minimizes opportunities to steal your data or
install malware on your mobile device.
SyncStop is the 'cased' version of the original USB Condom. We listened and spent some time
designing and manufacturing our own enclosure.
7
8
http://syncstop.com/
---
Reolink Go
https://reolink.com/product/reolink-go/?ref=producthunt
---
EverCam is designed from the ground up to offer wireless freedom. We eliminated power cables,
wall outlets, and the need to drill holes, giving you freedom to install EverCam practically anywhere.
We partnered up with Anker (the leader in charging technology) and developed battery technology
that runs for 365 days (or 3 years in Standby Mode).
Face-Recognizing Alerts | Motion Detection | 1080p Full HD | No Monthly Fee | Free Local Storage |
Night Vision | Weatherproof (IP66)
https://www.kickstarter.com/projects/1116368506/evercam-the-wirefree-security-cam-with-365-
day-
bat?ref=3ci076&utm_source=crowdcreate&utm_medium=cc_eufy_evercam&utm_content=cc_eufy
_evercam
---
Door opener for extremely fast door breaching. Quiet remote operation with Door Blaster Pack.
https://www.holmatro.com/en/special-tactics/productcategorie/78-breaching.html
Only one person is needed to operate the device, which can all be carried in its custom backpack.
8
9
This door breacher can open doors within seconds, making it faster and quieter than traditional
methods. The Holmatro Door Breacher is used for military and police operations and has a pushing
force of over 4 tons.
It's powered by a lightweight pump unit that is carried by the operator in a custom made backpack.
The device clamps onto the frame of the door, and with a push of the button, it opens doors in
under two seconds.
You can buy the Holmatro Door Breacher from the company website
---
THE DELFAST EBIKE GOES THE DISTANCE WITH A RECORD-SETTING BATTERY RANGE
https://www.digitaltrends.com/outdoors/long-distance-delfast-ebike/
http://delfastbikes.com/
---
Examples:
> Analyze user feedback and design specific actions for improvement
> Enrich your unstructured text with metadata and make it searchable
https://www.tagtog.net/
---
YubiKey 5 NFC
Single
9
10
Touch based authentication for NFC supported Android and iOS devices and applications
$45
https://www.yubico.com/product/yubikey-5-nfc/#yubikey-5-nfc
---
This is the official website of KeePass, the free, open source, light-weight and easy-to-use password
manager.
https://keepass.info/
---
SterJo Facebook Password Finder and many more - Recover forgotten Facebook password and many
more...
http://www.sterjosoft.com/
---
Stellar Phoenix Windows Password Recovery is a professional login password recovery tool to safely
reset the access passwords of all login and administrator accounts on Windows Xp, Vista, Windows 7
and Windows 8. It can also recover Windows passwords for several FTP clients, email clients, chat
messengers and web browsers in your PC.
http://www.mannatsoftware.com/stellar-phoenix-windows-password-recovery.html
http://www.mannatsoftware.com/password-recovery.html
---
10
11
This extension allows you to check your password on any website by double clicking or hovering over
the box
This basic chrome extension is designed to let you check the password you typed into the password
box so you can be sure you entered the correct password. By adding this extension you can view the
password as text on any website. By default you must double click on the password box to view the
password, alternatively you change the setting to display on hovering over the password box.
https://chrome.google.com/webstore/detail/check-my-
password/hfkkdbocalihgkgniglgildacnnfknke?ref=producthunt
---
Support Excel VBA Password Recovery & Word VBA Password Recovery
https://www.sysinfotools.com/recovery/vba-password-recovery.php
---
The Android Phone Recovery Stick is the ultimate recovery tool for anyone who wants to capture
currently-held and previously deleted information from an Android phone. New updated version
covers some of the latest Android operating systems.
https://www.spyequipmentuk.co.uk/android-phone-recovery-stick
---
Sku:TSP
Availability: In stock
The SIM Recovery Pro will recover all data such as phone number, deleted text messages saved to
SIM.
https://www.eyetek.co.uk/sim-card-deleted-text-spy
11
12
---
Kernel Data Recovery is an Information Technology company, providing technology solution for
critical data recovery needs and beyond. We are a matured IT solution provider, possessing an
experience of more than a decade in the realm of IT management solutions, offering diversified IT
solutions that surpasses standard service industry practices.
We cater the best and cost-efficient solutions in the entire data recovery market. With a wide
spectrum of software solutions, we streamline the entire concept of data & email recovery, data
security, data migration and other data management needs.
Our continuous research, unique approach and rigorous dedication towards technology deliver you
the right software solution to ensure every client meets the best and satisfactory results. more...
https://www.kerneldatarecovery.com/
---
Hunter lets you find email addresses in seconds and connect with the people that matter for your
business.
https://hunter.io/
---
If your Administrator's password is forgotten or lost you can reset local administrator and user
passwords on Windows XP / VISTA / 2003 / 2000 / NT /Server 2008 /Server 2012 / Windows 7 /
Windows 8 systems with Active@ Password Changer of Active@ Boot Disk.
Supports:
Detects:
Provides:
the opportunity to pick the right SAM before starting the password recovery process.
12
13
'Account is disabled', 'Password never expires', 'Account is locked out', 'User Must Change Password
at Next Logon' and 'Logon Hours' can be changed or reset.
With Active@ Password Changer you can simply choose the local user from the list to reset the
password.
http://www.boot-disk.com/password_changer.htm
https://www.makeuseof.com/tag/3-ways-to-reset-the-forgotten-windows-administrator-password/
---
Missing People offers a lifeline for the 250000 people who run away and go missing ... Missing
People is the only charity in the UK which is dedicated to bringing ..
https://www.google.co.uk/search?q=charity+Missing+People&oq=charity+Missing+People&aqs=chr
ome..69i57&sourceid=chrome&ie=UTF-8
---
https://www.scribd.com/document/387548483/Top-Links-September-2018
http://bit.ly/2wxDu8H
---
https://www.scribd.com/document/389880830/Top-Links-October-2018
http://bit.ly/2NWjE1J
---
Cybersecurity
https://www.scribd.com/document/351723386/Cyber-Security
http://bit.ly/2siZiDe
13
14
---
https://www.scribd.com/document/335465160/Robots-Coding-Children-s-Books
http://bit.ly/2iFebJf
---
https://www.scribd.com/document/364858625/Windows-Setup-Security-Maintenance
http://bit.ly/2zRFuLM
---
Top Research Links on the very reliable and very secure SCRIBD Platform
https://www.scribd.com/document/307172389/My-Professional-Research-Links
bit.ly/PND2016
---
Consultancy Pages
https://www.scribd.com/user/6985819/Andrew-Thompson
---
https://www.scribd.com/document/335059474/Reading-List-2017
---
14
15
https://www.scribd.com/document/369561967/Running-Stuff-2018
http://bit.ly/2DtSE4n
---
https://www.scribd.com/document/368716269/Andrew-Thompson-Biking-Stuff
---
Alternatives to TrueCrypt for Windows, Mac, Linux, Android, iPhone and more. Filter by license to
discover only free or Open Source alternatives. This list contains a total of 25+ apps similar to
TrueCrypt.
TrueCrypt is a freeware utility used for on-the-fly encryption (OTFE). If your looking for more info
about TrueCrypt like screenshots, reviews and comments you should visit our info page about it.
Below you find the best alternatives.
https://alternativeto.net/software/truecrypt/
---
Dell tries to make durable laptops more modern with updated Latitude rugged line
https://arstechnica.com/gadgets/2018/10/dell-refreshes-its-latitude-rugged-laptop-line-with-three-
new-models/?via=indexdotco
---
IDS-Israel Defense Store - Green IDF Parka mega warm got one...
15
16
https://www.israeldefensestore.com/inter/winter-gear-sale-2018.html
Israel Special Forces IDF Scout Leather Commando Boots - Mega comfortable - Leather and Vegan
Options...got desert pair...
https://www.israeldefensestore.com/inter/outdoors/clothing/scout-commando-boots-palladium-
style.html
https://www.israeldefensestore.com/inter/tactical/bullet-proof.html
---
This is how government spyware StrongPity uses security researchers' work against them
While researchers are looking forward, hackers are going back to their roots to create new attacks
from the ashes of old ones.
https://www.zdnet.com/article/this-is-how-promethium-malware-operators-used-security-
research-bulletins-in-their-favor/?via=indexdotco
---
Korean Nong Shim Hot & Spicy Noodle Big Bowl - 16 Bowl - Ring of Fire - Mount Doom...
by Nong Shim
https://www.amazon.co.uk/Korean-Nong-Shim-Spicy-
Noodle/dp/B00AZHI8VQ/ref=sr_1_17_a_it?ie=UTF8&qid=1540323958&sr=8-
17&keywords=spicy+noodles
---
Kraken Cryptor ransomware merges with Fallout exploit kit, fees slashed to gain followers
https://www.zdnet.com/article/kraken-cryptor-ransomware-merges-with-fallout-exploit-
kit/?via=indexdotco
16
17
---
Rockville, Md.-based INKY makes a cloud-based email security platform powered by unique
computer vision, artificial intelligence and machine learning.
The company has a main goal to stop attacks on company inboxes, allow people to have confidence
in the messages they are receiving and know that the people interacting with them are who they say
they are, INKY Cofounder and CEO Dave Baggett told Technical.ly. Baggett also cofounded ITA
Software, the airfare search company purchased by Google in 2011 for $730 million which now
powers Google Flights.
https://technical.ly/dc/2018/10/31/this-email-protection-startup-just-released-its-flagship-anti-
phishing-solution/?via=indexdotco
---
Metalyfe
Barcelona, ES
Introducing Metalyfe, the world’s first server-less browsing platform. A modern browser redefining
how to consume and interact with the digital world with a focus on providing the highest level of
web security and data privacy.
We are excited to announce the launch of the desktop version for Mac, Windows and Linux, now
available through the Metalyfe.com website. This new innovative browser utilizes blockchain
technology to create a portal to the new era of Web 3.0 decentralized applications and processes.
After three years of hard work we are finally releasing our blockchain browser to the public:
https://medium.com/metalyfe/metalyfe-your-first-blockchain-browser-cb296258dc40
https://www.metalyfe.com/
---
BFS-Auto can achieve high-speed and high-definition book digitization at over 250 pages/min using
the original media format. This performance is realized by three key points: high-speed fully-
automated page flipping, real-time 3D recognition of the flipped pages, and high-accuracy
restoration to a flat document image.
http://www.k2.t.u-tokyo.ac.jp/vision/BFS-Auto/index-e.html
17
18
---
Trazor: The first all-in-one shaving system for men & women
Accepts over 40 different razor blades and includes built-in features for ultimate comfort &
convenience giving you a luxurious shave
https://www.kickstarter.com/projects/1407866020/trazor-the-first-all-in-one-shaving-system-for-
men?ref=producthunt
---
Credo360
San Diego, US
Credo360 (or simply Credo) is an independent social credibility system that helps you trade safely
with people on any platform, online or in person. With Credo you can:
- Chat with people without revealing your full name, phone number, or email.
- Make and accept payments using your favorite payment methods (including cryptocurrencies).
- Rate and review your experiences with people you’ve dealt with.
After you sign up, you’ll get a trust score (also called Credo Score). You can get a good score by
verifying your identity and having a few friends vouch for you. But getting an "excellent" score will
require positive feedback from people you deal with - so, it will take time.
Your Credo Score is not tied to any marketplace - so, you can use it on any platform!
https://www.credo360.com/
---
What we do
Mission
Our mission is to reduce the risk of violence and aggression through campaigning, education and
support.
Vision
18
19
Our vision is a society in which people are safer - and feel safer - from violence and aggression; we
want people to be able to live life to the full.
https://www.suzylamplugh.org/
---
National Personal Safety Day 2018 will be held on 8th November highlighting issues relating to
personal safety in the workplace with a particular focus on the retail sector.
We'll be launching the results of our retail personal safety survey and our code for staying safe in the
workplace in a pamphlet and poster to be made available on our website on the day. Watch this
space for more information!
https://www.suzylamplugh.org/national-personal-safety-day-8th-november-2018
---
News Bling
News Bling is a 5 min daily newsletter that exposes readers to liberal and conservatives news
outlets. Our goal is to get Millennials and Gen Zs out of their political bubble and help bridge the
growing gap between liberals and conservatives. We believe the media is becoming increasingly
biased. Our nonpartisan newsletter helps expose the bias by taking headlines from outlets like CNN
and Fox News and putting them next to each other.
https://newsbling.co/
---
Why do people vent such toxic opinions online? Filmmaker Kyrre Lien spent three years travelling
the world to find out who these anonymous ‘internet warriors’ are and why they do it.
https://www.producthunt.com/posts/the-internet-warriors
https://theinternetwarriors.com/?ref=producthunt
19
20
---
Dr. Link Check scans your website for broken and malicious links. The service crawls through the
entire code of the site and examines page links as well as links to images, style sheets, and other
resources.
Results can be filtered in various ways or exported for further processing in other tools. You can also
schedule checks to run automatically on a regular basis and get notified about problems via email.
https://www.drlinkcheck.com/
---
As a top developer of drone technology, and a leading global exporter of military drones, Israel has
leveraged its know-how to develop a significant commercial drone market, with some startups in the
industry generating international headlines for their innovative tech solutions.
http://nocamels.com/2018/10/8-israeli-startups-drone-tech-heights/
---
https://myemail.constantcontact.com/From-Andrew-Thompson---I-am-a-Professional-Researcher---
We-are-Local-.html?soid=1131491130632&aid=1cXDDHNj_tE
---
Munchron makes no medical claims and is fully autonomous using Machine Learning and A.I.
Our new STD/STI detection has the ability to scan 10 of the most common Sexually Transmitted
Diseases and HIV/AIDS skin rashes that are known to be skin-identifiable by Physicians.
20
21
Tool does NOT act as a diagnosis but offers encouragement to users to seek medical attention to
hopefully confirm if detection is accurate.
https://munchron.com/login/registration.php?ref=producthunt
---
Here are 25 of the most innovative new projects using tech to help refugees and NGOs
https://techcrunch.com/2018/10/27/here-are-25-of-the-most-innovative-new-projects-using-tech-
to-help-refugees-and-ngos/?via=indexdotco&guccounter=1
---
https://www.newsbytesapp.com/timeline/Science/35059/155062/how-to-protect-your-computer-
from-hidden-cryptomining?via=indexdotco
---
https://threatpost.com/threatlist-3-out-of-4-employees-pose-a-security-risk-to-
businesses/138506/?via=indexdotco
---
At Naked Prosthetics, we provide digit amputees with functional, body-powered prosthetic devices.
https://www.npdevices.com/
---
Curated Directory of
21
22
https://financelinx.com/?ref=producthunt
---
Innovation Posters
Our innovation posters have already spiced up thousands of offices worldwide. Download this free
pack - containing 10 new, freshly baked, straight-to-the-point posters.
https://www.boardofinnovation.com/tools/innovation-posters/?ref=producthunt
Our mission is
Reaching a worldwide audience with the newest tools, guides, and articles to help your organization
optimize the way it innovates.
We empower corporate teams to innovate and to move faster from concept to market success.
https://www.boardofinnovation.com/
---
Business Impact
A cyber-skills shortage means students are being recruited to fight off hackers
Students with little or no cybersecurity knowledge are being paired with easy-to-use AI software
that lets them protect their campus from attack.
https://www.technologyreview.com/s/612309/a-cyber-skills-shortage-means-students-are-being-
recruited-to-fight-off-hackers/
---
22
23
Government Spyware Vendor Left Customer, Victim Data Online for Everyone to See
The Germany-based spyware startup Wolf Intelligence exposed its own data, including surveillance
target’s information, passports scans of its founder and family, and recordings of meetings.
https://motherboard.vice.com/en_us/article/vbka8b/wolf-intelligence-leak-customer-victim-data-
online
---
How you can use a few simple static code analysis tools to avoid common programming bugs.
NOTE: This is a cross-post from my newsletter. I publish each email two weeks after it’s sent.
Subscribe to get more content like this earlier right in your inbox! ??
You’ve probably heard of ESLint, Prettier, and Flow/TypeScript. These are static code analysis tools
that are wildly popular in the JavaScript ecosystem. I consider them all testing tools. Let’s take a look
at each:
https://blog.kentcdodds.com/eliminate-an-entire-category-of-bugs-with-a-few-simple-tools-
f0dd2aaf4bc9
---
Tech startups have been revolutionising many industries, but we don’t come across too many that
are aiding law enforcement.
Edinburgh-based startup Cyan Forensics develops digital forensic technology to help the police catch
criminals faster. The startup has just has closed a €1 million investment round led by Mercia Fund
Managers. This brings its total funding to over €1.7 million since it was founded in 2016.
Cyan Forensics’ software can find time-critical digital evidence in minutes instead of days, helping
police in highly sensitive investigations such as child sexual exploitation and counter-terrorism. The
company is currently working with customers across law enforcement agencies which are seeing
success using the technology operationally.
https://www.eu-startups.com/2018/11/cyan-forensics-raises-funding/
---
https://threatpost.com/threatlist-3-out-of-4-employees-pose-a-security-risk-to-
businesses/138506/?via=indexdotco
23
24
---
The International Research Centre for Investigative Psychology (IRCIP) is world leading in pioneering
research in this area, called upon to consult in legal cases, as well as providing training and software
tools to police and crime analysts.
The IRCIP provides a vibrant, varied, and productive research environment for both students and
researchers, with world-leading staff supervision and ground-breaking academic programmes
offering research activity and experiences unique to the learning context that the centre provides.
https://pure.hud.ac.uk/en/organisations/international-research-centre-for-investigative-psychology-
2
---
BFS-Auto can achieve high-speed and high-definition book digitization at over 250 pages/min using
the original media format. This performance is realized by three key points: high-speed fully-
automated page flipping, real-time 3D recognition of the flipped pages, and high-accuracy
restoration to a flat document image.
http://www.k2.t.u-tokyo.ac.jp/vision/BFS-Auto/index-e.html
---
Iris.ai is an AI-powered science assistant that functions like a search tool, helping R&D Departments
navigate and find research text content in the ever-growing mountain of scientific knowledge.
Estimated to save 90 percent off the time on research text, with 85 percent of the materials relevant
to the research. The Oslo-based startup was founded in 2015 and raised $2.4 million in disclosed
funding from angel investors and a pair of seed rounds.
http://www.eu-startups.com/2018/08/10-norwegian-startups-to-look-out-for-in-2018-and-beyond/
https://iris.ai/
---
Facebook has built a tool called Getafix that automatically finds fixes for bugs and offers them to
engineers to approve. This allows engineers to work more effectively, and it promotes better overall
code quality.
24
25
https://code.fb.com/developer-tools/getafix-how-facebook-tools-learn-to-fix-bugs-automatically/
---
$99 USB-C dock gives iPad Pro an audio jack, HDMI port, SD card slot
The dock makes Apple's iPad Pro act more like a PC.
https://www.cnet.com/news/99-usb-c-dock-gives-ipad-pro-an-audio-jack-hdmi-port-sd-card-
slot/?via=indexdotco
https://index.co/market/technology
---
https://alternativeto.net/
---
What we do
Mission
Our mission is to reduce the risk of violence and aggression through campaigning, education and
support.
Vision
Our vision is a society in which people are safer - and feel safer - from violence and aggression; we
want people to be able to live life to the full.
https://www.suzylamplugh.org/
---
National Personal Safety Day 2018 will be held on 8th November highlighting issues relating to
personal safety in the workplace with a particular focus on the retail sector.
25
26
We'll be launching the results of our retail personal safety survey and our code for staying safe in the
workplace in a pamphlet and poster to be made available on our website on the day. Watch this
space for more information!
https://www.suzylamplugh.org/national-personal-safety-day-8th-november-2018
---
Trazor: The first all-in-one shaving system for men & women
Accepts over 40 different razor blades and includes built-in features for ultimate comfort &
convenience giving you a luxurious shave
https://www.kickstarter.com/projects/1407866020/trazor-the-first-all-in-one-shaving-system-for-
men?ref=producthunt
---
Newsletters...
https://conta.cc/2Q1OAL5
https://conta.cc/2DffxIg
---
At Naked Prosthetics, we provide digit amputees with functional, body-powered prosthetic devices.
https://www.npdevices.com/
---
Upload data
Search
Ask Zepto for any questions you have on your data in Plain English!
26
27
Monitor
https://www.zepto.io/?ref=producthunt
---
Franz 5
https://meetfranz.com/?ref=producthunt
---
The one thing every serious world traveler needs to pack: Escape the Wolf – Personal Security
Handbook for the Traveling Professional.
Blend into the local culture more effectively using these insights on cultural practices, traditions and
customs.
Once only available to defense contractors and government employees, this same level of expert
advice is now available to the business traveler.
The author, Clinton Emerson, is a respected authority on mitigating risk for global travelers within
government security circles. In Escape the Wolf, he shares expertise in coping with various threats,
or wolves, that lurk in today’s world based on 20 years of government experience, his civilian travels
and being raised in Saudi Arabia.
In Escape the Wolf, travelers learn how to recognize, assess and avoid threats ranging from common
crime, illness, natural disasters, corporate espionage, or even terrorism using Escape the Wolf’s
proven Total Awareness? System.
Order a copy today for yourself and your employees who travel abroad to:
identify, avoid and minimize threats, and learn how to escape from threatening situations
27
28
know the key steps to take before you even set foot outside your front door
https://www.amazon.co.uk/gp/product/B0099BJENU/ref=oh_aui_d_detailpage_o02_?ie=UTF8&psc
=1
---
SigmaXL is a leading provider of user friendly Excel add-in tools for statistical and graphical analysis.
Our flagship product, SigmaXL was designed from the ground up to be cost-effective, powerful, and
easy to use. It allows users to measure, analyze, improve, and control their service, transactional and
manufacturing process. As an add-in to the already familiar Microsoft Excel, SigmaXL is ideal for Six
Sigma training and is used by leading consultants. It is rapidly becoming the tool of choice for Six
Sigma professionals. Priced at $249, SigmaXL is a fraction of the cost of any major statistical product,
yet it has all the statistical and graphical functionality most people need.
http://www.sigmaxl.com/SigmaXL_Information_Google.shtml
---
Reshape.XL
Reshape.XL is a simple add-in for data wrangling in Excel. Process your data simpler and faster.
Inspired by R and SQL languages, but all features are available without coding or complicated
formulas.
Reshape.XL
Data Wrangling Tool for Excel. Simple and effective way to process your data in Excel.
Reshape.XL in an Excel add-in for data processing. With this add-in you can clean, complete,
reshape, wrangle, summarize, edit, subset, select, format, separate, unite, pivot, unpivot, combine
your data that are messy, incomplete, contain many records and variables. Using the "Grammar of
Data" you can do it inside one, very effective and simple environment. No formulas, no scripts or
languages such as VBA. For all the work you use only one window - without dozens of dialogs, input
boxes and windows. Your data transformations are processed in the same way you think about it -
Step by Step.
http://reshapexl.com/?ref=producthunt
---
Berlin-based Morressier secures $1.7 million to unlock the value of early scientific research
28
29
Morressier, the platform digitizing academic conferences and reshaping the exchange of early
scientific findings, today announced a $1.7 million seed funding round led by Redalpine. Experts in
the field of scholarly publishing contributed to the round, including Jan Reichelt, cofounder of
academic network Mendeley, and Jan Maier, cofounder of research management tool AVEDAS,
among others.
Around the world, conferences play a unique and essential role in academia by enabling researchers
to share knowledge, discover breakthroughs and connect with peers. Although conferences are the
primary location for scientists to share their early findings, conference material is still predominantly
restricted to the offline world. This leaves highly valuable scientific insights, research trends and
collaboration opportunities hidden, unstructured and disconnected.
http://www.eu-startups.com/2017/11/berlin-based-morressier-secures-1-7-million-to-unlock-the-
value-of-early-scientific-research/
---
into knowledge
Make smarter,
faster decisions
https://signalmedia.co/
---
Business and Technology and Startup News and Products and Software...
Product Hunt
https://www.producthunt.com/
Beta Page
29
30
https://betapage.co/
Index
https://index.co/market/technology
Refind
https://refind.com/
Journalism
https://www.journalism.co.uk/
Digital Trends
https://www.digitaltrends.com/outdoors/
Inhabitat
https://inhabitat.com/
EU-Startups
http://www.eu-startups.com/
No Camels
http://nocamels.com/
https://thehackernews.com/
Leadership Review
https://www.leadershipreview.net/
---
30
31
History Search
With History Search you’ll be able to retrieve articles, open online documents, find emails or any
other webpage using a phrase, comment or topic you remember.
https://historysearch.com/?ref=producthunt
---
Sigstr Pulse
By analyzing the email and calendar patterns, Sigstr Pulse identifies and quantifies the entire
universe of relationships that your employees have. Sigstr Pulse gives marketing and sales true
insight into the quality of relationships and engagement within target accounts.
https://www.sigstr.com/pulse/?ref=producthunt
---
When CEO Satya Nadella joined Microsoft, he started diffusing its toxic culture by handing each of
his execs a 15-year-old book by a psychologist
http://uk.businessinsider.com/microsoft-satya-nadella-nonviolent-communication-2018-10
---
Nonviolent Communication: A Language of Life, 3rd Edition: Life-Changing Tools for Healthy
Relationships (Nonviolent Communication Guides) Kindle Edition
https://www.amazon.co.uk/Nonviolent-Communication-Language-Life-Changing-Relationships-
ebook/dp/B07C6JQZ7H/ref=sr_1_1?ie=UTF8&qid=1538598001&sr=8-
1&keywords=Nonviolent+Communication
---
31
32
http://54communications.com/
---
YubiKey 5 NFC
Single
Touch based authentication for NFC supported Android and iOS devices and applications
$45
https://www.yubico.com/product/yubikey-5-nfc/#yubikey-5-nfc
---
flowpilot
The easiest way for businesses to plan and manage their cash flow actively.
The easiest way for businesses to plan and manage their cash flow actively. Cash flow planning has
never been this easy! Simply upload your accounting data and get an overview of your current and
forecasted cashflow. Recognize risks and optimization potentials early as they arise and get tips how
to eliminate them. Make better decisions by easy and quick simulations simply without effort. Test
our highly automated cash flow management software 14 days for free!
https://flowpilot.io/
---
The quickest and easiest way for businesses to review and approve incoming contracts
32
33
https://www.lawgeex.com/
---
A team of former civil servants specialising in behavioural psychology now pulls in revenues of £14m
a year
https://www.theguardian.com/politics/2018/nov/10/nudge-unit-pushed-way-private-sector-
behavioural-insights-team
https://www.behaviouralinsights.co.uk/
---
In 1976 and 1977, New York City was terrorized by one of America’s most infamous serial killers.
Before being captured in front of his Yonkers home, David Berkowitz killed six victims, and wounded
seven others. Berkowitz claimed he was following the orders of his neighbour’s dog, whom he
described as being connected to a demonic figure named Sam. “I am a monster,” Berkowitz wrote in
one of the notes he left for police. “I am the ‘Son of Sam.’”
https://quillette.com/2018/11/09/portrait-of-the-artist-as-a-false-accuser/
---
A review of The Souls of Yellow Folk by Wesley Yang. W. W. Norton & Company (November 2018),
256 pages.
Wesley Yang’s longform essay “The Face of Seung-Hui Cho” was first published in the small magazine
n+1 in the early months of 2008. At the time Yang, who was in his early 30s, seemed to be a typical
young New York writer. He had published an assortment of short pieces, mostly about books, for
places like New York, Salon, and the New York Observer. He wasn’t a “name” yet, but he was well-
known enough that one of the editors of n+1 thought of him when they were looking for someone
to write about Cho, the Korean-American student who’d killed 32 people and wounded 17 during his
shooting rampage on the campus of Virginia Tech.
https://quillette.com/2018/11/09/the-souls-of-yellow-folk-a-review/
---
33
34
Dhound
Dhound is a threat detection software for your web servers, clouds and apps, it presents you with a
dashboard to monitor all possible and incoming threats and it works most systems including
Rasberry PI
https://dhound.io/?ref=producthunt
---
Cynet is trying to change the face of the industry with a consolidated platform that brings together
multiple security capabilities—network and endpoint—while automating and simplifying the job of
the defender.
https://thehackernews.com/2018/11/cynet-cyber-security-solution.html
https://www.cynet.com/
---
Data-Driven Generation
https://datanatives.io/
---
Flight delays happen, but that doesn’t mean you have to accept them. You may be entitled to as
much as 600 € in compensation if your flight has been delayed, canceled or overbooked within the
last three years.
https://www.airhelp.com/en-
gb/?&bidkw=airhelp&dvc=c&h=https://clickserve.dartsearch.net/link/click?lid=43700035050511117
&ds_s_kwgid=58700004220141703&bidkw=airhelp&dvc=c&h=https://clickserve.dartsearch.net/link
/click?lid=43700035050511117&ds_s_kwgid=58700004220141703&gclid=CjwKCAiAiarfBRASEiwAw1
34
35
tYv1uDe_MLAw-ul-
r1Gyf5qh1SFaZkD9GcRwXDmGDcrSXrT2K1lrwkGRoCwmAQAvD_BwE&gclsrc=aw.ds
---
XM Cyber provides the first fully automated APT Simulation Platform to continuously expose attack
vectors, above and below the surface, from breach point to any organizational critical asset. This
continuous loop of automated red teaming is completed by ongoing and prioritized actionable
remediation of organizations’ security gaps. In effect, HaXM by XM Cyber operates as an automated
purple team that fluidly combines red team and blue team processes to ensure that organizations
are always one step ahead of the cyber-attackers.
https://xmcyber.com/
http://nocamels.com/2018/11/mossad-cybersecurity-xm-cyber-22m/
---
Cloud Cybersecurity Startup Coronet Partners With Dropbox For Data Protection
Israeli cloud security startup Coronet announced that it has entered an agreement to partner with
Dropbox to bring its innovative data breach protection platform to the US-based company’s millions
of users, Reuters reported. Coronet’s platform will be integrated into Dropbox’s own security
features, and will be available by the end of the year.
http://nocamels.com/2018/11/cloud-security-coronet-dropbox/
---
PENTESTON
Engage single system or multiple targets to determine if identified technical risk presents a business
risk.
?For large projects collaborate with different team members, import and enter manual findings to a
centralized QA resource.
https://www.penteston.com/
35
36
---
CLIP OS 4 and CLIP OS 5 now available to everyone on GitHub, not just French cyber-spies.
The National Cybersecurity Agency of France, also known as ANSSI (Agence Nationale de la Sécurité
des Systèmes d'Information), has open-sourced CLIP OS, an in-house operating system its engineers
had developed to address the needs of the French government administration.
In a press release, ANSSI described CLIP OS as a "Linux-based operating system [that] incorporates a
set of security mechanisms that give it a very high level of resistance to malicious code and allow it
to protect sensitive information."
https://www.zdnet.com/article/french-cyber-security-agency-open-sources-clip-os-a-security-
hardened-os/?via=indexdotco
---
Debevoise Lawyers Assess Latest Cybersecurity and Data Privacy Developments in Newly Released
Breach Reading 3.0
13 September 2018
The data privacy and cybersecurity field has shifted greatly over the past year, with new cyber threat
vectors and strict data privacy requirements constantly cropping up from a host of sources, but
Debevoise & Plimpton’s newly released Breach Reading 3.0 seeks to guide professionals through
these myriad developments.
“Keeping up with cyber developments can be a daunting task, even to the most seasoned
professional. Breach Reading 3.0 offers a thoughtfully curated selection of the most important
updates in the sector, so leaders can stay abreast of changes without being bogged down by them,”
said partner Jeremy Feigelson, Co-Chair of the firm’s Cybersecurity & Data Privacy practice and
member of the firm’s Intellectual Property and Media Group.
https://www.debevoise.com/news/2018/09/debevoise-lawyers-assess
---
Desktop Central is a unified endpoint management solution that helps in managing servers, laptops,
desktops, smartphones, and tablets from a central location.
36
37
Automate your regular desktop management routines like installing patches, distributing software,
imaging and deploying OS, managing your IT Assets, managing software licenses, monitoring
software usage statistics, managing USB device usage, taking control of remote desktops, and more.
It supports managing Windows, Mac and Linux operating systems.
Manage your mobile devices to deploy profiles and policies, configure devices for Wifi, VPN, Email
accounts, etc., apply restrictions on using camera, browser, etc., and to secure your devices like
enabling passcode, remote lock/wipe, etc.Manage all your iOS, Android and Windows smartphones
and tablets.
Free
Edition
Fully functional
Up to 25 computers
Up to 25 mobile devices
https://www.manageengine.co.uk/products/desktop-central/
---
BinaryEdge Portal
We scan the entire internet space and create real-time threat intelligence streams and reports that
show what is exposed on the internet.
https://app.binaryedge.io/?ref=producthunt
https://www.binaryedge.io/?ref=producthunt
---
Dhound
37
38
Dhound is a security monitoring and intrusion detection tool for internet-facing servers, web apps.
tracking events that are important for your online business (logins on websites or admin panel,
downloading files, changing account information, etc.)
https://dhound.io/
---
Hackuna (Anti-Hack)
Hackuna (Anti-Hack) is a mobile app available in Google Play Store that gives power to every user to
fight against the hackers. It will do the following:
https://play.google.com/store/apps/details?id=org.cryptors.hackuna002&ref=producthunt
---
From embedded to cloud¸ NanoLock Security provides the industry’s only lightweight¸ virtually¸ low-
cost security and management solution for connected edge devices.
Using virtually zero computing or power resources¸ NanoLock Security protects firmware¸ boot
image and critical applications stored on connected IoT devices¸ preventing attacks ranging from
ransomware to malicious manipulation of stored code and configuration info.
https://www.nanolocksecurity.com/
---
38
39
A select group of veterans from the Israeli elite intelligence units that specialises in tailored solutions
to complex business and litigation challenges
https://www.blackcube.com/
---
elementary OS
The fast, open, and privacy-respecting replacement for Windows and macOS
All-new Code. Night Light. Picture-in-Picture. More productive window management and tiling.
Shortcut Overlay. Color emoji. And a ton more.
-Go Fast
Stop waiting around for your computer to load. elementary OS starts fast and stays fast. Apps are
lightning quick to open and remember where you left off. Even better, elementary OS doesn’t slow
down with updates.
-Open Source
We respect the rights of our users. All of elementary OS is available for review, scrutiny,
modification, and redistribution by anyone. Which improves security and privacy for everyone.
We’re built on GNU/Linux, one of the most secure systems in the world. It’s the same software
powering the U.S Department of Defense, the Bank of China, and more.
https://elementary.io/
---
Debevoise Lawyers Assess Latest Cybersecurity and Data Privacy Developments in Newly Released
Breach Reading 3.0
13 September 2018
The data privacy and cybersecurity field has shifted greatly over the past year, with new cyber threat
vectors and strict data privacy requirements constantly cropping up from a host of sources, but
Debevoise & Plimpton’s newly released Breach Reading 3.0 seeks to guide professionals through
these myriad developments.
“Keeping up with cyber developments can be a daunting task, even to the most seasoned
professional. Breach Reading 3.0 offers a thoughtfully curated selection of the most important
updates in the sector, so leaders can stay abreast of changes without being bogged down by them,”
said partner Jeremy Feigelson, Co-Chair of the firm’s Cybersecurity & Data Privacy practice and
member of the firm’s Intellectual Property and Media Group.
39
40
https://www.debevoise.com/news/2018/09/debevoise-lawyers-assess
---
It’s been a little over a year since Intel made the Movidius Neural Compute Stick (previously
codenamed Fathom) generally available. The $79 thumb drive — a metal dongle housing a system-
on-chip purpose-built for accelerating machine learning algorithms — was the product of chipmaker
Movidius, which Intel acquired in September 2016. In the intervening months, it’s been used by
thousands of developers and featured in “dozens” of research projects, according to Intel. And today
marks the debut of its successor.
At Intel’s first AI developer conference in Beijing this week, the Santa Clara company took the wraps
off of the Intel Neural Compute Stick 2, or NCS 2. It ditches its predecessor’s Myriad 2 Vision
Processing Unit (VPU) — the chip inside Google’s Clip camera, Flir’s Firefly, DJI’s Phantom 4 drone,
and Tencent’s DeepGaze camera — for the markedly more powerful Myriad X VPU, which Intel
claims delivers 8 times the overall compute performance.
https://venturebeat.com/2018/11/14/intels-neural-compute-stick-2-is-8-times-faster-than-its-
predecessor/?via=indexdotco
---
Somiflash
Somiflash allows to keep different kind of file and allow access upto 12 users at the same time. So
you can use it in office meetings and during entertainment in a Group. you can access your device
anytime with it’s ios and android app, and can enjoy 10 hours continuous steaming.
http://somiflash.com/?ref=producthunt
---
---
The Best Business & Social Software and Apps from my Research (Y 2015 - Y 2018)
40
41
https://conta.cc/2QvI3bC
Newsletters...
https://conta.cc/2Q1OAL5
https://conta.cc/2DffxIg
https://conta.cc/2REFCnE
---
You’ve probably registered on dozens of websites (or more) over the years, giving them your email
address, personal data like birth dates and street addresses, and passwords. Spybot Identity Monitor
gives you a tool that allows you to check if your information already is in the hand of hackers. It’s
your data – your deserve to know!
What to do if…?
If Spybot Identity Monitortells you that a service has leaked your data, you should:
Change your password on all other services where you might have used the same password. Start
using a password manager to make sure all those passwords are stored safely.
https://www.safer-networking.org/products/spybot-identity-monitor/
---
The PortableApps.com Platform™ is a full-featured portable software system that ties all your
portable apps together and lets you build your own custom portable app suite for use in your synced
cloud folder, on your local PC, or on a portable USB drive.
https://portableapps.com/
---
41
42
Winja is a lightweight but powerful tool for discovering malware hiding on your system. Winja allows
you to scan any file or process with the Google VirusTotal Multi Engine Scanner and also provides
deeper analysis using the advanced tools to hunt down and eliminate malware.
https://www.phrozen.io/freeware/winja/
---
KPI6.com
The Media Intelligence that helps marketing professionals succeed in their daily business challenges
KPI6 has developed a tool that helps marketing professionals, strategists, and data analysts to
harness the complexity of data with two environments:
Analytics: A complete Listening engine, which enables the creation of requests to the databases of
the leading social networks and digital public sources.
Audiences: enrich our user groups, previously intercepted, with demographic and psychographic
insights, in a crystal-clear transparent and compliance way with the data regulation process.
https://kpi6.com/
---
SUBSCRIBE
https://www.sentinelone.com/press/sentinelone-announces-new-vigilance-service-support-threat-
hunting-response-capabilities-security-teams/
New Service Offers 24/7 Monitoring of Security Alerts By Expert Security Analysts as Cybersecurity
Skills Gap Grows
Mountain View, Calif., – Sept. 14, 2017 – SentinelOne, a pioneer in delivering autonomous AI-
powered security for the endpoint, datacenter and cloud, t
42
43
personnel, help orchestrate security operations, and execute applicable policy-driven actions to limit
the impact of any threat to an organization.
SentinelOne Vigilance gives security teams the extra set of eyes to give every security alert the
attention it deserves, reduce the number of false positives and allow security teams to focus on the
most critical threats. Using a “follow-the-sun” approach, Vigilance Security Operation Centers (SOC)
allow security experts to continuously monitor, analyze and respond to security threats.
Active Monitoring gives customers full 24/7 coverage to classify and prioritize incoming threats and
alerts. The Vigilance team will deliver Executive Reporting on a quarterly basis.
Active Response also includes Expert Consultation, Threat Response and On-Demand Deep Sample
Forensics services. This level also delivers Executive Reporting monthly.
SentinelOne Vigilance can coexist with Managed Security Service Providers (MSSP) to augment their
efforts to keep an organization secure. In such deployments, the Vigilance Cyber Security Analysts –
will work with the MSSP counterparts to operationalize the workflow from detection to remediation.
Current SentinelOne customers can subscribe to the Vigilance service by working with their
customer success managers. Prospective customers can learn more about SentinelOne EPP and
Vigilance capabilities here.
https://www.sentinelone.com/press/sentinelone-announces-new-vigilance-service-support-threat-
hunting-response-capabilities-security-teams/
---
WireGuard® is an extremely simple yet fast and modern VPN that utilizes state-of-the-art
cryptography. It aims to be faster, simpler, leaner, and more useful than IPSec, while avoiding the
massive headache. It intends to be considerably more performant than OpenVPN. WireGuard is
designed as a general purpose VPN for running on embedded interfaces and super computers alike,
fit for many different circumstances. Initially released for the Linux kernel, it is now cross-platform
and widely deployable. It is currently under heavy development, but already it might be regarded as
the most secure, easiest to use, and simplest VPN solution in the industry.
https://www.wireguard.com/
---
StealthMail
43
44
StealthMail is a solution which makes your emails secure and invisible to email relays, hackers, or
Public Internet threats - making email relationship with clients a trusted one via StealthMail’s best-
in-class Secure Email Channel.
Professional
Email Security
StealthMail makes your emails secure and invisible to email relays, hackers, or Public Internet
threats - making email relationship with clients a trusted one via StealthMail’s best-in-class Secure
Email Channel.
Moreover, StealthMail gives you full and exclusive control over your encryption keys, data, and
access rights - so that your email communication is fully protected.
To start using StealthMail no integration is needed. There are no risks for existing IT infrastructure.
The whole deployment takes less than 4 hours. Users get Outlook Add-ins and the server is deployed
to Company’s Azure Cloud.
https://stealthmail.com/?ref=producthunt
---
cognitiveSEO's Site Audit tool analyses and detects the weak points of your website
Our all-inclusive Site Audit tool is part of a complete SEO Software suite that covers all the needs an
SEO Pro, webmaster or digital marketer might have : Backlink Analysis, technical SEO Audits, content
audits, keywords research & rank tracking, content optimization, Google Penalty prevention and
recovery, and much much more.
https://cognitiveseo.com/site-audit/
---
Seven Israeli startups were selected by Israel’s Internal Security Agency (ISA, also known as the Shin
Bet in Hebrew) and TAU Ventures, the investment arm of Tel Aviv University, to participate in a
unique accelerator that would allow the domestic security service to tap into entrepreneurs working
in artificial intelligence (AI), primarily natural-language processing (NLP) technologies, robotics, and
data science.
http://nocamels.com/2018/07/shin-bet-7-startups-accelerator/
44
45
https://www.cyabra.com/
---
Israel’s Internal Security Agency (ISA, also known as the Shin Bet and Shabak in Hebrew) is launching
the second cycle of its tech accelerator program, Xcelerator, in partnership with TAU Ventures, the
investment arm of Tel Aviv University founded earlier this year.
http://nocamels.com/2018/12/israels-internal-security-service-launches-2nd-tech-accelerator-cycle/
Last year, the Mossad, Israel’s intelligence agency, launched a venture capital arm to invest in
cutting-edge Israeli technologies. The fund was named Libertad (which means “freedom” in Latin,
but is also the name of a ship that carried Jewish refugees escaping the Nazis in 1940) and offered as
much as $500,000 for research and development projects.
http://www.libertad.gov.il/eng/
---
CybSafe is built on two foundational pillars: machine learning & advanced data analytics, and
psychology & behavioural science.
CybSafe first measures the security awareness, behaviours and culture of a group of people. It then
implements interventions designed in collaboration with psychologists and behavioural scientists to
improve all three of these areas.
As time goes on, CybSafe continues to measure each area accordingly to help keep people safe
online.
https://resources.cybsafe.com/top-18-questions-about-cybsafe/?via=indexdotco
---
Gigahex
An upcoming desktop app to setup and manage sandbox environment for Big Data Developers.
45
46
Gigahex is a desktop app to create, manage sandbox environments using docker containers in the
user's machine.
This enables Big Data developer and learners to focus on development and testing of their business
logic and not waste time in setting up local environment.
https://gigahex.com/
---
The Cyber Intelligence 12-Month Online Subscription Program is designed to guide organizations in
their cyber and threat intelligence program builds through online lectures,
demonstrations,T71mixmatch and templates covering a wide range of topics. After years of teaching
intelligence courses and delivering intelligence programs to clients, Treadstone 71 now offers the
subscription-based, automated program guiding clients through the strategic planning process, goals
and objectives creation, maturity assessment, SOP development, threat intelligence platform
selection, collection planning, intelligence analysis, analytic writing, and dissemination non-
inclusively.
https://www.treadstone71.com/2-uncategorised/162-subscription
---
Deep Web for Journalists – Comms, Counter-Surveillance, Search: The Digital Journalists' Handbook
Kindle Edition
Journalism has been transformed by the Internet and the Internet has opened journalists to levels of
surveillance that would have horrified George Orwell. All journalists should be aware of the dangers
they face in the digital world – the emerging battleground.
Being a journalist in 2017 is more dangerous than it ever was. In addition to the usual threats,
beatings, murders and war casualties, we are now being actively targeted online by intelligence
agencies, law enforcement and others.
These days it is not just journalists working in repressive regimes that need worry. We now know
that the US and its cyber-allies – Britain, Canada, Australia and New Zealand – actively monitor
domestic journalists in their mass surveillance of the Internet.
Edward Snowden has warned journalists that they are special targets and he has expressed surprise
that news organizations rarely have any counter-measures in place.
46
47
They harvest our contacts and monitor our telephone logs. They read our emails and texts. They
follow our every move online and they keep tabs on every line we write.
But it is not just intelligence agencies and law enforcement that we should worry about. All kinds of
people have a vested interest in knowing about your next story – individual criminals and criminal
organizations, political parties and extremist groups, law firms and the corporate giants.
Large business interests have their own intelligence units. They know what is being said about them
and by whom. They keep track of their competitors and they know when somebody starts asking
awkward questions about them.
If big business or anyone wanted to destroy a journalist’s reputation this is simplicity itself.
The key is not to attract attention in the first place, and to learn to operate beneath the radar.
But how can journalists safeguard their sources and communicate without being overheard? How
can they conduct sensitive research without having to watch their backs?
This book will show how to block intruders, set up secure communications, mask your identity online
and browse and download anonymously, and store any amount of data without leaving a trace.
If that wasn't enough, the Deep Web is also a largely-unknown research and information resource. If
you know the right entry points, you can mine a rich seam of multimedia files, images, software and
documents that you cannot find on the Surface Web.
Deep Web for Journalists “offers an uncompromising diagnosis of the perils of online
communications and should shatter the confidence many of us place in the unguarded ways of
working online,” says Jim Boumelha, President of International Federation of Journalists in his
Foreword to the book.
Journalist, broadcaster and author Alan Pearce has covered conflicts from the Khmer Rouge to the
Taliban for the BBC and Time Magazine, among others. He now teaches cyber-security skills and
counter-surveillance to journalists.
“The work of journalism has become immeasurably harder than it ever has been in the past.
Journalists have to be particularly conscious about any sort of network signalling, any sort of
connection, any sort of licence plate reading device that they pass on their way to a meeting point,
any place they use their credit card, any place they take their phone, any email contact they have
with the source - because that very first contact, before encrypted communications are established,
is enough to give it all away.” – Edward Snowden 17 July 2014 in The Guardian.
https://www.amazon.co.uk/Deep-Web-Journalists-Counter-Surveillance-Handbook-
ebook/dp/B00CSW1KUW/ref=pd_typ_k_rtpb_1_341689031_4/260-8057516-
7580851?_encoding=UTF8&psc=1&refRID=1KH641FERRT78C2MXYC4
---
47
48
"There’s so much data available on the internet that even government cyberspies need a little help
now and then to sift through it all. So to assist them, the National Security Agency produced a book
to help its spies uncover intelligence hiding on the web.
The 643-page tome, called Untangling the Web: A Guide to Internet Research (.pdf), was just
released by the NSA following a FOIA request filed in April by MuckRock, a site that charges fees to
process public records for activists and others.
The book was published by the Center for Digital Content of the National Security Agency, and is
filled with advice for using search engines, the Internet Archive and other online tools. But the most
interesting is the chapter titled “Google Hacking.”
https://www.amazon.co.uk/gp/product/B00L2XVI46/ref=oh_aui_d_detailpage_o00_?ie=UTF8&psc=
1
---
About MuckRock. MuckRock is a non-profit, collaborative news site that brings together journalists,
researchers, activists, and regular citizens to request, analyze .
MuckRock is a United States-based 501(c)(3) non-profit organization which assists anyone in filing
governmental requests for information through the Freedom .
https://www.muckrock.com/
MuckRock is a United States-based 501 non-profit organization which assists anyone in filing
governmental requests for information through the Freedom of Information Act, then publishes the
returned information on its website and encourages journalism around it.
https://en.wikipedia.org/wiki/MuckRock
---
Moneyland: Why Thieves And Crooks Now Rule The World And How To Take It Back Kindle Edition
The SUNDAY TIMES BUSINESS BOOK OF THE YEAR, the ECONOMIST POLITICS & CURRENT AFFAIRS
BOOK OF THE YEAR and a DAILY MAIL and TIMES book of the year
'You cannot understand power, wealth and poverty without knowing about Moneyland.'
From ruined towns on the edge of Siberia, to Bond-villain lairs in Knightsbridge and Manhattan,
something has gone wrong with the workings of the world.
Once upon a time, if an official stole money, there wasn't much he could do with it. He could buy
himself a new car or build himself a nice house or give it to his friends and family, but that was about
48
49
it. If he kept stealing, the money would just pile up in his house until he had no rooms left to put it
in, or it was eaten by mice.
Join the investigative journalist Oliver Bullough on a journey into Moneyland - the secret country of
the lawless, stateless superrich.
Learn how the institutions of Europe and the United States have become money-laundering
operations, undermining the foundations of Western stability. Discover the true cost of being open
for business no matter how corrupt and dangerous the customer. Meet the kleptocrats. Meet their
awful children. And find out how heroic activists around the world are fighting back.
This is the story of wealth and power in the 21st century. It isn't too late to change it.
https://www.amazon.co.uk/Moneyland-Thieves-Crooks-Rule-World-
ebook/dp/B01NBWDPW8/ref=sr_1_1?ie=UTF8&qid=1545883190&sr=8-
1&keywords=Moneyland%3A+Why+Thieves+And+Crooks+Now+Rule+The+World+And+How+To+Tak
e+It+Back
---
Manal al-Sharif is a Saudi Arabian women's rights activist who helped start a women's right to drive
campaign in 2011. A women's rights activist who had previously filmed herself driving, Wajeha al-
Huwaider, filmed al-Sharif driving a car as part of the campaign. The video was posted on YouTube
and Facebook. Wikipedia
https://www.manal-alsharif.com/
---
I'm Professor of Computer Science and Technology Evangelist at Durham University, a digital skills
expert, social entrepreneur, consultant and international ...
https://sueblack.co.uk/
---
My name is danah boyd and I'm a Principal Researcher at Microsoft Research and the founder of
Data & Society. I'm also a Visiting Professor at New York
http://www.danah.org/
---
49
50
More Fortune 500 and Forbes Global 1,000 companies trust HackerOne to test and secure the
applications they depend on to run their business.
https://www.hackerone.com/
---
The solution of vigilance against identity theft of your customers and your collaborators
https://littlebluefox.io/?ref=producthunt
---
Dash has recorded yet another adoption milestone driven by special circumstances in Venezuela,
with the sale of more than 66,000 KRIP mobile phones that are designed with special cryptocurrency
enhancements optimised for the Dash ecosystem. According to the company, from launch in August
2018 to present, the vast majority of the devices have been sold in Venezuela, making it by far the
world’s biggest market for the cryptocurrency-enabled phones.
https://www.ccn.com/dash-venezuela-adoption-krip-phones/?via=indexdotco
---
Ever wished you could save a video from the Internet? Search no more, Downie is what you're
looking for. Easily download videos from thousands of different sites.
https://software.charliemonroe.net/downie.php?ref=producthunt
---
50
51
them, and how to remediate each issue. The project also includes documentation explaining the
issues and how they should be remediated with best-practices.
As serverless adoption is expected to continue growing and reach new audiences, we see the
importance of education on topics such as how to build robust, secure and reliable AWS Lambda
serverless applications. This project will expose developers and security practitioners to basic
serverless security concepts, risks, attacks and mitigation best-practices.
https://www.owasp.org/index.php/OWASP_Serverless_Goat?ref=producthunt
---
TryHackMe
We take the pain out of learning and teaching Cybersecurity. Our platform makes it a comfortable
experience to learn by designing prebuilt courses which include virtual machines hosted in the cloud
ready to be deployed. This avoids the hassle of downloading and configuring VM's. Our platform is
perfect for CTFs, Workshops, Assessments or Training.
https://tryhackme.com/?ref=producthunt
---
Windows Sandbox
Windows Sandbox is a new lightweight desktop environment tailored for safely running applications
in isolation.
-AMD64 architecture
https://techcommunity.microsoft.com/t5/Windows-Kernel-Internals/Windows-Sandbox/ba-
p/301849
51
52
---
https://www.sordum.org/10946/sordum-random-password-generator/
---
You deserve the best in security. LastPass keeps your information private, secure, and hidden (even
from us).
https://www.lastpass.com/
---
New Knowledge is a cybersecurity company specializing in disinformation defense for highly visible
brands under attack by coordinated disinformation campaigns. Through machine learning and AI we
detect threats and provide brand manipulation protection before damage is done.
https://www.newknowledge.com/
---
52