Tuesday, July 30, 2013

Guidance Documents (Medical Devices and Radiation-Emitting Products) > Draft Guidance for Industry and Food and Drug Administration Staff - Mobile Medical Applications

Guidance Documents (Medical Devices and Radiation-Emitting Products) > Draft Guidance for Industry and Food and Drug Administration Staff - Mobile Medical Applications: Draft Guidance for Industry and Food and Drug Administration Staff - Mobile Medical Applications

PDF Printer VersionDRAFT GUIDANCE

Document Issued on: July 21, 2011

Guidance Documents (Medical Devices and Radiation-Emitting Products) > Content of Premarket Submissions for Management of Cybersecurity in Medical Devices - Draft Guidance for Industry and Food and Drug Administration Staff

Guidance Documents (Medical Devices and Radiation-Emitting Products) > Content of Premarket Submissions for Management of Cybersecurity in Medical Devices - Draft Guidance for Industry and Food and Drug Administration Staff: Content of Premarket Submissions for Management of Cybersecurity in Medical Devices - Draft Guidance for Industry and Food and Drug Administration Staff

MAUDE - Manufacturer and User Facility Device Experience

MAUDE - Manufacturer and User Facility Device Experience: MAUDE - Manufacturer and User Facility Device Experience

Pacemaker Hack Can Be Used To Kill People With Electric Shock | WebProNews

Pacemaker Hack Can Be Used To Kill People With Electric Shock | WebProNews: The pacemaker is a small electrical device that attaches to one’s heart. It controls heart beats through timed low-voltage electric shocks.

SIM card hack: are you affected? - Technology news | Moneyweb

http://www.moneyweb.co.za/moneyweb-technology-news/sim-card-hack-are-you-affected


From My iPhone

Rooting SIM cards | Security Research Labs

https://srlabs.de/rooting-sim-cards/


From My iPhone

Shaping the Future of Cybersecurity Education and Workforce Development | Homeland Security

http://www.dhs.gov/shaping-future-cybersecurity-education-and-workforce-development

Is Shodan Really the World's Most Dangerous Search Engine? | VICE

http://m.vice.com/en_uk/read/shodan-exposes-the-dark-side-of-the-net


From My iPhone

Monday, July 29, 2013

Infosecurity - Businesses lack awareness of poor security consequences

Infosecurity - Businesses lack awareness of poor security consequences: “Security needs to be an integrated part of everything we do – not an afterthought – and everybody must understand risk and change their behavior accordingly.”

The Best Credit Cards for Rebuilding Your Credit Score - US News and World Report

The Best Credit Cards for Rebuilding Your Credit Score - US News and World Report: If you use the card responsibly, you'll be considered for an unsecured credit card. "That's helpful because that's why people are doing this—they want to get an unsecured card," Harzog says.

7-day trial membership in Experian Credit Tracker

PAYMENT INFORMATION: When you order your $1 Credit Report and Score here, you will begin your 7-day trial membership in Experian Credit TrackerCredit Monitoring. You may cancel your trial membership at any time within 7 days without charge. If you decide not to cancel, your membership will continue and you will be billed for just $19.95/month for each month that you continue your membership. You may cancel your membership and stop the monthly billing by contacting us at any time; however, you will not be eligible for a pro-rated refund of your current month's paid membership fee.

https://experian.experiandirect.com/Member/Login.aspx

4th Cybersecurity Framework Workshop

4th Cybersecurity Framework Workshop: The fourth Cybersecurity Framework workshop will be hosted September 11-13, 2013 in Richardson, TX by the University of Texas at Dallas.

Sunday, July 28, 2013

HIPAA-compliant, Antivirus-protected Computers Can Still Get Infected | Physicians Practice

HIPAA-compliant, Antivirus-protected Computers Can Still Get Infected | Physicians Practice: "the HIPAA Security Rule is a good thing. It requires medical practices and clinics to adopt many processes that are considered IT and business best practices. One of those practices is contained in Standard 164.308(a)(5)(ii)(B): PROTECTION FROM MALICIOUS SOFTWARE: (The Covered Entity must implement) "Procedures for guarding against, detecting, and reporting malicious software.""

'via Blog this'

Dr. Joseph Bonneau Wins NSA Award, Criticizes NSA | Electronic Frontier Foundation

https://www.eff.org/deeplinks/2013/07/dr-joseph-bonneau-wins-nsa-award-criticizes-nsa-0


From My iPhone

These fake investigations by data protection regulators have to stop � The Privacy Surgeon

These fake investigations by data protection regulators have to stop � The Privacy Surgeon: So, in view of the failure of many external investigations of the private sector, why not turn the tables by demanding that the companies themselves come up with the facts and the solutions independently?

Thursday, July 25, 2013

EPHI | Redspin Security Blog

http://www.redspin.com/blog/tag/ephi/


From My iPhone

Computer Viruses Are "Rampant" on Medical Devices in Hospitals | MIT Technology Review

Computer Viruses Are "Rampant" on Medical Devices in Hospitals | MIT Technology Review: “We also worry about situations where blood gas analyzers, compounders, radiology equipment, nuclear-medical delivery systems, could become compromised to where they can’t be used, or they become compromised to the point where their values are adjusted without the software knowing,”

Wednesday, July 24, 2013

Computer Viruses Are "Rampant" on Medical Devices in Hospitals | MIT Technology Review

Computer Viruses Are "Rampant" on Medical Devices in Hospitals | MIT Technology Review: Often the malware is associated with botnets, Olson said, and once it lodges inside a computer, it attempts to contact command-and-control servers for instructions. Botnets

Friday, July 19, 2013

Confirmed: Fracking Triggers Quakes and Seismic Chaos | Mother Jones

Confirmed: Fracking Triggers Quakes and Seismic Chaos | Mother Jones: "Major earthquakes thousands of miles away can trigger reflex quakes in areas where fluids have been injected into the ground from fracking and other industrial operations, according to a study published in the journal Science on Thursday."

'via Blog this'

Light, Bright and Polite Social Media Training for Schools, Parents & Teens - - Media Leaders

Light, Bright and Polite Social Media Training for Schools, Parents & Teens - - Media Leaders: Josh Ochs is the author of the bestselling book “Light, Bright And Polite” and he helps schools, parents and teens be safe on social media

You Can’t Hit Reload on Your Pacemaker - Innovation Insights

You Can’t Hit Reload on Your Pacemaker - Innovation Insights: After all, in today’s multi-cloud world, service providers and enterprises can only deliver their services and ensure network reliability and availability if they know what’s going on in the entire ecosystem.

Understanding Man-In-The-Middle Attacks - Part 3: Session Hijacking

Understanding Man-In-The-Middle Attacks - Part 3: Session Hijacking :: Authentication, Access Control & Encryption :: Articles & Tutorials :: WindowSecurity.com: There are many different forms of session hijacking so the defenses for them can vary. J

Fracking is hardly leakproof - Times Union

http://www.timesunion.com/opinion/article/Fracking-is-hardly-leakproof-3646458.php

Private sector counters cyber attacks with insurance | Germany | DW.DE | 14.07.2013

http://www.dw.de/private-sector-counters-cyber-attacks-with-insurance/a-16950444

Are the government's cyber-security schemes working? An insider's view | ITProPortal.com

http://www.itproportal.com/2013/07/18/are-the-governments-cyber-security-schemes-working-an-insiders-view/

Employees bigger cyber security threat than dedicated criminals - The Information Daily.com

Use in awareness art/webinar

http://www.theinformationdaily.com/2013/07/15/employees-bigger-cyber-security-threat-than-dedicated-criminals

Thursday, July 18, 2013

Monday, July 15, 2013

St. Johns judge with reputation for tough sentences moving to new job | jacksonville.com

St. Johns judge with reputation for tough sentences moving to new job | jacksonville.com: "Anyone who’s been through or worked in the justice system in St. Johns County has an opinion of Judge Wendy Berger."

'via Blog this'

$99 ARM-based PC runs either Ubuntu or Android [Comunitee.com]

$99 ARM-based PC runs either Ubuntu or Android [Comunitee.com]:

'via Blog this'

House Subcommittee Hears Testimony on Developing Mobile Medical Applications | Mintz Levin - Health Law - JDSupra

House Subcommittee Hears Testimony on Developing Mobile Medical Applications | Mintz Levin - Health Law - JDSupra: Approximately 19% of smartphone owners have downloaded a mobile medical application (Medical App).

Researchers hack Verizon device, turn it into mobile spy station | Reuters

Researchers hack Verizon device, turn it into mobile spy station | Reuters: motivated hackers can still find other ways to hack the femtocells of Verizon, as well as those offered by some 30 carriers worldwide to their customers.

Robotic Assisted Surgery

Robotic Assisted Surgery: Robotic assisted surgery involves use of a computerized system operated by a surgeon at a computer console connected with robotic arms.

Thursday, July 11, 2013

Formula 1® - The Official F1® Website

Honda have announced that they will base their European racing operation in Milton Keynes, UK as they continue preparations for their return to Formula One racing.

http://www.formula1.com/news/headlines/2013/7/14794.html


From My iPhone

Tuesday, July 9, 2013

Virus Bulletin : VB100 comparative review on Windows Server 2012

Virus Bulletin : VB100 comparative review on Windows Server 2012: Detection was splendid, with good scores everywhere, and no problems in the WildList or clean sets. That performance earns ESET yet another VB100 award, putting it on a total of 80 passes overall since 1998, and with no fails, or even missed tests, in the decade since June 2003.

Ireland: Bankers joke about their €7 billion bailout scam - World Socialist Web Site

Ireland: Bankers joke about their €7 billion bailout scam - World Socialist Web Site: "In one conversation, the retail banking director Peter Fitzgerald asked the head of capital markets, John Bowe, how he had arrived at a sum of €7 billion to bail out the bank. Bowe responded, “as Drummer [David Drumm, Anglo-Irish CEO] would say, I picked it out of my arse.”"

'via Blog this'

A Brief History of the Movie Trailer Money Shot -- Vulture

A Brief History of the Movie Trailer Money Shot -- Vulture: "Today, every teaser or trailer has one … or two, or three, or eighteen money shots. "

'via Blog this'

IOActive Labs Research: "Broken Hearts": How plausible was the Homeland pacemaker hack?

IOActive Labs Research: "Broken Hearts": How plausible was the Homeland pacemaker hack?: The attacker types in a command to remotely induce defibrillation on the victim’s ICD. It is possible to remotely deliver shocks to ICDs. The functionality exists for testing purposes. Depending on the device model and manufacturer, it is possible to deliver a jolt in excess of 800 volts.

Chip Sullivan of Virginia wins 40th PGA Professional National Championship | World Golf News

Chip Sullivan of Virginia wins 40th PGA Professional National Championship | World Golf News: "When I was diagnosed with diabetes and hemochromatosis (a disease in which the body absorbs too much iron), I made that my No. 1 priority," said Sullivan.

William O. Douglas - Wikiquote

William O. Douglas - Wikiquote: As nightfall does not come all at once, neither does oppression. In both instances, there is a twilight when everything remains seemingly unchanged. And it is in such twilight that we all must be most aware of change in the air — however slight — lest we become unwitting victims of the darkness.

World's Largest Debt Collection Operation Settles FTC Charges, Will Pay $3.2 Million Penalty

World's Largest Debt Collection Operation Settles FTC Charges, Will Pay $3.2 Million Penalty: The world’s largest debt collection operation, Expert Global Solutions and its subsidiaries, has agreed to stop harassing consumers with allegedly illegal debt collection calls and to pay a $3.2 million civil penalty – the largest ever obtained by the Federal Trade Commission against a third-party debt collector.

Monday, July 8, 2013

Former CIA, NSA director sounds off on PRISM, spying tools

Former CIA, NSA director sounds off on PRISM, spying tools: "It's time to call the NSA's mass surveillance programs what they are: criminal.""

'via Blog this'

NIST Seeks Private-Sector Input at Cybersecurity Framework Workshop

NIST Seeks Private-Sector Input at Cybersecurity Framework Workshop: More than 700 people attended NIST's first two workshops, in Washington, D.C., and Pittsburgh, with more than 2,500 people participating online.

3rd Cybersecurity Framework Workshop - July 10-12 2013 San Diego CA

3rd Cybersecurity Framework Workshop - July 10-12 2013 San Diego CA: Executive Order 13636, Improving Critical Infrastructure Cybersecurity, has directed NIST to work with stakeholders to develop a voluntary framework for reducing cyber risks to critical infrastructure.

NIST meeting poses major test for Obama cybersecurity push

NIST meeting poses major test for Obama cybersecurity push: “This is breaking all new ground,” says one industry source of the NIST process, “and the next meeting may determine whether you can write standards through such a broad collaborative process.”

iptables or host.deny for VPS & fail2ban? - Web Hosting Talk

iptables or host.deny for VPS & fail2ban? - Web Hosting Talk: Hello, I recently got myself into an unmanaged VPS package and I noticed in my log files, countless attempts to ssh into the system. After a bit of searching, fail2ban looked like a good way to ban the brute force attacks automatically.

BYOD to Drive Data to the Cloud | Innovation Insights | Wired.com

BYOD to Drive Data to the Cloud | Innovation Insights | Wired.com: The BYOD trend will push organizations into adopting cloud-based services for mobile device management (MDM), particularly in the SMB market where they lack the IT staff and budget to adequately deal with it.

Malware hits businesses 20 to 60 times an hour, say researchers

Malware hits businesses 20 to 60 times an hour, say researchers: Advanced cyber attacks hit businesses 20 times an hour on average, according to researchers at security firm FireEye.

Number of Companies Buying Cyber Insurance up by One-Third in 2012: Marsh

Number of Companies Buying Cyber Insurance up by One-Third in 2012: Marsh: “As a result, companies are now looking to manage their day-to-day cyber risks in the same way they do more traditional risks—through the purchase of insurance.”

Ann Arbor Research Center for Medical Device Security: FDA Publishes Draft Guidance on Medical Device Cybersecurity

Ann Arbor Research Center for Medical Device Security: FDA Publishes Draft Guidance on Medical Device Cybersecurity: Unlike previous guidance on cybersecurity for specific types of COTS software, this guidance spells out more detail on cybersecurity responsibilities for a medical device manufacturer

House Subcommittee Hears Testimony on Developing Mobile Medical Applications | Mintz Levin - Health Law - JDSupra

http://www.jdsupra.com/legalnews/house-subcommittee-hears-testimony-on-de-98003/?utm_source=LU_Emails


From My iPhone

Wednesday, July 3, 2013

Lost thumb drive leads to compromised patient data - SC Magazine

Lost thumb drive leads to compromised patient data - SC Magazine: "A lost thumb drive containing thousands of patient records went missing from a Nebraska doctor's office"

'via Blog this'

Women in Security mentoring scheme launched - SC Magazine UK

Women in Security mentoring scheme launched - SC Magazine UK: The Women in Security mentoring scheme will have three objectives: to enhance technical skills; to help expand professional networks; and ensure newcomers are not put off by jargon and can feel part of a group

3rd Cybersecurity Framework Workshop - July 10-12 2013 San Diego CA

3rd Cybersecurity Framework Workshop - July 10-12 2013 San Diego CA: The third Cybersecurity Framework workshop will be hosted July 10-12, 2013 in San Diego by the University of California, San Diego (UCSD) and the National Health Information Sharing and Analysis Center (NH-ISAC).

Threat matrix: Malware and hacking pose dangers to medical devices | Healthcare IT News

Threat matrix: Malware and hacking pose dangers to medical devices | Healthcare IT News: "We’re starting to attach [medical devices] to electronic health records, and they’re not secure," said Zoph. "We’re not doing it with security in mind."

Tuesday, July 2, 2013

Mobile EHR Application - Greenway Medical

Mobile EHR Application - Greenway Medical: "Greenway’s PrimeMOBILE™ delivers complete remote access of ambulatory data housed in our flagship EHR solution, PrimeSUITE®, all for an extremely low monthly cost."

'via Blog this'

HFE Gene Variants Affect Iron in the Brain

HFE Gene Variants Affect Iron in the Brain: Alizadeh et al. (102) reported no association of HFE alleles with AD, although they did suggest that H63D homozygotes tended to have earlier age at onset compared with noncarriers.

Increase Seen in Use Of Robotically-Assisted Hysterectomy For Benign Gynecologic Disorders | Digital News Release

Increase Seen in Use Of Robotically-Assisted Hysterectomy For Benign Gynecologic Disorders | Digital News Release: Total costs associated with robotically assisted hysterectomy were $2,189 more per case than for laparoscopic hysterectomy, the researchers write.

Applied Dexterity | Driving Innovation in Surgical Robotics

Applied Dexterity | Driving Innovation in Surgical Robotics: The RAVEN surgical robot is a research instrument designed to support research in advanced techniques in robotic assisted surgery.

Robotic Surgery: Growing Sales, but Growing Concerns

Robotic Surgery: Growing Sales, but Growing Concerns: Since then, da Vinci hospital robot placements and procedures have skyrocketed. Last year alone, installations rose by 21 percent to 2,585 units worldwide at a cost of more than $1.5 million each. And robotic surgical procedures leaped by 25 percent to 450,000.

UCSC | Bionics Lab > Surgical Robotics > Raven

UCSC | Bionics Lab > Surgical Robotics > Raven: Initial teleoperation experiments conducted within the continental US from several remote locations allowed two surgeons, each one controlling a set of two arms, to complete fundamental laparoscopic surgery (FLS) tasks collaboratively while using sampling rate of 1 kHz.

Surgical robots: The kindness of strangers | The Economist

Surgical robots: The kindness of strangers | The Economist: More importantly for academics, it is also the first surgical robot to use open-source software. Its Linux-based operating system allows anyone to modify and improve the original code, creating a way for researchers to experiment and collaborate.

Cyberoam launches Web manager for NetGenie appliances - Security - News & Features - ITP.net

Cyberoam launches Web manager for NetGenie appliances - Security - News & Features - ITP.net: Cyberoam has launched a new NetGenie On-Cloud Management Service (NCMS), which will allow remote administration of its NetGenie SO/HO network security app

Netgenie SOHO

Netgenie SOHO: Netgenie SOHO creates a Wi-Fi zone for you along with the benefits of Stateful Inspection Firewall, VPN, in-built Anti-Virus, Intrusion Prevention System, 3G Ready and Internet Controls over websites and applications – all this in your Wireless Router!

Facebook in more hot water, now over 'shadow dossiers' - Network World

Facebook in more hot water, now over 'shadow dossiers' - Network World

...during the course of an investigation of the flaw by a security company, it was discovered that Facebook keeps "shadow dossiers" on its members. Those dossiers contain information about people not volunteered by them but scraped from third-party sources. 

ZeuS Malware Returns, Targets SMBs - Smb - Security - Informationweek

ZeuS Malware Returns, Targets SMBs - Smb - Security - Informationweek: Like phishing and other "old" scams, ZeuS is back because it works -- very well, in some cases. In 2009, for example, hackers lifted $588,000 from a Maine construction company's bank account before the theft was detected.

The Network And The Malware -- Dark Reading

The Network And The Malware -- Dark Reading: The story goes that these devices can detect bad stuff on the perimeter. The sales reps will tell you they've figured out how to stop the APT, make your CIO respect you, and allow you to actually spend a holiday like Memorial Day drinking beer, eating BBQ, and remembering the heroes who defend your homeland -- instead of how you usually spend the holiday, which is trying to figure out how your customer database ended up on Pastebin.

Ebook Best-Sellers | Digital Book World

Ebook Best-Sellers $0.00 to $2.99 Week Ending 5-12-13 | Digital Book World: Rank on main list after forward slash; previous week’s list rank in parentheses.

Think Again: Big Data - By Kate Crawford | Foreign Policy

Think Again: Big Data - By Kate Crawford | Foreign Policy: The promoters of big data would like us to believe that behind the lines of code and vast databases lie objective and universal insights into patterns of human behavior, be it consumer spending, criminal or terrorist acts, healthy habits, or employee productivity.

Virtual Brain Online Knowledge Base - Linux iptables

Virtual Brain Online Knowledge Base - Search Page: While researching the best way to implement the custom rules created by my script I came across the recent option of the match module.

We will always be fighting cyber crime, says Mikko Hypponen- The Inquirer

We will always be fighting cyber crime, says Mikko Hypponen- The Inquirer: INFOSEC@ NO MATTER HOW MUCH we improve internet security we'll always be fighting cyber criminals, F-Secure senior security researcher Mikko Hypponen has declared.

NSA slides explain the PRISM data-collection program - Washington Post

http://www.washingtonpost.com/wp-srv/special/politics/prism-collection-documents/m/


From My iPhone

Laboratory Investigation of Primary Aldosteronism

http://www.ncbi.nlm.nih.gov/pmc/articles/PMC2874431/#__abstractid1000338title


From My iPhone

Monday, July 1, 2013

Surgical robots: The kindness of strangers | The Economist

Surgical robots: The kindness of strangers | The Economist: More importantly for academics, it is also the first surgical robot to use open-source software. Its Linux-based operating system allows anyone to modify and improve the original code, creating a way for researchers to experiment and collaborate.

MAUDE Adverse Event Report: INTUITIVE SURGICAL,INC.DA VINCI SI SURGICAL SYSTEMENDOSCOPIC INSTRUMENT CONTROL SYSTEM

MAUDE Adverse Event Report: INTUITIVE SURGICAL,INC.DA VINCI SI SURGICAL SYSTEMENDOSCOPIC INSTRUMENT CONTROL SYSTEM: it was reported that during a da vinci si adrenalectomy, distal pancreatectomy, and splenectomy procedure performed on (b)(6) 2009, the surgeon allegedly injured the patient's aorta. The legal complaint indicated that the injury occurred during dissection and the surgeon made the decision to convert the robotic surgery to open surgical techniques. The legal complaint alleged that during transition, the robot's arm was inappropriately moved, causing a tear in the patient's aorta. The surgeon reportedly repaired the aorta. The legal complaint indicated that post-operatively, the patient experienced renal failure and the family withdrew life support shortly after surgery. No further clinical information was provided.

Saw - cisst

https://www.cisst.org/Saw


From My iPhone

Detailed article

http://www.google.com/url?sa=t&rct=j&q=hemochromatosis%20morbidity&source=web&cd=28&ved=0CEAQFjAHOBQ&url=http%3A%2F%2Fwww.cchil.org%2Fhospitalmedicine%2Fimages%2Fresources%2F091308-115738pm-2383.pdf&ei=8ejQUdLwMKS6iwL49oDIBg&usg=AFQjCNHHa-UV3jOHB5zsLYuht-TMsIL-jw&sig2=cWVGlaWI0TFTPqfsaMftmA

D

www.cchil.org/hospitalmedicine/images/.../091308-115738pm-2383.pdf

Screening for Hereditary Hemochromatosis: Systematic Review

Good data

http://www.uspreventiveservicestaskforce.org/uspstf06/hemochromatosis/hemochrev.htm

Clinical consequences of iron overload in hemochromatosis homozygotes

Study attacking Kaiser

http://bloodjournal.hematologylibrary.org/content/101/9/3351.full.html

Screening for hemochromatosis: high pre - PubMed Mobile

http://www.ncbi.nlm.nih.gov/m/pubmed/11589387/