Monday, March 31, 2014

Coder Behind Notorious Bank-Hacking Tool Pleads Guilty | Threat Level | WIRED

Panin's extradition to the U.S. has brought controversy in Russia. He had been listed on Interpol's "red list" for internet banking scams that involved the theft of $5 million. 


From My iPhone

Will Target's Lawsuit Finally Expose the Failings of Security Audits? | Threat Level | Wired.com

On Monday, two banks suing Target for their losses also included Trustwave in their suit, the security firm that certified last September that Target's networks and data-handling tactics were in tip-top security shape — just two months before crooks made mincemeat of that assertion.

http://www.wired.com/threatlevel/2014/03/trustwave-target-audit/


From My iPhone

Sunday, March 30, 2014

Privacy Perils of Big Data Integration: A New Task for CDOs?

Privacy Perils of Big Data Integration: A New Task for CDOs?:



Protesters are organizing to stop Oakland and the Port of Oakland from building a surveillance hub called the Domain Awareness Center.

FTC Calls for National Data Security Standards as Proposed Legislation Stalls | Barger & Wolen - JDSupra

FTC Calls for National Data Security Standards as Proposed Legislation Stalls | Barger & Wolen - JDSupra:



In congressional testimony, the Federal Trade Commission’s Chairwoman, Edith Ramirez, recently reiterated the FTC’s call for stronger data security laws, while federal legislation concerning data security and breach notification remains in limbo.

This Is How the NSA Is Trying to Win Over the Media

This Is How the NSA Is Trying to Win Over the Media:



On a page titled "Operating as a responsible citizen," with a picture of U.S. Constitution in the background, the NSA writes that it carries out "missions in ways that are consistent with the Nation's values and laws."

SCADA StrangeLove: All your PLC are belong to us (2)

SCADA StrangeLove: All your PLC are belong to us (2):



Group of security researchers focused on ICS/SCADA security to save Humanity from industrial disaster and to keep Purity Of Essence

'Arrogant' Snowden putting lives at risk, says NSA's deputy spyboss • The Register

'Arrogant' Snowden putting lives at risk, says NSA's deputy spyboss • The Register:



the techie should have gone to his line manager if he had complaints. This ignores the fact that, as a contractor, he had no whistleblower protection under the law, not to mention was aware of what happened to other NSA staff who complained

How to Get Your Specialty Data Reports | Credit.com Blog

How to Get Your Specialty Data Reports | Credit.com Blog:



Data broker reports are not subject to Fair Credit Reporting Act requirements, which means you aren’t entitled to a free peek at their data every year, like you are with free annual credit reports at the three major credit reporting agencies.

Thursday, March 27, 2014

Internet voting already okayed in some American states

Internet voting already okayed in some American states: "Back in 2012, a report on Election Preparedness was produced by a group of organizations that included Rutgers School of Law. The report’s findings includied this statement:"



'via Blog this'

Wednesday, March 26, 2014

Senators Want Ukraine to Arrest Target Hackers in Exchange for Aid - Nextgov.com

"The previous Ukrainian government routinely turned a blind eye to cybercrime," Warner said in a statement. "As the United States works to support this new Ukrainian government and as the Senate considers this significant Ukrainian aid package, we have an excellent opportunity to create new structures of cooperation that will better protect American consumers and businesses by working together to crack down on international cybercrime."

http://m.nextgov.com/defense/2014/03/senators-want-ukraine-arrest-target-hackers-exchange-aid/81160/?oref=ng-dropdown&oref=ng-iphone-interstitial-continue


From My iPhone

Monday, March 24, 2014

Scott Wolter Makes More Claims about Holy Bloodline Templar Conspiracies and Jesus' Daughter - JasonColavito.com

Scott Wolter Makes More Claims about Holy Bloodline Templar Conspiracies and Jesus' Daughter - JasonColavito.com:



Wolter needs these stones to be authentic in order to support his claims to a Templar conspiracy because the Spirit Pond stones’ inscriptions were modeled on those of the Kensington Rune Stone and therefore include another instance of the otherwise non-standard variant-A rune, which Scott Wolter has trademarked under the name the “Hooked X�.”

Friday, March 21, 2014

dns oarc - Google Search


DNS-OARC provides a trusted, shared platform to allow the DNS operations community to share information and data.

From My iPhone

Sunday, March 16, 2014

Business Standard and Ratting

http://wap.business-standard.com/article/beyond-business/ratters-on-the-prowl-114031401145_1.html

To fish for slaves, many employ social engineering tricks. Lonely Fox messages random people on Facebook and infects them.

From My iPhone

Edward Snowden: U.S. obsession with surveillance hurts fight against terrorism  - Daily News


Uncle Sam's fixation with mass surveillance has tied up resources that could have thwarted real terror plots, fugitive leaker Edward Snowden argued Monday.

From My iPhone

Report: The flawed processes behind government watchlists - Salon.com

Report: The flawed processes behind government watchlists - Salon.com:



“The government fought to avoid correcting the error for
years, even invoking the state secrets privilege in an unsuccessful effort to prevent judicial scrutiny. She was permitted to leave the country, but to this day, she has been barred from returning, even though the government admits that she should not have been placed on the No Fly List.”

Friday, March 14, 2014

How Belfast can tap into the future of safer software - BelfastTelegraph.co.uk

How Belfast can tap into the future of safer software - BelfastTelegraph.co.uk:



"If I had my way, we would start teaching kids how to code at five years old," he said.

"We in the USA don't have enough people and I know this is a problem for governments around the world.

Saturday, March 8, 2014

Substance use disorder - Wikipedia, the free encyclopedia

Substance use disorder - Wikipedia, the free encyclopedia:



There is also a lesser known situation called pseudo-addiction.[9] A patient will exhibit drug-seeking behavior reminiscent of psychological addiction, but they tend to have genuine pain or other symptoms that have been under-treated. Unlike true psychological addiction, these behaviors tend to stop when the pain is adequately treated.

Thursday, March 6, 2014

Reverse-engineering SSNs from publicly available data - Boing Boing

http://boingboing.net/2009/07/06/reverse-engineering.html

With fewer than 1,000 attempts, they could identify the entire nine digits for 8.5 percent of the group.

From My iPhone

How Covert Agents Infiltrate the Internet to Manipulate, Deceive, and Destroy Reputations - The Intercept

https://firstlook.org/theintercept/2014/02/24/jtrig-manipulation/

the overarching point revealed by all of these documents: namely, that these agencies are attempting to control, infiltrate, manipulate, and warp online discourse, and in doing so, are compromising the integrity of the internet itself.

From My iPhone

Wednesday, March 5, 2014

Will Providers Have Certified EHRs for Meaningful Use Stage 2? - iHealthBeat

Will Providers Have Certified EHRs for Meaningful Use Stage 2? - iHealthBeat:



a consultant based in Montgomery, Texas, noted that 15 of the 20 vendors that together have a 90% share of the ambulatory EHR market already boast certified products.

Videos | StaySafeOnline.org

Videos | StaySafeOnline.org:



The 2014 NCSA Data Privacy Day Kickoff Event

Want to Predict the Future of Surveillance? Ask Poor Communities.

Want to Predict the Future of Surveillance? Ask Poor Communities.:



Counterintuitive as it may seem, we are targeted for digital surveillance as groups and communities, not as individuals.

Doctors unhappy with EHRs | BenefitsPro

Doctors unhappy with EHRs | BenefitsPro:



A survey of 1,000 physicians for Medical Economics shows widespread dissatisfaction related to the functionality and cost of these patient record systems, with nearly 70 percent saying the investment isn’t worth it

As Doctors Embrace Tablets, Management Headaches Grow - InformationWeek

As Doctors Embrace Tablets, Management Headaches Grow - InformationWeek:



Clinicians increasingly are taking tablets to their patient encounters, and that's translating into new opportunities and new headaches for IT professionals

Institute for Electric Grid Cybersecurity Girds Utilities

Institute for Electric Grid Cybersecurity Girds Utilities | Threatpost | The first stop for security news: One of the bigger problems with the grid came last year when two engineers Adam Crain and Chris Sistrunk discovered a vulnerability in an electrical communication protocol that’s widely used across the country.

Monday, March 3, 2014

College Hacker Gets Jail For Changing His Grades to Straight As

Roy Sun, 25, was a $70,000-a-year electrical engineer straight out of college. And why not? He'd gone to one of the best engineering schools in the country. He even studied, um, computer security in his free time. Which he had a lot of, since he never went to class.

http://gawker.com/college-hacker-gets-jail-for-changing-his-grades-to-str-1535130942

New anti-virus software misses corners | smh.com.au

http://m.smh.com.au/digital-life/computers/new-antivirus-software-misses-corners-20140226-33g95.html

The problem with the PC turned out to be a faulty network switch.

From My iPhone

Sunday, March 2, 2014

19 Extensions to Turn Google Chrome into Penetration Testing tool - InfoSec Institute

19 Extensions to Turn Google Chrome into Penetration Testing tool - InfoSec Institute: After reading this post, you will come to know that Chrome is more than just a browser. With these nice extensions, it will become the friend of penetration testers and security researchers.

CSTA - High School Surveys

CSTA - High School Surveys: Across the U.S., there are growing concerns about computer science in high schools. While there are many anecdotal reports about dropping enrollments and state-level teaching certification battles, there is a critical lack of solid information.

Saturday, March 1, 2014

BBC News - World's longest aircraft is unveiled in UK


It is 70% greener than a cargo plane, he says. It doesn't need a runway, just two crew. And it can plonk 50 tonnes anywhere in the world you like, which is 50 times more than a helicopter.

From My iPhone

Protecting Identity Is Your Responsibility | Financial | Articles | ID Theft Blog

http://www.idtheftcenter.org/Financial/protecting-identity-is-your-responsibility.html

You should know that you already have a high degree of protection against fraudulent use of your existing credit cards, and even your debit card.

From My iPhone

DARPA wants to scrub scourge of counterfeit computer gear

http://m.networkworld.com/community/blog/darpa-wants-scrub-scourge-counterfeit-computer-gear?source=NWWNLE_nlt_security_2014-02-25

Few things can mess up a highly technical system and threaten lives like a counterfeit electronic component, yet the use of such bogus gear is said to be widespread.

From My iPhone