Tuesday, April 29, 2014

Saturday, April 26, 2014

Here's How 'Big Data' Can Really Hurt The Poor

Here's How 'Big Data' Can Really Hurt The Poor: The review, expected to be released within the next week, is the Obama administration's first attempt at addressing the vast landscape of challenges, beyond national security and consumer privacy, posed by technological advancements.

Everything We Know About What Data Brokers Know About You - ProPublica

Everything We Know About What Data Brokers Know About You - ProPublica: there’s a thriving public market for data on individual Americans -- especially data about the things we buy and might want to buy.

Databases collect your personal information and invasion of privacy

Databases collect your personal information and invasion of privacy: Your personal information—everything from your shopping habits to your health history—can be available to creditors, employers, landlords, insurers, law enforcement agencies, and, of course, criminals.

Thursday, April 24, 2014

The Nine Basic Patterns of Cyber Threats

The Nine Basic Patterns of Cyber Threats:



After analyzing 10 years of data, we realize most organizations cannot keep up with cybercrime – and the bad guys are winning.

Tuesday, April 22, 2014

AG Coakley Investigates Potential Data Breach Involving Major Credit Reporting Company

AG Coakley Investigates Potential Data Breach Involving Experian

Ngo gained access to the personal information when he obtained an account with a U.S. company known as Court Ventures by posing as a private investigator from Singapore.

Friday, April 18, 2014

Why is the controversy surrounding Safe Harbor making 2014 a crucial year? | Peak 10

The NSA/Snowden debacle was a tipping point. Outraged by the revelation, the European Commission issued 13 recommendations to improve the enforcement and adequacy of Safe Harbor, including proposals that the FTC should subject companies to independent compliance audits. The deadline for implementing these recommendations is summer 2014.  Viviane Reding, European Commissioner, put it this way: "Safe Harbor has to be strengthened, or it will be suspended."

http://www.peak10.com/blog/post/why-is-the-controversy-surrounding-safe-harbor-making-2014-a-crucial-year#.U1F_jk7n_0w

Guide to 24 medical marijuana strains | Northwest Leaf: The Patients voice

and the uniquely functional indica effect allows light intake to provide functional pain relieving effects and heavier intake to provide an excellent sleeping aid.

Http://www.thenorthwestleaf.com/pages/articles/post/guide-to-24-medical-marijuana-strains

Monday, April 14, 2014

Tax ID Fraud

Tax Stringer: Additionally, if the victim happened to pay estimated tax payments during the year that the criminal "forgot" to include, the IRS or state agency will be happy to point out the error and refund those payments to the criminal as well.

Examples of Identity Theft Schemes - Fiscal Year 2014

Examples of Identity Theft Schemes - Fiscal Year 2014: An examination of the PII revealed that it was from a medical services provider. Rosier was an employee of the medical services provider. Cooper spoke to Rosier to obtain user names and passwords for current employees of the medical services provider. Cooper admitted to illegally logging on to the medical services provider’s computer network and downloading PII for the purpose of committing various types of fraud.

Marketplace with Kai Ryssdal: The Road Show | Marketplace.org

Marketplace with Kai Ryssdal: The Road Show | Marketplace.org:



To celebrate its 25th year of bringing economics to life, Marketplace� is hitting the road.

Strathmore - Events & Tickets - Calendar

Strathmore - Events & Tickets - Calendar:



Join Marketplace host Kai Ryssdal — plus reporters Adriene Hill, Stacey Vanek Smith, Lizzie O’Leary, Rob Schmitz and Paddy Hirsch — as they humanize the numbers. It’s an evening of radio, with sound elements, interviews and engaging storytelling. What Marketplace does best, but in person, on stage, and in your city.

Saturday, April 12, 2014

Coal and cyber

"traditional criminal gangs infecting computer systems to support existing businesses, like hacking computers to report wrong data about the amount of coal loaded to trains. Report more than was physically loaded, and taking the coal. But overall, cybercriminals are still happy with Windows and Android. And if they recognize there is not enough work, they can easily infect Mac, Linux, BlackBerry, and others."

Friday, April 11, 2014

Self-Described Hacker Says He Warned Univ. Of Md. Before Data Breach « CBS Baltimore

"I went into the systems, I found how bad their security was and then I passed that information on to the university," said Helkowski.

http://baltimore.cbslocal.com/2014/04/10/whistleblower-says-he-warned-university-of-maryland-before-data-breach-2/


From My iPhone

Keith Alexander Speaks: "The NSA Protects America's Privacy And Civil Liberties" | Zero Hedge

Our capabilities give us the power to change the narrative by making our networks more secure—and ensuring that cyberspace itself becomes a safer place for commerce, social interaction and the provision of public services. We want to take this opportunity to put these developments in historical context, and then explain why we as a nation must continue to build a cyberenterprise capable of guarding our critical infrastructure and population. We can and must do this while always protecting civil liberties, personal privacy and American values.

http://www.zerohedge.com/news/2013-10-30/keith-alexander-speaks-nsa-protects-americas-privacy-and-civil-liberties

Has the NSA Been Using the Heartbleed Bug as an Internet Peephole? | Threat Level | WIRED

"Do not ask about or speculate on source or methods underpinning BULLRUN successes." In other words, they'll never say.

http://www.wired.com/2014/04/nsa-heartbleed/


From My iPhone

NSA monitors WiFi on US planes ‘in violation’ of privacy laws — RT USA

In a letter leaked to Wired, Gogo, the leading provider of inflight WiFi in the US, admitted to violating the requirements of the Communications Assistance for Law Enforcement Act (CALEA). The act is part of a wiretapping law passed in 1994 that requires telecoms carriers to provide law enforcement with a backdoor in their systems to monitor telephone and broadband communications.


From My iPhone

Edward Snowden says the NSA ignored his formal complaints before he leaked classified documents - NY Daily News

"I directly challenge the NSA to deny that I contacted NSA oversight and compliance bodies directly via e-mail and that I specifically expressed concerns about their suspect interpretation of the law," he said.

http://m.nydailynews.com/1.1749916


From My iPhone

Poisoned | IDFA

Poisoned | IDFA: "During 3 years of service, the boys are transformed into soldiers; they become commanders, serve in the Occupied Territories and are confronted with ideological and emotional conflicts that lead them to lose all faith in the army and finally grow-up. It is the story of children in Israel, maturing in an insane reality."



'via Blog this'

Thursday, April 10, 2014

The Sins of Arrogance Bear Bitter Fruit | Michael Brenner

The Sins of Arrogance Bear Bitter Fruit | Michael Brenner:



"Americans' abuse of drugs - rather than accepting the simple truth is that the causes lie in those features of American life that produce millions who crave addictive substances."



'via Blog this'

The Sins of Arrogance Bear Bitter Fruit | Michael Brenner

The Sins of Arrogance Bear Bitter Fruit | Michael Brenner:



"Americans' abuse of drugs - rather than accepting the simple truth is that the causes lie in those features of American life that produce millions who crave addictive substances."



'via Blog this'

Wednesday, April 9, 2014

Jim's auto upholstery

Complete Auto Upholstery
When your car interior begins to look worn and outdated, Jim's Auto Upholstery will help! We offer an array of services to restore and upgrade your auto's seats and upholstery. From re-upholstery in a variety of styles and colors to replacing carpet, we offer complete auto upholstery services for all vehicle makes and models.

http://www.jimsautoupholstery.com/

Tuesday, April 8, 2014

Most websites may already be completely pwned by the Heartbleed Bug

Most websites may already be completely pwned by the Heartbleed Bug The Privacy Blog:



It is unknown if, or how often, this attack has been run in the wild. It is entirely possible that major players, like national intelligence services, may have known about this for some time, and could have been silently intercepting traffic to certain websites, potentially for over 2 years.

Heartbleed Bug

Heartbleed Bug:



"We attacked ourselves from outside, without leaving a trace. Without using any privileged information or credentials we were able steal from ourselves the secret keys used for our X.509 certificates, user names and passwords, instant messages, emails and business critical documents and communication."

Ninja, Samurai, Shogun, and Ronin | Krypt3ia

" I am writing this post ... for those who wish to consider themselves Ninja as well as perhaps reach those defenders or "blue team" folks to understand the landscape here from a historical perspective as well as a tactical one. Given the nature of the threats today..."

http://krypt3ia.wordpress.com/2014/03/26/ninja-samurai-shogun-and-ronin/

Monday, April 7, 2014

DJI Phantom on Steroids - DSLRPros.com Ultimate Aerial Film Drone with FPV OSD & Telemetry - YouTube

DJI Phantom on Steroids - DSLRPros.com Ultimate Aerial Film Drone with FPV OSD & Telemetry - YouTube:



'via Blog this'

DJI Phantom 2 | Cannes DP Edition P2 Aerial Kit - DSLRPros | DSLR Rigs|Products|Dslrpros.com

DJI Phantom 2 | Cannes DP Edition P2 Aerial Kit - DSLRPros | DSLR Rigs|Products|Dslrpros.com: "The DJI Phantom 2 is the second generation to the Phantom platform with improvements to the transmitter reliability and range as well as increased flight time.  The Phantom 2 is unbelievably easy to fly. Combined with smooth, stabilized footage from the H3-2D gimbal, aerial cinematography and videography has never been easier. It’s light, rugged and perfect for travel."



'via Blog this'

Sunday, April 6, 2014

Off the shelf, on the skin: Stick-on electronic patches for health monitoring -- ScienceDaily

Off the shelf, on the skin: Stick-on electronic patches for health monitoring -- ScienceDaily: The patches stick to the skin like a temporary tattoo and incorporate a unique microfluidic construction with wires folded like origami to allow the patch to bend and flex.

Thursday, April 3, 2014

RSA's Call to End Digital Wars Is Either Cynical Or Naive

RSA's Call to End Digital Wars Is Either Cynical Or Naive:



Furthermore, the message of peace being pushed by RSA folks this week will only serve it well as the company looks to distance itself from the security world’s current b�te noire, the NSA. It has to push a positive message, it cannot simply fall on its sword. That’s why it presents itself as a digital peacenik, even if it is being disingenuous, and doesn’t really believe what it is saying.

Examples of Identity Theft Schemes - Fiscal Year 2013

Examples of Identity Theft Schemes - Fiscal Year 2013:



The following examples of identity theft schemes are written from public record documents on file in the court records in the judicial district in which the cases were prosecuted.

Inside the NSA’s Secret Efforts to Hunt and Hack System Administrators - The Intercept

...the employee's posts make no mention of any measures that might be taken to prevent hacking the computers of Americans who work as sys admins for foreign networks.

https://firstlook.org/theintercept/article/2014/03/20/inside-nsa-secret-efforts-hunt-hack-system-administrators/


From My iPhone