Friday, February 23, 2018

Race, Class and the Disconnect in Tech Diversity Efforts

Race, Class and the Disconnect in Tech Diversity Efforts: "On Thanksgiving, 70 predominantly Latino food service workers lost their jobs at tech giant Intel’s Santa Clara, CA campus. Last week, the same company welcomed diversity dignitaries from all over the country to talk about increasing the numbers of Black and Latino workers in the tech sector."



'via Blog this'

This 'Gray Hat' Hacker Breaks Into Your Car — To Prove A Point : All Tech Considered : NPR

This 'Gray Hat' Hacker Breaks Into Your Car — To Prove A Point : All Tech Considered : NPR

https://www.npr.org/sections/alltechconsidered/2018/02/23/583682220/this-gray-hat-hacker-breaks-into-your-car-to-prove-a-point

Thursday, February 22, 2018

RR: SEC.gov | Statement on Commission Statement and Guidance on Public Company Cybersecurity Disclosures

SEC.gov | Statement on Commission Statement and Guidance on Public Company Cybersecurity Disclosures: The more significant question is whether this rebranded guidance will actually help companies provide investors with comprehensive, particularized, and meaningful disclosure about cybersecurity risks and incidents. I fear it will not.



Per Politico..."Democratic
Commissioner Kara Stein
, though, found fault with the updated guidance. She supported advancing
it, but with reservations. She said the SEC could have done more, like
exploring potential rules that would establish a timeframe for companies to
disclose a breach to investors. "While it may have the potential of providing
both companies and investors with incremental benefit, the guidance does not
sufficiently advance the ball - even in the context of disclosure
guidance," she wrote . "Even more, it may provide investors a false
sense of comfort that we, at the commission, have done something more than we
have."

Many businesses still using outdated security, says Troy Hunt

Many businesses still using outdated security, says Troy Hunt: “There is definitely financial motive,” he said. “We still see a lot of selling of data. Following the LinkedIn breach in 2012, we saw that data extensively sold. And details from the Adobe breach in 2013 are still being sold on the Dream Market on the dark web.”

In Tech, Gender Diversity Boosts Performance | Morgan Stanley

In Tech, Gender Diversity Boosts Performance | Morgan Stanley: The lack of women in technology companies isn't just a question for academic research and industry debate, it should also be of interest to investors, according to recent findings from Morgan Stanley's Sustainability and Global Quantitative Research teams.

RR: Aetna HIV settlement: Customers to get $17 million - CNN

Aetna HIV settlement: Customers to get $17 million - CNN: After thousands of customers' HIV statuses were revealed in mailings last year, a federal class-action lawsuit against health care company Aetna has reached a $17 million settlement.

2018: The Year of the FTC and Informational Injuries? | Eye On Privacy

2018: The Year of the FTC and Informational Injuries? | Eye On Privacy: "panelists attending the workshop argued that potential future harm should be actionable as well. We anticipate hearing more from the FTC as a result of this workshop during 2018."

Cyber Incident & Breach Response | Online Trust Alliance

Cyber Incident & Breach Response | Online Trust Alliance: "2017 Cyber Incident & Breach Readiness Guide(PDF) - For nearly a decade OTA has published a Breach Readiness Guide to help organizations enhance data protection and prepare for a breach incident. Reflecting the evolution of cybercrime beyond the traditional breach, the 2017 Guide has been broadened to include the wider impact of cyber incidents."

Rise in cryptomining malware impacts organizations worldwide - Help Net Security

Rise in cryptomining malware impacts organizations worldwide - Help Net Security:

"Mobile malware reaches enterprise level – In the last year, we have witnessed several attacks directed at enterprises originating from mobile devices. This includes mobile devices acting as a proxy, triggered by the MilkyDoor malware, andused to collect internal data from the enterprise network. Another type is mobile malware, such as the Switcher malware, that attempts to attack network elements (e.g. routers) to redirect network traffic to a malicious server under the attacker’s control."

"Maya Horowitz, Threat Intelligence Group Manager at Check Point commented: “The second half of 2017 has seen crypto-miners take the world by storm to become a favorite monetizing attack vector. While this is not an entirely new malware type, the increasing popularity and value of cryptocurrency has led to a significant increase in the distribution of crypto-mining malware. Also, there has been a continuation of trends, such as ransomware, that date back to 2016, which is still a leading attack vector, used for both global attacks and targeted attacks against specific organizations. 25% of the attacks we saw in this period exploit vulnerabilities discovered over a decade ago, and less than 20% use ones from the last couple of years.”"

Blockchain For Identity Management: It’s Years Away

Blockchain For Identity Management: It’s Years Away:



"Rather than lodging a virtual currency transfer, it's possible to embed identity information in the ledger. The broad vision is a blockchain could be a tamper-proof reference point to verify personal data without having to expose the actual data to a service provider.

Consumers would be in control of their identity information, a concept referred to as self-sovereign identity. That reduces the chance that a data breach would spill their details all over the internet."

"But many analysts contend that it will be years - if not decades - before blockchain-like technologies may be used for identity at scale.

"When I talk to people who really understand what blockchain-based technology is about, they will quite openly say we're talking about 10- to 20-year time frames here," says Martha Bennett, a principal analyst with Forrester who has been studying the area for three years."

Blockchain Could Make You—Not Equifax—the Owner of Your Data | Investopedia

Blockchain Could Make You—Not Equifax—the Owner of Your Data | Investopedia: But the idea behind Datawallet holds a more fundamental appeal, the ability to control what Engel calls a "self-sovereign wallet," which makes the user the sole owner of their data and the only one with the ability to grant access to it. Engel says, "you have the monopoly over that data about you."

NOCTI industry-based credentials and partner industry certifications

NOCTI: NOCTI is the largest provider of industry-based credentials and partner industry certifications for career and technical education (CTE) programs across the nation.

What is TSA? | Technology Student Association

What is TSA? | Technology Student Association: 230,000 middle and high school students nationwide aspire to be future engineers, scientists and technologists through the Technology Student Association.

PCRN: Learning Module - Perkins Accountability Requirements

PCRN: Learning Module - Perkins Accountability Requirements: An overview of Perkins IV accountability requirements, annual reporting cycles and timelines.

Bitcoin Dips Again After Snapping Five-day Winning Streak Yesterday

Bitcoin Dips Again After Snapping Five-day Winning Streak Yesterday

https://finance.yahoo.com/news/bitcoin-dips-again-snapping-five-081200174.html

Tuesday, February 20, 2018

British Airways Shares Flop After Flight Cancellations | Fortune

British Airways Shares Flop After Flight Cancellations | Fortune: Shares in the parent company of British Airways fell on Tuesday after a huge IT failure left 75,000 passengers stranded over a holiday weekend, dealing a major blow to an airline that once marketed itself as “the world’s favorite.”

British Airways Shares Flop After Flight Cancellations | Fortune

British Airways Shares Flop After Flight Cancellations | Fortune: Shares in the parent company of British Airways fell on Tuesday after a huge IT failure left 75,000 passengers stranded over a holiday weekend, dealing a major blow to an airline that once marketed itself as “the world’s favorite.”

Atlanta's Hartsfield-Jackson airport restores power after crippling outage - CNN

Atlanta's Hartsfield-Jackson airport restores power after crippling outage - CNN: Nearly 11 hours after a power outage paralyzed the world's busiest airport, Atlanta's Hartsfield-Jackson International got its electricity back late Sunday night.

Delta: 5-hour computer outage cost us $150 million - Sep. 7, 2016

Delta: 5-hour computer outage cost us $150 million - Sep. 7, 2016: Delta Air Lines says the total bill for its devastating computer outage will come to $150 million.
The problem occurred when the company lost power at its operations center in Atlanta early on the morning of Aug. 8, causing computers needed to book in passengers and fly jets to be down for nearly five hours.

11 data centre disasters | Gallery | Computerworld UK

11 data centre disasters | Gallery | Computerworld UK: Large enterprises should be well equipped to deal with data centre outages, yet many still seem to be affected by them as their systems become more complex and reliant on various infrastructure and outsourced partners.

‘Catastrophic’ Power Outage Nearly Destroyed MSPB’s Electronic Records System - Tech - GovExec.com

‘Catastrophic’ Power Outage Nearly Destroyed MSPB’s Electronic Records System - Tech - GovExec.com: Tweet this on Twitter
Share this on Google Plus
Share this on LinkedIn
Print this article
Email this article
Increase size
A little-reported but “catastrophic” power outage that hit the Merit Systems Protection Board staff on June 30, 2015, has prompted a series of reforms to the federal employee complaint adjudication agency’s in-house electronic records system.

Hurricane Sandy takes data centers offline with flooding, power outages | Ars Technica

Hurricane Sandy takes data centers offline with flooding, power outages | Ars Technica: Flooding and power outages caused by Hurricane Sandy have forced several New York data centers to switch to generator power. But those generators are quickly running out of fuel, so data center companies are telling their customers to shut down their servers and move workloads elsewhere.

Uninterruptible Power Supply: Why is it Beeping and What Does It Do?

Uninterruptible Power Supply: Why is it Beeping and What Does It Do?: If your desktop computer is plugged into an unreasonably heavy box on the floor instead of a surge protector (also known as an uninterruptible power supply or UPS), here’s some good news: when the power goes out in the near future, you’re protected from hours of frustration.

Monday, February 19, 2018

Amazon's Cloud Crash Disaster Permanently Destroyed Many Customers' Data - BI

Amazon's Cloud Crash Disaster Permanently Destroyed Many Customers' Data - BI: Approximately 11 hours of historical data wasn't recoverable and will appear as small gaps in the timeline. Our development team is also hard at work to limit the impact of any future AWS interruptions.

Facts About Electric Power Surges

US Power Outage Statistics

Data: Explore 15 Years Of Power Outages | Inside Energy

Data: Explore 15 Years Of Power Outages | Inside Energy

http://insideenergy.org/2014/08/18/data-explore-15-years-of-power-outages/

EIA data show average frequency and duration of electric power outages - Today in Energy - U.S. Energy Information Administration (EIA)

EIA data show average frequency and duration of electric power outages - Today in Energy - U.S. Energy Information Administration (EIA)

https://www.eia.gov/todayinenergy/detail.php?id=27892

Angus King Condemns Intel Officials’ Unpreparedness For Cyber Attacks Against U.S. - The Daily Caller

Angus King Condemns Intel Officials' Unpreparedness For Cyber Attacks Against U.S. - The Daily Caller

http://dailycaller.com/2018/02/13/angus-king-condemns-intel-officials-unpreparedness-for-cyber-attacks-against-us/

Black Hat USA 2018 | Call for Papers

Black Hat USA 2018 | Call for Papers:

"Call for Papers Opens: February 6, 2018
Call for Papers Closes: April 9, 2018
Notification to Authors: end of May, 2018"



'via Blog this'

Kremlin, angry over alleged hacker's extradition, warns US to stop…

Sunday, February 18, 2018

Target will pay hack victims $10 million - Mar. 19, 2015

Target will pay hack victims $10 million - Mar. 19, 2015: "Target will reimburse victims for "lost time," as it says in court papers. That might include the time victims spent getting cards replaced and calling their bank -- and even then, only when it was documented.

A victim's time is valued at $10 per hour. And at most, they can get reimbursed for two hours for dealing with each instance of "substantiated loss.""



'via Blog this'

Privacilla Sponsors

Privacilla Sponsors: "Privacilla.org has been supported by generous contributions from the following organizations and individuals:"



'via Blog this'

Classic fit button-down non-iron twill lilac shirt | Charles Tyrwhitt

Classic fit button-down non-iron twill lilac shirt | Charles Tyrwhitt: "Ours have a handsome full collar roll that's been specifically developed to look divine with your best silk."



'via Blog this'

How To Calibrate a Mac Laptop's Power System - NewerTech

How To Calibrate a Mac Laptop's Power System - NewerTech: "After the battery is 100% charged, keep the power adapter plugged into the computer for an additional 2+ hours."



'via Blog this'

Six Reasons FCC Rules Are Not Needed to Protect Privacy | Competitive Enterprise Institute

Six Reasons FCC Rules Are Not Needed to Protect Privacy | Competitive Enterprise Institute: "The Competitive Enterprise Institute has been long been skeptical of the Federal Communication Commission’s (FCC) approach to regulating how Internet service providers (ISPs) use subscriber data."

Yes, There Are Other Laws That Protect Privacy, But FCC's Rules Were Still Helpful | Techdirt

Yes, There Are Other Laws That Protect Privacy, But FCC's Rules Were Still Helpful | Techdirt: "As we noted, it's an unfortunate exaggeration (pushed by some well meaning folks) to say that ISPs will now be packaging up and selling individuals' specific browsing history. That's just not true. Some people responded to us by noting that just because that's not how the ad market works today, it doesn't mean that won't change. But... that's probably not the case. Don't get me wrong: getting rid of these privacy rules is still a really bad idea, but let's look a little deeper at what ISPs can't do, before we explain why those privacy rules are still important."

Saturday, February 17, 2018

The Privacy Torts: a flawed argument that they work

The Privacy Torts: How U.S. State Law Quietly Leads the Way in Privacy Protection: "The following list of key cases, statutes, and other sources should serve as a starting point for determining the status of the privacy torts in each state’s law. "



'via Blog this'

Friday, February 16, 2018

Six Reasons FCC Rules Are Not Needed to Protect Privacy | Competitive Enterprise Institute

Six Reasons FCC Rules Are Not Needed to Protect Privacy | Competitive Enterprise Institute: In other words, if an ISP intercepts the contents of a subscriber’s Web traffic, or gives such data to an advertiser, that provider had better be sure it has the subscriber’s consent.

Russia Blamed for NotPetya Cyberattack: What You Need to Know | Fortune

Russia Blamed for NotPetya Cyberattack: What You Need to Know | Fortune

http://fortune.com/2018/02/16/russia-notpetya-cyberattack-damage/

King on Russia meddling

Angus King: We can't fight Russian meddling if Trump keeps denying it exists http://thehill.com/homenews/senate/373678-angus-king-we-cant-fight-russian-election-meddling-if-trump-continues-to-deny