Sunday, August 31, 2014

Jihadists Buy 'Islam for Dummies' on Amazon | New Republic

"... what inspires the most lethal terrorists in the world today is not so much the Quran or religious teachings as a thrilling cause and call to action that promises glory and esteem in the eyes of friends,"

http://www.newrepublic.com/article/119182/jihadists-buy-islam-dummies-amazon


From My iPhone

LizardSquad DDoS Hacker Group Reportedly Busted And Exposed - HotHardware

The FBI has been hunting down the person, or persons, responsible not only for the DDoS attack but the grounding of a plane when the group tweeted a false bomb threat as well.

http://hothardware.com/m/News/LizardSquad-DDoS-Hacker-Group-Reportedly-Busted-And-Exposed/default.aspx

PayAppSec - PayAppSec - a blog covering payment security and technology by Slava Gomzin

"incidents hitting large retailers such as Target, Neiman-Marcus, Michael’s, Sally Beauty, and P.F. Chang’s. These breaches are raising a lot of questions, one of the most important of which is: Are we going to see more of these?

The short answer is yes; in the foreseeable future we will continue to see more breaches. Here’s why:"



PayAppSec - PayAppSec - a blog covering payment security and technology by Slava Gomzin:



'via Blog this'

Friday, August 29, 2014

Prevalent Iron Metabolism Gene Variants Associated with Increased Brain Ferritin Iron in Healthy Older Men

Prevalent Iron Metabolism Gene Variants Associated with Increased Brain Ferritin Iron in Healthy Older Men: "Prevalent gene variants involved in iron metabolism [hemochromatosis (HFE) H63D and transferrin C2 (TfC2)] have been associated with higher risk and earlier age at onset of Alzheimer’s disease (AD), especially in men. "



'via Blog this'

Neuropsychopharmacology - Gender and Iron Genes May Modify Associations Between Brain Iron and Memory in Healthy Aging

Neuropsychopharmacology - Gender and Iron Genes May Modify Associations Between Brain Iron and Memory in Healthy Aging: "We also observed that gene variants involved in iron metabolism (hemochromatosis H63D (HFE H63D) and transferrin C2 (TfC2) variants) are associated with higher brain iron levels in healthy older men (Bartzokis et al, 2010). "



'via Blog this'

CompTIA | The Target Data Breach: Anatomy of an Attack - Powered by CompTIA IT Security Community

CompTIA | The Target Data Breach: Anatomy of an Attack - Powered by CompTIA IT Security Community: "Over 110 million customers were affected by the breach of TARGET and eight (8) other retailers by the Kaptoxa-Rescator malware in November of 2013. "



'via Blog this'

NIST Computer Security Publications - Drafts

NIST Computer Security Publications - Drafts: DRAFT Technical Considerations for Vetting 3rd Party Mobile Applications

FBI — Table 1 Crime in the United States by Volume and Rate

FBI — Table 1: "Crime in the United States
by Volume and Rate per 100,000 Inhabitants, 1993–2012"



'via Blog this'

Genetic Testing Report-Appendix 6

Interesting stuff...

http://www.genome.gov/10002401

Thursday, August 28, 2014

HIPAA and the BYOD Challenge

HIPAA and the BYOD Challenge: If administrators, medical personnel, and others have access to electronic protected health information (ePHI) via their mobile devices, how can hospitals, physician groups, labs, and other covered entities meet HIPAA’s steep data security requirements?

Healthcare Security: CSOs Needed - InformationWeek

Healthcare Security: CSOs Needed - InformationWeek: Until healthcare providers recognize and address their security weaknesses, they risk data loss, vulnerability to hacking, and HIPAA non-compliance.

HIT vendors rely on security standards that don't meet HIPAA requirements - FierceEMR

HIT vendors rely on security standards that don't meet HIPAA requirements - FierceEMR: Health IT vendors don't often protect electronic patient information in accordance with HIPAA, even when they and their provider clients think that they're in compliance with the law

3 Do’s and Don’ts of Effective HIPAA Compliance for BYOD & mHealth

3 Do’s and Don’ts of Effective HIPAA Compliance for BYOD & mHealth: Clinicians use 6.4 different mobile devices in a day on average

MiHIN Director reviews HIE security protocols, agreements | HealthITSecurity.com

MiHIN Director reviews HIE security protocols, agreements | HealthITSecurity.com: Pletcher explains in this one-on-one how MiHIN views secure data exchange in the context of having multiple levels of connectivity.

Risk Analysis Is NOT A Graduation Exercise!

Risk Analysis Is NOT A Graduation Exercise!: A single risk analysis performed correctly can support multiple business requirements.

Historical Tables | The White House

http://m.whitehouse.gov/omb/budget/historicals

The Hackers Inside Your Supply Chain - Talking Logistics with Adrian GonzalezTalking Logistics with Adrian Gonzalez

The Hackers Inside Your Supply Chain - Talking Logistics with Adrian GonzalezTalking Logistics with Adrian Gonzalez: "Two recent reports highlight the growing threat of cyber-terrorism on supply chains."



'via Blog this'

Windows XP Hacked, Supply Chain Poisoned | Malware | TechNewsWorld

Windows XP Hacked, Supply Chain Poisoned | Malware | TechNewsWorld: "Supply chain compromise is a security pro's worst nightmare. The thought of malware being planted on computer devices before they leave the factory sends shivers down a cyberdefender's spine. "



'via Blog this'

Supply chain cyber security - Wikipedia, the free encyclopedia

Supply chain cyber security - Wikipedia, the free encyclopedia: "The acting deputy undersecretary for the National Protection and Programs Directorate for the United States Department of Homeland Security, Greg Schaffer, said at a hearing that he is aware that there are instances where malware has been found on imported electronic and computer devices sold within the United States. [1]"



'via Blog this'

The Global Supply Chain: Our Economy, Security and Health Depends on It | Stanley M. Bergman

The Global Supply Chain: Our Economy, Security and Health Depends on It | Stanley M. Bergman: "At the World Economic Forum in Davos this year, a group of business, academic and government leaders discussed potential scenarios like these and what we can do to prepare for them in a session titled "Global Supply Chain Resilience." "



'via Blog this'

IMB: Guard against threat of cyber attacks

IMB: Guard against threat of cyber attacks: "The International Maritime Bureau (IMB) is calling for vigilance in the maritime sector as it emerges that shipping and the supply chain is the ‘next playground for hackers’."



'via Blog this'

Sunday, August 24, 2014

This is why you can't trust the NSA. Ever.

But there's a lot Clapper's office isn't saying. First, his office is hiding almost all the dates on these documents (it took matching these with many other public documents to come up with the estimates in this article).

http://m.theweek.com/article/index/266785/this-is-why-you-cant-trust-the-nsa-ever

Tuesday, August 19, 2014

DEFCON 19: Introduction to Tamper Evident Devices (w speaker) - YouTube

DEFCON 19: Introduction to Tamper Evident Devices (w speaker) - YouTube: "Tamper evident technologies are quickly becoming an interesting topic for hackers around the world. DEF CON 18 (2010) held the first ever "Tamper Evident" contest"



'via Blog this'

Monday, August 18, 2014

Cisco: Blackhole arrest cuts exploit-kit traffic, but don't let your guard down | Network World

Exploit kits of cybercrime tools fell into a big slump in the first half of this year after Russian authorities nabbed the alleged creator of the popular Blackhole kit, but users aren't necessarily safer.


From My iPhone

Sunday, August 17, 2014

Cyber-Security Expert Warns Of 'False Flag' Digital Attacks - Forbes

"the ability to disrupt electronic trade, divert funds, or overload IT systems so that transactions cannot be completed, can have an effect that goes far beyond the geographies where disputes are raging."

http://www.forbes.com/sites/jasperhamill/2014/07/31/cyber-security-expert-warns-of-false-flag-digital-attacks/


From My iPhone

Odds ratio - Wikipedia, the free encyclopedia

In statistics, the odds ratio[1][2][3](usually abbreviated "OR") is one of three main ways to quantify how strongly the presence or absence of property A is associated with the presence or absence of property B in a given population.


From My iPhone

369 selected items - PubMed - NCBI

Powell on HH

http://www.ncbi.nlm.nih.gov/pubmed?term=Powell%20LW%5BAuthor%5D&cauthor=true&cauthor_uid=16476869

Saturday, August 16, 2014

Cisco on Blackhole

Exploit kits of cybercrime tools fell into a big slump in the first half of this year after Russian authorities nabbed the alleged creator of the popular Blackhole kit, but users aren't necessarily safer.


From My iPhone

Secure Passport and Travel Visa Order Form

Once completed, a visa specialist will personally contact you to walk you through the visa application documents you'll need to gather and send to us to begin processing.  

https://www.passportsandvisas.com/singleorder/step2visa.asp?id=2807&producttype=Tourist%20Rush&countryvisit=Brazil&countryorigin=United%20States&jurisdictional=N

Thursday, August 7, 2014

Google To Reward Sites With HTTPS Security In Search Rankings - Forbes

For now, it's just a "lightweight signal that will affect "fewer than 1% of global queries and carrying less weight than other signals such as high-quality content." But that could change over time as Google strives to "encourage all website owners to switch from HTTP to HTTPS to keep everyone safe on the web."

http://www.forbes.com/sites/larrymagid/2014/08/07/google-to-reward-sites-with-http-security-in-search-rankings/


From My iPhone

A New, Evidence-based Estimate of Patient Harms Associated

A New, Evidence-based Estimate of Patient Harms Associated: Journal of Patient Safety: number of premature deaths associated with preventable harm to patients was estimated at more than 400,000 per year.

Friday, August 1, 2014

New Cyberthreat Report By SANS Institute Delivers Chilling Warning To Healthcare Industry - Forbes

New Cyberthreat Report By SANS Institute Delivers Chilling Warning To Healthcare Industry - Forbes: A SANS examination of cyberthreat intelligence provided by Norse supports these statistics and conclusions, revealing exploited medical devices, conferencing systems, web servers, printers and edge security technologies all sending out malicious traffic from medical organizations. Some of these devices and applications were openly exploitable (such as default admin passwords) for many months before the breached organization recognized or repaired the breach. Barbara Filkins – SANS Analyst and Healthcare Specialist

Cyber-security: The internet of things (to be hacked) | The Economist

The wireless heart monitor of Dick Cheney, America's former vice-president, was modified to stop remote assassination attempts.

http://www.economist.com/news/leaders/21606829-hooking-up-gadgets-web-promises-huge-benefits-security-must-not-be


From My iPhone