Friday, February 28, 2014

FTC: Identity theft is the plague of the country - Network World

FTC: Identity theft is the plague of the country - Network World:



And for the 14th consecutive year the winner, or loser really, for 2013 was identity theft, receiving over 290,000 or 14% of the agency’s 2 million overall complaints. Thirty percent of these incidents were tax- or wage-related, which continues to be the largest category within identity theft complaints, the FTC stated.

FBI expects to roll out malware-analysis system to help businesses identify attacks - Network World

FBI expects to roll out malware-analysis system to help businesses identify attacks - Network World:



The director of the Federal Bureau of Investigation (FBI) said this week his agency plans to introduce a malware-analysis system later this year that will let businesses and the public, report newly identified malware attacks, upload malware samples and receive reports on them.

Thursday, February 27, 2014

New Push to Boost Numbers of Minority STEM Ph.D.s | Inside Higher Ed

New Push to Boost Numbers of Minority STEM Ph.D.s | Inside Higher Ed:



California Institute of Technology, Stanford University, and the University of California campuses at Berkeley and Los Angeles jointly announced a new effort Thursday to increase the number of minority Ph.D.s in science, mathematics and technology fields.

Increased sensitivity to low frequency vibration found in people with inherited hearing loss

Increased sensitivity to low frequency vibration found in people with inherited hearing loss:



according to Gary Lewin and Thomas Jentsch. "The skin has several different types of mechanoreceptors, which respond to different qualities of stimuli, especially to different frequency ranges. The interaction of different receptor classes is important for the touch sensation. Although the receptors we studied became more sensitive due to the loss of the potassium channel, this may be outweighed by the disadvantage of the wrong 'tuning to other frequencies'. With KCNQ4 we have for the first time identified a human gene that changes the traits of the touch sensation."

Security firm discloses Apple iOS "malicious profile" vulnerability impact on MDM - CSO Online - Security and Risk

Security firm discloses Apple iOS "malicious profile" vulnerability impact on MDM - CSO Online - Security and Risk



One to watch!

White Ops -- Cool stuff

White Ops:



Our deterministic, real time technology detects the most sophisticated nonhuman or remotely controlled traffic that affects everything from advertising campaigns, exchanges and publishers to enterprise systems, e-commerce transactions, online finance portals, and beyond.

Women in Cybersecurity

Women in Cybersecurity:



Women in Cybersecurity Conference: Nashville, TN, April 11th and 12th, 2014

Daylight Saving Time Around the World 2014

Daylight Saving Time Around the World 2014:



This page displays a brief (but not complete) overview over which countries and territories that plan to observe DST during . Note that the list might not be final - countries, territories and states sometimes make adjustments that are announced just days or weeks ahead of the change.

When is a patent claim so outrageous that attorney’s fees must be awarded? | Ars Technica

http://arstechnica.com/tech-policy/2014/02/when-is-a-patent-claim-so-outrageous-that-attorneys-fees-must-be-awarded/

Egregious patent stuff.

From My iPhone

Wednesday, February 26, 2014

Dashboard for Health IT

http://dashboard.healthit.gov/

Some great stats.

From My iPhone

Modern Healthcare EHR Adoption

http://www.modernhealthcare.com/article/20140120/NEWS/301209957?template=smartphone


From My iPhone

ChannelnomicsRSA: Too Much Spent on Antivirus Tech

http://channelnomics.com/2014/02/25/rsa-much-spent-antivirus-tech/

"We aren't even close to antivirus being old technology," said McAfee president Michael DeCesare. "De Walt makes this noise constantly that the antivirus industry is dead, but show me one single company that has de-installed antivirus because they have FireEye."

From My iPhone

Tuesday, February 25, 2014

FBI — Carlsbad Credit Repair ‘Predator’ Receives Prison Sentence

Interesting case of justice served in San Diego:

"Phillips claimed that Georggin Law could file lawsuits in small claims courts and have prior short sales and foreclosures removed from clients' credit reports. In addition to lying about his history and qualifications,"

http://m.fbi.gov/#http://www.fbi.gov/sandiego/press-releases/2014/carlsbad-credit-repair-predator-receives-prison-sentence

From My iPhone

Saturday, February 22, 2014

The day we fought back | TheHill

http://thehill.com/blogs/congress-blog/civil-rights/198859-the-day-we-fought-back

Now the USA FREEDOM Act stands poised to begin its march towards passage this winter and spring...

From My iPhone

Following the Wh1t3 Rabbit - A Security blog by Rafal Los: Entry level hiring in InfoSec - the comedy of errors


the conclusion I'm reaching is that hiring, at the lower levels of the Information Security talent spectrum is an absolute train wreck.

From My iPhone

Is creationism compatible with science? The evidence says yes.

http://www.slate.com/blogs/saletan/2014/02/21/is_creationism_compatible_with_science_the_evidence_says_yes.html

They back up the hypothesis that you can be a perfectly good engineer while believing nonsense about the origins of life. We can't wave that evidence away, any more than we can wave away fossils.

From My iPhone

Leonard Nimoy & Wingz 1987 on Vimeo

Leonard Nimoy & Wingz 1987 on Vimeo:



It's 1987 and the exhibit caused a ruckus on the show floor, a little leaked news item suggested that Leonard Nimoy would be there.

Wednesday, February 19, 2014

Production firms stir suspicion among networks, would-be clients - The Washington Post

Production firms stir suspicion among networks, would-be clients - The Washington Post:



The program, he told her last month, would be hosted by actor Martin Sheen and shown on PBS stations.

How to handle noisy neighbors - MSN Real Estate

Insulation is put between the walls to absorb the echo. And in front of the new exterior wallboard is placed either a barrier, such as mass-loaded vinyl, or a damping agent, such as the popular Green Glue. Some wallboard, such as QuietRock, has damping materials inside.

http://realestate.msn.com/article.aspx?cp-documentid=13108380&page=2

Tuesday, February 18, 2014

2014 Science And Engineering Indicators: 90 Percent Of Americans Respect Scientists

http://www.science20.com/news_articles/2014_science_and_engineering_indicators_90_percent_americans_respect_scientists-129751

According to the survey, more than 90 percent of Americans think scientists are "helping to solve challenging problems" and are "dedicated people who work for the good of humanity."

From My iPhone

Sunday, February 16, 2014

Anita Borg Institute

Anita Borg Institute:



We connect, inspire, and guide women in computing and organizations that view technology innovation as a strategic imperative.

New Push to Boost Numbers of Minority STEM Ph.D.s | Inside Higher Ed

New Push to Boost Numbers of Minority STEM Ph.D.s | Inside Higher Ed: California Institute of Technology, Stanford University, and the University of California campuses at Berkeley and Los Angeles jointly announced a new effort Thursday to increase the number of minority Ph.D.s in science, mathematics and technology fields.

Editorial: Privacy bill of no real help to sexual assault victims » Knoxville News Sentinel Mobile

http://m.knoxnews.com/news/2014/feb/16/editorial-privacy-bill-of-no-real-help-to-sexual/

Privacy rights gone wrong

From My iPhone

InfoSec Handlers Diary Blog - More on HNAP - What is it, How to Use it, How to Find it

https://isc.sans.edu/diary/More+on+HNAP+-+What+is+it%2C+How+to+Use+it%2C+How+to+Find+it/17648

The protocol was patented originally by Pure Networks, but the protocol is now owned by and the implementation has been carried forward by Cisco.

From My iPhone

Saturday, February 15, 2014

Commissioner Jessica Rosenworcel | FCC.gov

Commissioner Jessica Rosenworcel | FCC.gov: This experience has shaped her belief that in the 21st century strong communications markets can foster economic growth and security, enhance digital age opportunity, and enrich our civic life.

How Loon Works – Project Loon – Google

How Loon Works – Project Loon – Google:



Each balloon can provide connectivity to a ground area about 40 km in diameter at speeds comparable to 3G. For balloon-to-balloon and balloon-to-ground communications, the balloons use antennas equipped with specialized radio frequency technology. Project Loon currently uses ISM bands (specifically 2.4 and 5.8 GHz bands) that are available for anyone to use.

Create a Long-Distance Wi-Fi Link

Create a Long-Distance Wi-Fi Link:



But what about beaming a signal 5, 10, 20 miles, or more? Wireless is a natural replacement for land lines, T1s, DSL, and other high-speed data when needed in a remote location.

FCC Certifies Carlson Wireless Technologies TV White Space Radio

FCC Certifies Carlson Wireless Technologies TV White Space Radio:



The Federal Communications Commission (FCC) has certified the company’s RuralConnect TV white space (TVWS) radio system for use with the Spectrum Bridge TV white spaces database. This certification brings to market the world’s first affordable long-distance, non-line-of-site (NLOS) fixed wireless broadband system.

RuralConnect | TV White Spaces Radio

RuralConnect | TV White Spaces Radio:



By making wireless connectivity possible in areas previously difficult or prohibitively expensive to reach, the RuralConnect launches a new era of opportunity for rural communities demanding high-speed internet.

PCI DSS Compliance is No Security Guarantee | The State of Security

http://www.tripwire.com/state-of-security/regulatory-compliance/pci-dss-compliance-security-guarantee/

A common theme is that many organizations may have passed their assessment at a point in time, but failed to sustain it.

From My iPhone

Why Bitcoin Matters - NYTimes.com


What technology am I talking about? Personal computers in 1975, the Internet in 1993, and – I believe – Bitcoin in 2014.

From My iPhone

Thursday, February 13, 2014

Monday, February 10, 2014

What is this?

http://flow.wpengine.com/?p=120

Hmmm

From My iPhone

Healthcare Information Security: Still No Respect - InformationWeek

More than a decade after publication of HIPAA's security rule, healthcare information security officers still struggle to be heard.



From My iPhone

The Buck Stops At BYOC - InformationWeek

The Buck Stops At BYOC - InformationWeek: BYOC is likely to meet far more resistance in enterprise organizations.

Red Or Blue, I'm Usually The Only Woman On The Team -- Dark Reading

Red Or Blue, I'm Usually The Only Woman On The Team -- Dark Reading: As of 2006, only 13 percent of U.S. cybersecurity professionals were women.

Richest 1 Percent Hold 46 Percent Of The World's Wealth

Richest 1 Percent Hold 46 Percent Of The World's Wealth: the richest 10 percent owning 86 percent of the wealth, analysts at the Credit Suisse Research Institute said.

How the NSA Almost Killed the Internet | Threat Level | Wired.com

How the NSA Almost Killed the Internet | Threat Level | Wired.com: Google, Facebook, Microsoft, and the other tech titans have had to fight for their lives against their own government

Tutorial: Deploying a WordPress Blog on Your Amazon EC2 Windows Instance - Amazon Elastic Compute Cloud

Tutorial: Deploying a WordPress Blog on Your Amazon EC2 Windows Instance - Amazon Elastic Compute Cloud: This tutorial will help you install and deploy a WordPress blog on an Amazon EC2 Windows instance.

Choose your wallet - Bitcoin

Choose your wallet - Bitcoin: Your Bitcoin wallet is what allows you to transact with other users. It gives you ownership of a Bitcoin balance so that you can send and receive bitcoins.

Protecting Your Enterprise From DNS Threats -- Dark Reading

Protecting Your Enterprise From DNS Threats -- Dark Reading:



DNS clients have to trust the information they receive, but when DNS was designed back in the '80s, scalability and availability were the key goals. Little attention was given to security.

How Hackers Target and Hack Your Site - InfoSec Institute

How Hackers Target and Hack Your Wordpress Site - InfoSec Institute:



Our aim in this article to show you the techniques most used by hackers in targeting and hacking your Wordpress site!

Want to Predict the Future of Surveillance? Ask Poor Communities.

Want to Predict the Future of Surveillance? Ask Poor Communities.: When our conversation turned to Electronic Benefit Transfer cards (EBT), Dorothy* said, “They’re great. Except [Social Services] uses them as a tracking device.”

Saturday, February 8, 2014

FSB's Olympic Spying | Opinion | The Moscow Times

FSB's Olympic Spying | Opinion | The Moscow Times:



Russian intelligence agencies are violating the law when they gather metadata on citizens without a court order.

Privacy roadmap

Navigating the maze of Federal, State, and Industry privacy regulations can be incredibly complicated, even for a highly experienced team.

http://data-security.co3sys.com/security-breach-regulation-roadmap/?source=adwords


From My iPhone

Thursday, February 6, 2014

FSB Makes Eavesdropping an Olympic Event | Opinion | The Moscow Times

FSB Makes Eavesdropping an Olympic Event | Opinion | The Moscow Times:

Rossiiskaya Gazeta published a government decree signed by Prime Minister Dmitry Medvedev that effectively announced plans to collect metadata from all Olympics participants, including athletes, event judges and journalists.

Wednesday, February 5, 2014

Public Records - Florida Division of Elections - Department of State

http://election.dos.state.fl.us/voting/public.shtml

This information can find its way onto the Internet or websites by individuals or entities that obtain public records from the State. A website may offer you the option to remove your information for a fee. Please be advised that it will only apply to that particular website.

Multiple States Deny Parents the Right to Opt a Child Out of SLDS Tracking | COMMON CORE

Multiple States Deny Parents the Right to Opt a Child Out of SLDS Tracking | COMMON CORE:

So, the “Bureau Chief” of the PK20 Florida Data Warehouse informed the Florida parent that he was “unable to identify opt out provisions to PK2O Education Data Warehouse.”

Also see:

http://election.dos.state.fl.us/pdf/webappform.pdf

and

http://flvoters.com/by_number/1010/29773.html

Once filed, all information including your phone number and email address as provided
become public record...

Sunday, February 2, 2014

Hackers exploit SCADA holes to take full control of critical infrastructure | Computerworld Blogs

VSAT devices have telnet access with very poor password strength, many times using default factory settings.

http://m.blogs.computerworld.com/cybercrime-and-hacking/23402/hackers-exploit-scada-holes-take-full-control-critical-infrastructure?mm_ref=http%3A%2F%2Ft.co%2Fkg1mf393Wt


From My iPhone

BBC News - The upside to being let go by Nokia

But the ex-Nokians have now created hundreds of new companies - thanks partly to a very Finnish level of support from the employer to its departing staff.



From My iPhone

Johnson & Johnson Will Release Clinical Data to Researchers : News : Counsel & Heal

Even though sharing data could be extremely beneficial for research, Waldstreicher stated that there is still "a bit of a learning process." For example, in trials that recruited patients with rare diseases, anonymity could be jeopardized.

http://www.counselheal.com/articles/8514/20140201/johnson-johnson-will-release-clinical-data-to-researchers.htm


From My iPhone

BBC News - Drug trafficking is speeding deforestation in Central America

Remote forests in Honduras and Guatemala are being cut down to facilitate landing strips for the transportation of narcotics.



From My iPhone