Wednesday, May 29, 2013

Scripps reporters accused of hacking and threatened with lawsuit | Scripps News Online

Scripps reporters accused of hacking and threatened with lawsuit | Scripps News Online: The Scripps National Investigative team turned up 170,000 records containing personal data -- Social Security numbers, financial account information -- widely available online from two companies participating in the program.

When Scripps asked the companies for interviews, TerraCom and YourTel accused the journalists of hacking and violating the Computer Fraud and Abuse Act.

Friday, May 24, 2013

Scott Charney: Toward a Global Approach to Cybersecurity

Scott Charney: Toward a Global Approach to Cybersecurity: Around the globe, cybersecurity is prompting serious dialogue. The challenges are immediate and well-known, but the ingredients for more effective cybersecurity are within our grasp.

Thursday, May 23, 2013

Wednesday, May 22, 2013

Superbug - Official Website | The Fatal Menace of MRSA, by Maryn McKenna

Superbug - Official Website | The Fatal Menace of MRSA, by Maryn McKenna: Every year, it kills thousands of people, sickens millions and costs billions of dollars. It affects hospitals and families, schools and prisons, children and seniors, and now, most troublingly, farms, livestock and food.

The Effects of Vitamin D Deficiency ... [Clin Appl Thromb Hemost. 2012] - PubMed - NCBI

The Effects of Vitamin D Deficiency ... [Clin Appl Thromb Hemost. 2012] - PubMed - NCBI: As a result, our study revealed a relationship between vitamin D deficiency and nonvalvular AF.

Harvard School of Public Health � The Nutrition Source � Vitamin D and Health

Harvard School of Public Health � The Nutrition Source � Vitamin D and Health:

They found that men who were deficient in vitamin D were twice as likely to have a heart attack as men who had adequate levels of vitamin D. Other studies have found that low vitamin D levels were associated with higher risk of heart failure, sudden cardiac death, stroke, overall cardiovascular disease, and cardiovascular death. (21-24)

Compare the Size of Antarctica to the Continental United States

http://archive.org/details/SVS-3540. NASA/Goddard Space Flight Center Scientific Visualization Studio. LIMA Data provided by: Patricia Vornberger (SAIC). LIMA data produced by U.S. Geological Survey (USGS), the British Antarctic Survey (BAS) and NASA. : Free Download & Streaming : Internet Archive

Monday, May 20, 2013

Validated 140-1 and 140-2 Cryptographic Modules

Validated 140-1 and 140-2 Cryptographic Modules: It is important to note that the items on this list are cryptographic modules.

Mocana: Security Evolves. Unlock Your Mobile Enterprise — Simply, Securely.

Mocana: Security Evolves. Unlock Your Mobile Enterprise — Simply, Securely.
    Support Enterprise and Government Applications
  • NSA Suite B Cryptography included
  • FIPS 140-2 Level 1 certifiable cryptography module

NSA Mobility Program

NSA Mobility Program: The NSA Mobility Program was established in response to the substantial and justified urgency for delivering Mobility solutions that securely provide the rich user experience of commercial technology.

NSA Suite B Cryptography - NSA/CSS

NSA Suite B Cryptography - NSA/CSS: Because of the highly complex nature of modern communications technology, it is extremely important that the federal government, industry, foreign partners, and international organizations cooperate to achieve secure interoperability. NSA has been and continues to be dedicated to providing widespread cryptographic interoperability capabilities to protect classified national security systems.

Cybersecurity Framework

Cybersecurity Framework: NIST has issued a Request for Information (RFI) in the Federal Register to gather initial information on the many interrelated considerations, challenges, and efforts needed to develop the Framework.

Saturday, May 18, 2013

Secrets in Primary Care: A Qualitative Exploration and Conceptual Model

Secrets in Primary Care: A Qualitative Exploration and Conceptual Model: Secrets and issues of confidentiality are critical concerns in doctor–patient communication and fundamental aspects of every medical encounter. Nevertheless, the nature, content, prevalence, impact, and consequences of secrets in medicine have largely been unexplored.

Wednesday, May 15, 2013

View currently open network connections - Mac OS X Hints

View currently open network connections - Mac OS X Hints: Do you *know* what ports you have open on your machine or your server? Do you know what processes are communicating with what machines on the net, and as which user? If you are curious about these things, this script might be for you!

Tuesday, May 14, 2013

Global Telemedicine Market Headed For $27 Billion - Healthcare -

Global Telemedicine Market Headed For $27 Billion - Healthcare -: A closer look at U.S. trends suggests that telemedicine market growth has been driven by the implementation of the Obama administration's Patient Protection and Affordable Care Act (PPACA)

Monday, May 13, 2013

Telehealth Resource Center

Telehealth Resource Center: Telehealth Resource Centers (TRCs) are funded by the U.S. Department of Health and Human Services’ Health Resources and Services Administration (HRSA) Office for the Advancement of Telehealth, which is part of the Office of Rural Health Policy.

Telemedicine rising in popularity along with security risks | HealthITSecurity.com

Telemedicine rising in popularity along with security risks | HealthITSecurity.com: Even though telemedicine has much to offer healthcare providers, they must think carefully when making the decision whether to incorporate it into their practices because there are security risks.

Assessments | ICS-CERT

Assessments | ICS-CERT: The Cyber Security Evaluation Tool (CSET�) is a Department of Homeland Security (DHS) product that assists organizations in protecting their key national cyber assets.

Saturday, May 11, 2013

Collection of basic Linux Firewall iptables rules

Collection of basic Linux Firewall iptables rules: "rules should serve as a template for creating more customized iptables rules to fit desired network environment."

'via Blog this'

Allow A Normal User To Run Commands As root Under Linux / UNIX Operating Systems

Allow A Normal User To Run Commands As root Under Linux / UNIX Operating Systems: "The sudo command allows users to do tasks on a Linux system as another user."

'via Blog this'

Linux Iptables Firewall Shell Script For Standalone Server

Linux Iptables Firewall Shell Script For Standalone Server: "A shell script on iptables rules for a webserver (no need to use APF or CSF) just run this script from /etc/rc.local and you are done."

'via Blog this'

Linux log files location and how do I view logs files?

Linux log files location and how do I view logs files?:

# cd /var/logs

View common log file /var/log/messages using any one of the following command:

# tail -f /var/log/messages
# less /var/log/messages
# more -f /var/log/messages
# vi /var/log/messages"

'via Blog this'

Monday, May 6, 2013

The takeaway from Verizon's cyber security report: Cybercrime is way too easy | Killer Apps

The takeaway from Verizon's cyber security report: Cybercrime is way too easy | Killer Apps: "Of the 621 confirmed "data breaches" (successful cyber-attacks) that Verizon's security team investigated around the world in 2012 -- in collaboration with 19 other organizations -- 99 percent were relatively unsophisticated. In fact, 78 percent of all attacks used methods requiring low or "very low" computer skills to gain entry to a target's networks. This means that "the average [computer] user could have done it" or that attackers downloaded hacking tools from the web."

'via Blog this'

IRS money lost to fraudulent returns likely gone for good | Tampa Bay Times

IRS money lost to fraudulent returns likely gone for good | Tampa Bay Times: "The Treasury Inspector General for Tax Administration puts the national loss to the IRS and Treasury at $5 billion a year, with much of the action in Tampa."

'via Blog this'

Friday, May 3, 2013

Unix - The vi Editor Tutorial

Unix - The vi Editor Tutorial: Hint: If you are not sure which mode you are in, press the Esc key twice, and then you'll be in command mode. You open a file using vi editor and start type some characters and then come in command mode to understand the difference.

Wednesday, May 1, 2013

DDoS attacks on Banks ongoing

DDoS Attacks on Banks: No Break In Sight - BankInfoSecurity: Hacktivists' attacks on U.S. banking institutions are now in the eighth week of their third phase, making this phase, which launched March 5, the longest since Izz ad-Din al-Qassam Cyber Fighters waged its first campaign last year.