Thursday, December 31, 2015

slight paranoia: October 2006

slight paranoia: October 2006

Soghoian and the airline boarding passes

Soh goy an

http://paranoia.dubfire.net/2006_10_01_archive.html?m=1

5 Big Developments in Privacy Class Actions in 2015, and 3 to Look for in 2016 | Data Privacy MonitorData Privacy Monitor

5 Big Developments in Privacy Class Actions in 2015, and 3 to Look for
in 2016 | Data Privacy Monitor

http://www.dataprivacymonitor.com/data-breaches/significant-developments-in-privacy-class-actions-in-2015-and-what-to-watch-for-in-2016/

Street gangs migrate from drugs to white-collar crimes - The Dispatch

Street gangs migrate from drugs to white-collar crimes - The Dispatch

http://www.cdispatch.com/news/article.asp?aid=47242

How does the Cybersecurity Act of 2015 change the Internet surveillance laws? - The Washington Post

How does the Cybersecurity Act of 2015 change the Internet
surveillance laws? - The Washington Post

https://www.washingtonpost.com/news/volokh-conspiracy/wp/2015/12/24/how-does-the-cybersecurity-act-of-2015-change-the-internet-surveillance-laws/

‘Donald Trump totally thinks I’m a Muslim’: Atheist hammers Trump on proposed Muslim ban

'Donald Trump totally thinks I'm a Muslim': Atheist hammers Trump on
proposed Muslim ban

http://www.rawstory.com/2015/12/donald-trump-totally-thinks-im-a-muslim-atheist-hammers-trump-on-proposed-muslim-ban/

Spying on Congress and Israel: NSA Cheerleaders Discover Value of Privacy Only When Their Own Is Violated

Spying on Congress and Israel: NSA Cheerleaders Discover Value of
Privacy Only When Their Own Is Violated

https://theintercept.com/2015/12/30/spying-on-congress-and-israel-nsa-cheerleaders-discover-value-of-privacy-only-when-their-own-is-violated/

Thursday, December 24, 2015

Android IMSI-Catcher Detector by SecUpwN

Android IMSI-Catcher Detector by SecUpwN

https://secupwn.github.io/Android-IMSI-Catcher-Detector/#

Security Camera or Pet Monitor? Vimtag Has a Hybrid Solution! - TechAcute

Security Camera or Pet Monitor? Vimtag Has a Hybrid Solution! - TechAcute: "What’s maybe the most interesting thing about the Vimtag FI-361 HD is surely the remote viewing support. You just have to install the camera in one of the nearby locations that you want to monitor, and once that is done you can access a remote feed via your phone. "



'via Blog this'

Prevalence of 845G>A HFE mutation in Slavic populations: an east-west linear gradient in South Slavs

Prevalence of 845G>A HFE mutation in Slavic populations: an east-west
linear gradient in South Slavs.

http://www.ncbi.nlm.nih.gov/pmc/articles/PMC3118720/

Wednesday, December 23, 2015

Juniper Networks security flaw may have exposed US government data | Technology | The Guardian

Juniper Networks security flaw may have exposed US government data | Technology | The Guardian: Two security flaws that lay undiscovered in Juniper Networks’ widely used corporate virtual private network (VPN) software for three years could have exposed sensitive informative to foreign governments or criminal groups, researchers have said.

IRS Transcript Site

...is crazy stupid picky about your address.



https://sa.www4.irs.gov/irfof-tra/start.do


Data Protection Act | Get Safe Online

Data Protection Act | Get Safe Online: The Data Protection Act (DPA) protects the privacy and integrity of data held on individuals by businesses and other organisations. The act ensures that individuals (customers and employees) have access to their data and can correct it, if necessary. It is enforced by the Information Commissioner’s Office (ICO), which has responsibility for overseeing the Freedom of Information Act and the regulation of interception of communications under the Regulation of Investigatory Powers Act 2000 (RIPA).

Federal Agency Data Protection Act (2008; 110th Congress H.R. 4791) - GovTrack.us

Federal Agency Data Protection Act (2008; 110th Congress H.R. 4791) - GovTrack.us: 6/3/2008--Passed House amended.Federal Agency Data Protection Act - Section3 - Defines "personally identifiable information" as any information about an individual maintained by a federal agency, including information about the individual's ... Read more >

Mod5: Data protection in Germany: overview

PLC - Data protection in Germany: overview: Apart from the general data protection laws there are sector-specific regulations at both state and federal level that provide data protection requirements.



Use as example 'relative' to the U.S.

Weak encryption won't defeat terrorists –�but it will enable hackers | Trevor Timm | Opinion | The Guardian

Weak encryption won't defeat terrorists –�but it will enable hackers | Trevor Timm | Opinion | The Guardian: Bizarrely, Comey told the Senate that whether or not tech companies decide to introduce backdoors in their encryption is “not a technical issue” but it’s a “business model question”. That’s a strange thing to say since a large group of the world’s leading computer scientists wrote a paper explaining that it is a technical issue, and that you can’t create a backdoor without making everyone’s communications more vulnerable to all sorts of hackers, whether they be private criminal elements or foreign governments.

China's Social Credit System: The most disturbing tech story of 2015

China's Social Credit System: The most disturbing tech story of 2015

"history has shown that such fears are prudent, whether we're talking
about China, the United States, or any other government or large
organization."
http://www.networkworld.com/article/3017417/security/china-scs-social-credit-system-most-disturbing-tech-story-of-2015.html

Weak encryption won't defeat terrorists but it will enable hackers | Trevor Timm | Opinion | The Guardian

Weak encryption won't defeat terrorists but it will enable hackers | Trevor Timm | Opinion | The Guardian: Bizarrely, Comey told the Senate that whether or not tech companies decide to introduce backdoors in their encryption is “not a technical issue” but it’s a “business model question”. That’s a strange thing to say since a large group of the world’s leading computer scientists wrote a paper explaining that it is a technical issue, and that you can’t create a backdoor without making everyone’s communications more vulnerable to all sorts of hackers, whether they be private criminal elements or foreign governments.

Facebook Threatens Security Researcher With Legal Action Over Instagram Vulnerability: - News Independent

Facebook Threatens Security Researcher With Legal Action Over Instagram Vulnerability: - News Independent: “Despite all efforts to follow Facebook’s rules, I was now being threatened with legal and criminal charges, and it was all being done against my employer,” Wineberg wrote in his blog. Announced in 2011, Facebook Bug Bounty Program offers a minimum of $500 to anyone who reports security vulnerabilities on Facebook website.

A Few Thoughts on Cryptographic Engineering: On the Juniper backdoor

A Few Thoughts on Cryptographic Engineering: On the Juniper backdoor: Because what Ralf and Steve et al. found is beyond belief. Ralf's excellent post provides all of the technical details, and you should honest just stop reading now and go read that.

Sunday, December 20, 2015

The security laws, regulations and guidelines directory | CSO Online

Another list...

http://www.csoonline.com/article/2126072/compliance/the-security-laws--regulations-and-guidelines-directory.html

United States Data Privacy Laws

Handy list...

http://www.informationshield.com/usprivacylaws.html

Business Email Compromise Attacks Rapidly Evolving

Business Email Compromise Attacks Rapidly Evolving: "Business email compromise attacks, also known as "masquerading" or invoice scams, are becoming more sophisticated and pervasive, and small businesses are the primary targets, says Joseph Opacki, vice president of threat research at security firm PhishLabs."



'via Blog this'

Evolving Microsoft SmartScreen to protect you from drive-by attacks | Microsoft Edge Dev Blog

Evolving Microsoft SmartScreen to protect you from drive-by attacks | Microsoft Edge Dev Blog: "Microsoft SmartScreen, integrated with Microsoft Edge, Internet Explorer, and the Windows operating system, has helped protect users from socially engineered attacks such as phishing and malware downloads since its initial release in Internet Explorer 7"



'via Blog this'

Pentagon weighs cybercampaign against Islamic State - LA Times

Pentagon weighs cybercampaign against Islamic State - LA Times

Righteous malware!

http://www.latimes.com/world/la-fg-cyber-isis-20151220-story.html

Cybersecurity touches clients, staff in finserv

For Jeff...

http://www.investmentnews.com/article/20151220/FREE/151219912/cybersecurity-touches-clients-staff

Saturday, December 19, 2015

Shorter Devin Nunes: There Are Privacy-Violating Covert Counter-Terrorism Programs We’re Hiding | emptywheel

Shorter Devin Nunes: There Are Privacy-Violating Covert
Counter-Terrorism Programs We're Hiding | emptywheel

https://www.emptywheel.net/2015/12/02/shorter-devin-nunes-there-are-privacy-violating-covert-counter-terrorism-programs-were-hiding/

Under CISA, Would Wyndham Be Able To Pre-empt FTC Action? | emptywheel

Under CISA, Would Wyndham Be Able To Pre-empt FTC Action? | emptywheel

https://www.emptywheel.net/2015/08/24/under-cisa-would-wyndham-be-able-to-pre-empt-ftc-action/

Otis Redding - Live on the Sunset Strip - CD!

Otis Redding - Live on the Sunset Strip - Amazon.com Music:

This is the first time the recordings have been released as a complete package and the songs are sequenced exactly as they went down, complete with an emcee and spoken introductions by Redding. Booklet features rare photographs as well as extensive liner notes by Ashley Kahn, author of music biographies and a contributor to NPR's Morning Edition.

Also: Live in London and Paris

New Malware Declines in Q3 but Macros and Ransomware Flourish - Infosecurity Magazine

Triage...

http://www.infosecurity-magazine.com/news/new-malware-declines-q3-macros-1/#.VnAkEozbLUA.twitter

"cybersecurity act of 2015" - Google Search

Use the pdf links instead of dropbox...

https://www.google.com/search?q=cybersecurity&oq=%22cybers&aqs=chrome.1.69i57j0l3.6828j0j4&client=tablet-android-google&sourceid=chrome-mobile&ie=UTF-8#num=30&q=%22cybersecurity+act+of+2015%22

Study: 50 percent of patients withhold information from their doctor | NueMD Industry News

http://www.nuemd.com/news/2014/12/19/study-50-percent-patients-withhold-information-their-doctor

Calculators: Life Expectancy 84.3

84.3 and rising!

https://www.ssa.gov/planners/lifeexpectancy.html

Friday, December 18, 2015

CISA Is Now The Law: How Congress Quietly Passed The Second Patriot Act | Zero Hedge

CISA Is Now The Law: How Congress Quietly Passed The Second Patriot Act | Zero Hedge: the second Patriot Act will be the law, and with it what little online privacy US citizens may enjoy, will be gone.

3DR Solo Drone Black SA11A - Best Buy

3DR Solo Drone Black SA11A - Best Buy



Wow, what a price point!



Carries a GoPro.

Shedding Some Light on the Problem of Medical Data Loss | Healthcare Informatics Magazine | Health IT | Information Technology

Shedding Some Light on the Problem of Medical Data Loss | Healthcare Informatics Magazine | Health IT | Information Technology: "According to the study, external “actors” were behind a large number of PHI breaches (903), yet internal “actors” were responsible for 791 incidences, followed by partners with 122 incidences."



'via Blog this'

Could this 14,000-year-old bone belong to an archaic human species? - CSMonitor.com

Could this 14,000-year-old bone belong to an archaic human species? -
CSMonitor.com

http://m.csmonitor.com/Science/2015/1217/Could-this-14-000-year-old-bone-belong-to-an-archaic-human-species

FBI has lead in probe of 1.2 billion stolen Web credentials: documents | Reuters

FBI has lead in probe of 1.2 billion stolen Web credentials: documents | Reuters: "The court papers were filed in support of a search warrant the FBI sought in December 2014 and that was executed a month later related to email records.

"



'via Blog this'

Wednesday, December 16, 2015

Why are Mastercard Inc and Visa Inc Likely to Feel the Heat

Why are Mastercard Inc and Visa Inc Likely to Feel the Heat

http://www.businessfinancenews.com/26805-why-are-mastercard-inc-and-visa-inc-likely-to-feel-the-heat/

Nearly 1 in 5 health data breaches take years to spot, says Verizon • The Register

Nearly 1 in 5 health data breaches take years to spot, says Verizon •
The Register

http://www.theregister.co.uk/2015/12/16/verizon_health_breaches_survey/

Verizon report finds 90% of industries suffer a PHI breach | Healthcare Dive

Verizon report finds 90% of industries suffer a PHI breach | Healthcare Dive

http://www.healthcaredive.com/news/verizon-report-finds-90-of-industries-suffer-a-phi-breach/410867/

Lawyers Break Down 2016 HIPAA Audits, Connected Devices

Lawyers Break Down 2016 HIPAA Audits, Connected Devices

http://healthitsecurity.com/news/lawyers-break-down-2016-hipaa-audits-connected-devices

What Donald Trump and dying white people have in common - The Washington Post

What Donald Trump and dying white people have in common - The Washington Post

https://www.washingtonpost.com/news/wonk/wp/2015/12/15/what-donald-trump-and-dying-white-people-have-in-common-2/

Endothelin and erectile dysfunction: a target for pharmacological intervention? - PubMed - NCBI

Really?

http://www.ncbi.nlm.nih.gov/pubmed/15991927

Monday, December 14, 2015

SMART on FHIR

SMART on FHIR: SMART on FHIR is a set of open specifications to integrate apps with Electronic Health Records, portals, Health Information Exchanges, and other Health IT systems. You get...

LA and San Diego leads cities in solar energy production

For its size, San Diego produces more solar power than any other city. Many open air parking lots now have solar panels. Some housing estates have solar on all roofs.

http://www.scpr.org/news/2014/04/10/43425/la-leads-cities-in-solar-energy-production/

Love .... Stephen
From My iPhone

San Diego leads California in solar installations

Since 2009: San Diego leads California in solar installations |
SanDiegoUnionTribune.com

http://www.sandiegouniontribune.com/news/2009/jul/16/1m16solar001246-city-leads-california-solar-instal/?metro

Top 16 U.S. Cities For Solar Power - Forbes

Top 16 U.S. Cities For Solar Power - Forbes

http://www.forbes.com/sites/williampentland/2015/05/22/top-16-u-s-cities-for-solar-power/

Sunday, December 13, 2015

What lies beneath? The top cyber security trends of 2015 | ITProPortal.com

What lies beneath? The top cyber security trends of 2015 | ITProPortal.com

http://www.itproportal.com/2015/12/12/what-lies-beneath-the-top-cyber-security-trends-of-2015/

FossilFinder.org is cool!

FossilFinder.org

http://www.fossilfinder.org/

IoT info

Worth checking...

http://www.ptc.com/internet-of-things/harvard-business-review/download-article-2?utm_source=twitter.com%20paid&utm_medium=social&utm_campaign=CB%20EN%20HBR%202&utm_content=CB_EN_HBR_2-twitter.com_paid-social-HBR2_downloadpage-WW-1548&cl1=CB_EN_HBR_2-twitter.com_paid-social-HBR2_downloadpage-WW-1548&cmsrc=twitter.com%20paid&cid=701F0000000xMyeIAE&elqCampaignId=1331

Privacy Not Included: Federal Law Lags Behind New Tech

Privacy Not Included: Federal Law Lags Behind New Tech: "A 2009 law called on HHS to work with the Federal Trade Commission — which targets unfair business practices and identity theft — and to submit recommendations to Congress within a year on how to deal with entities handling health information that falls outside of HIPAA. Six years later, however, no recommendations have been issued."



'via Blog this'

UK online fraud losses higher than realised, University study suggests | Security | Techworld

UK online fraud losses higher than realised, University study suggests | Security | Techworld: "In the Centre for Cyber Security’s initial survey of 1,500 people using Google Customer Surveys, 11.6 percent reported computer fraud losses in excess of more than £65 ($100), although the majority of the rest lost only trivial amounts."



'via Blog this'

USDA awards $23.4 million in grants to rural telemedicine projects - FierceHealthIT

USDA awards $23.4 million in grants to rural telemedicine projects - FierceHealthIT: "The U.S. Department of Agriculture has awarded $23.4 million in grants to 75 projects across 31 states as part of its USDA Rural Development's Distance Learning and Telemedicine program, according to an announcement."



'via Blog this'

Saturday, December 12, 2015

Hundreds of thousands of engine immobilisers hackable over the net • The Register

Hundreds of thousands of engine immobilisers hackable over the net • The Register: "Kiwi hacker Lachlan Temple has found holes in a popular cheap car tracking and immobilisation gadget that can allow remote attackers to locate, eavesdrop, and in some cases cut the fuel intake to hundreds of thousands of vehicles, some while in motion."



'via Blog this'

San Diego-led lawsuits against Monsanto

Risk assessment data point

http://www.sandiegouniontribune.com/news/2015/dec/11/monsanto-pcbs-san-diego-bay-cleanup-gomez-lawyers/

Leveraging the Analog Domain for Security (LADS)

Leveraging the Analog Domain for Security (LADS)

http://www.darpa.mil/program/leveraging-the-analog-domain-for-security

HPE Matter | Gazing Into the Crystal Ball: Predicting 2016 Security Concerns

HPE Matter | Gazing Into the Crystal Ball: Predicting 2016 Security Concerns

https://www.hpematter.com/issue-no-7-fall-2015/gazing-crystal-ball-predicting-2016-security-concerns

Gout food guide

Yes: 
Fruits
Nuts
Vegetables
Whole grains
Complex carbohydrates
Vitamin C
Water
Coffee
Cherries
Eggs
Dairy
Lean meat
Ham
Chicken
Pork
Rabbit
Oysters
Crab
Shrimp
Halibut
Salmon
Tuna canned
Flounder
Sole
Catfish

No:
Herring
Sardines
Mussels
Marmite
Liver
Kidney
Anchovies
White bread
High-fructose corn syrup
Red meats
Goose
Turkey
Veal
Venison
Bacon
Scallops
Cod
Trout
Haddock
Mackerel
Tuna fresh




Matthew Fort on gout | Life and style | The Guardian

Matthew Fort on gout | Life and style | The Guardian: "The following have a high purine content (of more than 150g) and should therefore be avoided:

Fish and seafood: sardines, herring, mussels.
Meat: heart, meat extract, yeast."



'via Blog this'

Sunday, December 6, 2015

RRI: empty toolbox or opportunity to seize? | The Trovatist

RRI: empty toolbox or opportunity to seize? | The Trovatist

https://chanceseeking.wordpress.com/2015/08/24/rri-empty-toolbox-or-opportunity-to-seize/

Rainer Bƶhme - Google Scholar Citations

Rainer Böhme - Google Scholar Citations

Amazing scores...

https://scholar.google.de/citations?user=ez_Q6GMAAAAJ&hl=de

Univ.-Prof. Dr. Rainer Bƶhme – Security and Privacy Lab – University of Innsbruck

Univ.-Prof. Dr. Rainer Böhme – Security and Privacy Lab – University
of Innsbruck

Check out the publications...

http://informationsecurity.uibk.ac.at/people/rainer-boehme/

SEC Consult: House of Keys: Industry-Wide HTTPS Certificate and SSH Key Reuse Endangers Millions of Devices Worldwide

SEC Consult: House of Keys: Industry-Wide HTTPS Certificate and SSH Key Reuse Endangers Millions of Devices Worldwide: In some cases this behaviour can be attributed to a vendor's insecure default configuration. An example is Ubiquiti Networks, who have remote management enabled by default in most products.



For CC project?

GCHQ and data protection commission - Google Scholar

GCGQ and privacy...

https://scholar.google.com/scholar?start=20&q=gchq+data+protection+commission&hl=en&as_sdt=0,5

NSA Surveillance Programs New Limitations - Fortune

Commercial retention factor:

http://fortune.com/2015/12/05/nsa-surveillance-programs-new-limitations/

security triage - Google Search

https://www.google.com/search?q=estonia+skype&ie=utf-8&oe=utf-8#q=security+triage

Useful refs

NSA Surveillance Programs New Limitations - Fortune

NSA Surveillance Programs New Limitations - Fortune

http://fortune.com/2015/12/05/nsa-surveillance-programs-new-limitations/

Saturday, December 5, 2015

Jimmy's Famous Seafood - Home

Jimmy's Famous Seafood - Home

Crab cakes for Christmas?

http://www.jimmysfamousseafood.com/

White House to Establish Privacy Council - Infosecurity Magazine

White House to Establish Privacy Council - Infosecurity Magazine: "“The digital economy has changed how citizens interact with their government. With the click of a button, you can gain information about a job, receive health insurance, qualify for a student loan, seek immigration services or veterans’ benefits or file your taxes. This digital revolution creates enormous opportunities for our ability to search, connect and discover, but it also creates enormous challenges for our economy and our people.”"



'via Blog this'

Silicon Valley just had a 'binders full of women' moment - CNET

Silicon Valley just had a 'binders full of women' moment - CNET: ""I know there are many remarkable women who would flourish in the venture business," he said"



'via Blog this'

GCHQ admits to hacking in court, says hacking helps stop terror attacks - SC Magazine

GCHQ admits to hacking in court, says hacking helps stop terror attacks - SC Magazine: "GCHQ has admitted for the first time that it has hacked computers, smartphones, and networks in the UK and abroad."



'via Blog this'

Friday, December 4, 2015

Lahey Hospital pays $850,000 over security breach, potential HIPAA violations

Lahey Hospital pays $850,000 over security breach, potential HIPAA violations: "Lahey Hospital and Medical Center has settled with the U.S. Department of Health and Human Services' Office for Civil Rights for potential HIPAA violations related to lax security.

The nonprofit teaching hospital, which is affiliated with Tufts Medical School, will pay $850,000 and "will adopt a robust corrective action plan to correct deficiencies" in its HIPAA policies, according to HHS."



'via Blog this'

High Cost of HIPAA Violations Demonstrated in $3.5 Million Settlement | Obermayer Rebmann Maxwell & Hippel LLP - JDSupra

High Cost of HIPAA Violations Demonstrated in $3.5 Million Settlement | Obermayer Rebmann Maxwell & Hippel LLP - JDSupra: "OCR investigated Triple-S and its subsidiaries after receiving several breach notifications from Triple-S involving unsecured PHI."



'via Blog this'

OCR hits BCBS Puerto Rico affiliate with second largest HIPAA fine - FierceHealthIT

OCR hits BCBS Puerto Rico affiliate with second largest HIPAA fine - FierceHealthIT: "The Triple-S Management Corporation will pay $3.5 million in a settlement to the U.S. Department of Health and Human Services Office for Civil Rights following multiple HIPAA violations, the second largest fine paid for a failure to protect patient information.  "



'via Blog this'

More enforcement likely in second round of HIPAA audits, attorney says - FierceHealthIT

More enforcement likely in second round of HIPAA audits, attorney says - FierceHealthIT: "The second round of HIPAA compliance audits likely will include more enforcement actions, according to Anna Spencer, a partner at law firm Sidley Austin LLP."



'via Blog this'

New HIPAA Settlement: The Other Shoe Drops On PR Insurer - Food, Drugs, Healthcare, Life Sciences - United States

New HIPAA Settlement: The Other Shoe Drops On PR Insurer - Food, Drugs, Healthcare, Life Sciences - United States: "Nearly two years after being hit with an unprecedented $6.8 million fine (later reduced to $1.5 million), a Puerto Rico insurer has agreed to a new $3.5 million settlement with the Office for Civil Rights (OCR) of the U.S. Department of Health and Human Services (HHS) for alleged HIPAA violations."



'via Blog this'

Here’s how Larry Klayman celebrates victory — but then, maybe the NSA already knew? - The Washington Post

Here's how Larry Klayman celebrates victory — but then, maybe the NSA
already knew? - The Washington Post

https://www.washingtonpost.com/news/style/wp/2015/12/03/heres-how-larry-klayman-celebrates-victory-but-then-maybe-the-nsa-already-knew/

Parallel Construction Revealed: How The DEA Is Trained To Launder Classified Surveillance Info | Techdirt

Parallel Construction Revealed: How The DEA Is Trained To Launder Classified Surveillance Info | Techdirt: "Last summer, Reuters revealed how the NSA and other surveillance organizations would share info with the DEA and other law enforcement agencies, but then tell them to reconstruct the evidence via a process called "parallel construction," so that the surveillance would not then be discussed in court."

Sunday, November 29, 2015

Verizon PHI Data Breach Report Highlights Challenges Of Security

The research demonstrates the type of data targeted and where the data is stored and processed determines the tactics of hackers. 

http://www.healthitoutcomes.com/doc/verizon-phi-data-highlights-challenges-security-0001?utm_content=buffer9763d&utm_medium=social&utm_source=twitter.com&utm_campaign=buffer

The FISA Court’s Uncelebrated Good Points | emptywheel

"...However, I think it likely that after both instances, the NSA took its toys and went elsewhere for part of the relevant collection, in the first case to SPCMA analysis on EO 12333 collected Internet metadata, and in the second to CISA (though just for cyber applications)"

https://www.emptywheel.net/2015/11/04/the-fisa-courts-uncelebrated-good-points/

VIDEO: Satcom Guru on cyber security, EFB and sneakernet concerns - Runway GirlRunway Girl

VIDEO: Satcom Guru on cyber security, EFB and sneakernet concerns -
Runway GirlRunway Girl

http://www.runwaygirlnetwork.com/2015/11/27/video-satcom-guru-on-cyber-security-efb-and-sneakernet-concerns/

IoT: Turns out, consumers don’t trust IoT security

Turns out, consumers don't trust IoT security


https://auth0.com/blog/2015/11/06/surprised-turns-out-consumers-dont-trust-iot-security/

Solving The Persistent Security Threats For The Internet Of Things | TechCrunch

Solving The Persistent Security Threats For The Internet Of Things | TechCrunch

http://techcrunch.com/2015/11/28/solving-the-persistent-security-threats-for-the-internet-of-things/?ncid=rss&utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+Techcrunch+%28TechCrunch%29&sr_share=twitter

Verizon PHI Data Breach Report Highlights Challenges Of Security

HIMSS triage....

http://www.healthitoutcomes.com/doc/verizon-phi-data-highlights-challenges-security-0001?utm_content=buffer9763d&utm_medium=social&utm_source=twitter.com&utm_campaign=buffer

Are Wearables Fit for Clinical Trials? - Smarter With Gartner - Linkis.com

Wearables slides....

http://linkis.com/www.gartner.stfi.re/irdnL

Cybersecurity professionals: The healthcare industry needs you - TechRepublic

HIMSS triage fodder...

http://www.techrepublic.com/article/cybersecurity-professionals-the-healthcare-industry-needs-you/

Wednesday, November 25, 2015

The Paris attacks weren’t stopped by metadata surveillance. That hasn’t stopped officials from saying it might have.

The Paris attacks weren't stopped by metadata surveillance. That
hasn't stopped officials from saying it might have.

Surveillance for coercion...

http://www.slate.com/articles/technology/future_tense/2015/11/the_paris_attacks_weren_t_stopped_by_metadata_surveillance_that_hasn_t_stopped.2.html

California amends its breach notification requirements (again) - Lexology

California amends its breach notification requirements (again) - Lexology

http://www.lexology.com/library/detail.aspx?g=1886ce80-2c68-47e2-ac86-271abdc08cd3&utm_term=&utm_content=buffercfffd&utm_medium=social&utm_source=twitter.com&utm_campaign=buffer

Health data from wearable devices could be restricted under new EU regulation - Telegraph

Health data from wearable devices could be restricted under new EU
regulation - Telegraph

http://www.telegraph.co.uk/technology/news/12012430/Health-data-from-wearable-devices-could-be-restricted-under-new-EU-regulation.html

FCC Hires Online Tracking Expert Jonathan Mayer 11/24/2015

FCC Hires Online Tracking Expert Jonathan Mayer 11/24/2015

http://www.mediapost.com/publications/article/263390/fcc-hires-online-tracking-expert-jonathan-mayer.html

Check "extremist" quote at end.

No-Harm-Big-Foul: The FTC’s latest overreach in data privacy

From TheHill.com:

No-Harm-Big-Foul: The FTC's latest overreach in data privacy

http://thehill.com/blogs/ballot-box/247575-no-harm-big-foul-the-ftcs-latest-overreach-in-data-privacy

FTC ALJ: Embarrassment/Emotional Harm and Risk of Harm Does Not Satisfy “Substantial Consumer Injury” Prong of Unfairness

"Complaint counsel may find it preferable to have an ALJ decision on the books rather than a more precedential adverse Commission or Circuit Court of Appeal's decision, which could bind the FTC more significantly in data security cases going forward."

http://www.hldataprotection.com/2015/11/articles/consumer-privacy/ftc-alj-embarrassmentemotional-harm-and-risk-of-harm-does-not-satisfy-substantial-consumer-injury-prong-of-unfairness/

Monday, November 23, 2015

USA Conference - Wearables

USA Conference



Check out who is speaking, company profiles, etc.



Also VB results last year.

This Fancy Rock Wants to Protect Your Connected Devices | WIRED

This Fancy Rock Wants to Protect Your Connected Devices | WIRED: a connected device meant to watch over the security of other connected devices

Start with Security: A Guide for Business | Federal Trade Commission

Start with Security: A Guide for Business | Federal Trade Commission: here are ten lessons to learn that touch on vulnerabilities that could affect your company, along with practical guidance on how to reduce the risks they pose.

  1. Start with security.
  2. Control access to data sensibly.
  3. Require secure passwords and authentication.
  4. Store sensitive personal information securely and protect it during transmission.
  5. Segment your network and monitor who’s trying to get in and out.
  6. Secure remote access to your network.
  7. Apply sound security practices when developing new products.
  8. Make sure your service providers implement reasonable security measures.
  9. Put procedures in place to keep your security current and address vulnerabilities that may arise.
  10. Secure paper, physical media, and devices.

Privacy groups fight to expose secret cyber ruling | TheHill

Privacy groups fight to expose secret cyber ruling | TheHill

http://thehill.com/policy/cybersecurity/260986-privacy-groups-fight-to-expose-secret-cyber-ruling

Authorities Missed Many 'Red Flags' Before Paris Attacks

Authorities Missed Many 'Red Flags' Before Paris Attacks

http://m.huffpost.com/us/entry/5651dab1e4b0258edb31d9c2

Criminal Ruskie BOFHs help hackers steal $790 million in three years • The Register

Criminal Ruskie BOFHs help hackers steal $790 million in three years •
The Register

http://www.theregister.co.uk/2015/11/23/790_million_russian_financial_cybercrime/

Saturday, November 21, 2015

Privacy Not Included: Federal Law Lags Behind New Tech

Privacy Not Included: Federal Law Lags Behind New Tech

Use in essay...

http://www.truth-out.org/news/item/33715-privacy-not-included-federal-law-lags-behind-new-tech

Administrative Law Judge Dismisses FTC’s LabFTC LabMD: "no substantial Injury” to Consumers

Administrative Law Judge Dismisses FTC's LabMD Complaint, Finding
Insufficient Evidence of "Substantial Injury" to Consumers | The
National Law Review

...dismissing the FTC's complaint against LabMD, on the ground that
the Commission's staff had failed to carry its burden of demonstrating
a "likely substantial injury" to consumers resulting from LabMD's
allegedly "unfair" data security practices...

http://www.natlawreview.com/article/administrative-law-judge-dismisses-ftc-s-labmd-complaint-finding-insufficient

Int D Pri Law: GCHQ and Data Protection

http://m.idpl.oxfordjournals.org/content/early/2013/09/11/idpl.ipt020.short#

Check out articles...

Saturday, November 14, 2015

American Rifleman | NRA Gun of the Week: CZ Scorpion EVO 3 S1 Pistol

American Rifleman | NRA Gun of the Week: CZ Scorpion EVO 3 S1 Pistol

http://www.americanrifleman.org/articles/2015/10/31/nra-gun-of-the-week-cz-scorpion-evo-3-s1-pistol/

NRA pushes bill making it a crime to photograph or videotape Wisconsin hunters | Opinion

NRA pushes bill making it a crime to photograph or videotape Wisconsin
hunters | Opinion | Wisconsin Gazette

http://www.wisconsingazette.com/opinion/nra-pushing-bill-making-it-a-crime-to-photograph-or-videotape-wisconsin-hunters.html

Hired-gun hacking played key role in JPMorgan, Fidelity breaches | Reuters

Hired-gun hacking played key role in JPMorgan, Fidelity breaches | Reuters


http://mobile.reuters.com/article/internal_ReutersNewsRoom_ExclusivesAndWins_MOLT/idUSKCN0T22E920151113

Endpoint security lags in spite of vulnerabilities

http://www.net-security.org/secworld.php?id=19096

majority of VP and C-Level IT leaders surveyed indicated a heightened fear of a security breach in the coming year and acknowledged a rapidly shifting security landscape, which now includes endpoint security.  

Triage and emergency assessment - Manual for the Health Care of Children in Humanitarian Emergencies - NCBI Bookshelf

Use for my preso...

http://www.ncbi.nlm.nih.gov/books/NBK143755/

Triage in general practice

Develop a practice based triage protocol which clearly outlines the steps of the triage process and the roles and responsibilities of those involved.

http://www.medicalprotection.org/uk/practice-matters-issue-3/triage-in-general-practice

Tuesday, November 10, 2015

primary aldosteronism screening - Google Search

Search for primary aldosteronism screening - Google Search. Check for
hi-res results

https://www.google.com/search?q=primary+aldosteronism&ie=UTF-8&oe=UTF-8&hl=en&client=safari#hl=en&q=primary+aldosteronism+screening

Earlier Intervention for High Blood Pressure Reduces Heart Risk by 40 Percent

Earlier Intervention for High Blood Pressure Reduces Heart Risk by 40 Percent

Personal blog post tying this to aldosterone.

http://www.newsweek.com/earlier-intervention-high-blood-pressure-reduces-heart-risk-40-percent-392538

Buy Duck Breasts - Maple Leaf Farms

Buy Duck Breasts - Maple Leaf Farms

For Ducky Day

http://www.mapleleaffarms.com/shop-duck-breasts

cyberwarfare Articles : Risk of crippling cyber war yet to be addressed, says former US official

Check out these cyberwarfare Articles : Risk of crippling cyber war
yet to be addressed, says former US official

http://www.rightrelevance.com/search/articles/hero?article=f8286c60109fd77f35ab6ae703201d06214bbf22&query=cyberwarfare&taccount=cyberwarfarre

Montefiore employee steals 12,000 patients' personal information | Healthcare Dive

Insider threat...

http://www.healthcaredive.com/news/montefiore-employee-steals-12000-patients-personal-information/401122/

Arrest Of Immigrant At Texas Clinic Isn't A HIPAA Issue - Law360

Share and connect. Good stuff...

http://www.law360.com/articles/718760/arrest-of-immigrant-at-texas-clinic-isn-t-a-hipaa-issue

Conferences and Meetings on Information Security and Information Privacy

Review as needed:

http://www.conference-service.com/conferences/information-security.html

Lawsuits against Excellus, claims of fraud mount

Lawsuits against Excellus, claims of fraud mount

http://www.democratandchronicle.com/story/news/2015/11/08/excellus-hack-details/75039932/

Hackers can profit greatly by stealing your health data. Are you protected? - The Washington Post

Hackers can profit greatly by stealing your health data. Are you
protected? - The Washington Post

https://www.washingtonpost.com/national/health-science/hackers-can-profit-greatly-by-stealing-your-health-data-are-you-protected/2015/11/09/e1f126f6-5181-11e5-933e-7d06c647a395_story.html

Owner of Los Angeles Medical Supply Company Convicted in $4 Million Medicare Fraud Scheme

Check bottom line...

http://www.imperialvalleynews.com/index.php/news/california-news/6161-owner-of-los-angeles-medical-supply-company-convicted-in-4-million-medicare-fraud-scheme.html


From My iPhone

Sunday, November 8, 2015

Saturday, November 7, 2015

U.S. wants spectrum for 5G; lethal cyber weapons in the works; pro-Palestine hackers claim to dox military - The Washington Post

U.S. wants spectrum for 5G; lethal cyber weapons in the works

https://www.washingtonpost.com/news/powerpost/wp/2015/11/06/u-s-wants-spectrum-for-5g-lethal-cyber-weapons-in-the-works-pro-palestine-hackers-claim-to-dox-military/

Oklahoma Earthquakes Are a National Security Threat - Bloomberg Business

Oklahoma Earthquakes Are a National Security Threat - Bloomberg Business

"Now the massive oil stockpile faces an emerging threat: earthquakes.
In the past month, a flurry of quakes have hit within a few miles of
Cushing, rattling the town and its massive tanks. According to the
Oklahoma Geological Survey, more than a dozen quakes have registered
3.0 or higher on the Richter scale within a few miles of Cushing since
mid-September. The biggest, registering at 4.5, hit about three miles
away on Oct. 10."

http://www.bloomberg.com/news/articles/2015-10-23/oklahoma-earthquakes-are-a-national-security-threat

5 Recent Reports on Businesses and Cyber Security, Liability and Insurance

5 Recent Reports on Businesses and Cyber Security, Liability and Insurance

http://www.insurancejournal.com/news/national/2015/11/06/387756.htm

Wednesday, November 4, 2015

[1509.06533] Factors influencing risk acceptance of Cloud Computing services in the UK Government

[1509.06533] Factors influencing risk acceptance of Cloud Computing services in the UK Government: We focused on perceived risks and perceived security concerns. Based on these results, we suggest a number of implications for risk managers, policy makers and cloud service providers.

“Fracking” controversy and communication: Using national survey data to understand public perceptions of hydraulic fracturing

“Fracking” controversy and communication: Using national survey data to understand public perceptions of hydraulic fracturing: In contrast, people more likely to support fracking tend to be older, hold a bachelor's degree or higher, politically conservative, watch TV news more than once a week, and associate the process with positive economic or energy supply outcomes.

The “Nasty Effect:” Online Incivility and Risk Perceptions of Emerging Technologies - Anderson - 2013 - Journal of Computer-Mediated Communication - Wiley Online Library

The “Nasty Effect:” Online Incivility and Risk Perceptions of Emerging Technologies - Anderson - 2013 - Journal of Computer-Mediated Communication - Wiley Online Library: we examine the effects online incivility on perceptions toward a particular issue—namely, an emerging technology, nanotechnology. We found that exposure to uncivil blog comments can polarize risk perceptions of nanotechnology along the lines of religiosity and issue support.

Risky business: How social psychology can help improve corporate risk management

Risky business: How social psychology can help improve corporate risk management: The article then applies these worldviews and psychological phenomena to the case of risk management.

Measuring cultural values and beliefs about environment to identify their role in climate change responses

Measuring cultural values and beliefs about environment to identify their role in climate change responses: Cultural biases were found to directly influence climate change responses.

Cultural worldviews and environmental risk perceptions: A meta-analysis

Cultural worldviews and environmental risk perceptions: A meta-analysis: individuals who scored higher on egalitarianism perceived more environmental risks (r = .25), whereas individuals who scored higher on hierarchism and individualism perceived fewer environmental risks (r = −.18 and −.17, respectively).

Technologies, Security, and Privacy in the Post-9/11 European Information Society - Levi - 2004 - Journal of Law and Society - Wiley Online Library

Technologies, Security, and Privacy in the Post-9/11 European Information Society - Levi - 2004 - Journal of Law and Society - Wiley Online Library



Post 9/11 perspective.

23 University of Kansas Law Review 1974-1975 Is an Expanded Right of Privacy Consistent with Fair and Effective Law Enforcement

23 University of Kansas Law Review 1974-1975 Is an Expanded Right of Privacy Consistent with Fair and Effective Law Enforcement 



Rehnquist!

THE FTC AND THE NEW COMMON LAW OF PRIVACY on JSTOR

THE FTC AND THE NEW COMMON LAW OF PRIVACY on JSTOR



Good for law essay.

College Law Enforcement and Security Department Responses to Alcohol-Related Incidents: A National Study - Bernat - 2014 - Alcoholism: Clinical and Experimental Research - Wiley Online Library

College Law Enforcement and Security Department Responses to Alcohol-Related Incidents: A National Study - Bernat - 2014 - Alcoholism: Clinical and Experimental Research - Wiley Online Library



Case study for citation.

The Logic of Masculinist Protection: Reflections on the Current Security State on JSTOR

The Logic of Masculinist Protection: Reflections on the Current Security State on JSTOR



Privacy and security.

An Open Letter from Crypto and IS Folks

Ax14.pdf: As
leading
members
of the US
cryptog
raphy and information
-
security research communities
, we
deplore these practices
and urge that they be changed

The Value of Privacy in an Era of Security: Embedding Constitutional Limits on Preemptive Surveillance - Mitsilegas - 2014 - International Political Sociology - Wiley Online Library

The Value of Privacy in an Era of Security: Embedding Constitutional Limits on Preemptive Surveillance - Mitsilegas - 2014 - International Political Sociology - Wiley Online Library

Your Secret Stingray's No Secret Anymore: The Vanishing Government Monopoly over Cell Phone Surveillance and Its Impact on National Security and Consumer Privacy by Stephanie K. Pell, Christopher Soghoian :: SSRN

Your Secret Stingray's No Secret Anymore: The Vanishing Government Monopoly over Cell Phone Surveillance and Its Impact on National Security and Consumer Privacy by Stephanie K. Pell, Christopher Soghoian :: SSRN: This Article argues that current policy makers should not follow the worn path of attempting to outlaw technology while ignoring, and thus perpetuating, the significant vulnerabilities in cellular communications networks on which it depends

Privacy and National Security in the Digital Age. European and Comparative Constitutional Perspectives by Federico Fabbrini :: SSRN

Privacy and National Security in the Digital Age. European and Comparative Constitutional Perspectives by Federico Fabbrini :: SSRN: The article introduces the theme of the protection of the right to privacy in a world characterized by rapid developments in digital technology and the need to fight terrorism.

Tuesday, November 3, 2015

How Could Volkswagen’s Top Engineers Not Have Known? - Bloomberg Business

Wow!

http://www.bloomberg.com/news/articles/2015-10-21/how-could-volkswagen-s-top-engineers-not-have-known-

Death Rates Rising for Middle-Aged White Americans, Study Finds - NYTimes.com

Death Rates Rising for Middle-Aged White Americans, Study Finds - NYTimes.com


http://mobile.nytimes.com/2015/11/03/health/death-rates-rising-for-middle-aged-white-americans-study-finds.html?_r=0&referer=https://news.google.com/

11/02/2015: EPA, California Notify Volkswagen of Additional Clean Air Act Violations

11/02/2015: EPA, California Notify Volkswagen of Additional Clean Air
Act Violations

http://yosemite.epa.gov/opa/admpress.nsf/bd4379a92ceceeac8525735900400c27/4a45a5661216e66c85257ef10061867b!OpenDocument

African training on cybercrime starts in Kigali

Continental training on cybercrime starts in Kigali

http://www.police.gov.rw/news-detail/?tx_ttnews%5Btt_news%5D=5470&cHash=2a07d6f77316d4583a143c48f6d32707

Malignant Melanoma Misdiagnosed as a Diabetic Foot Ulcer

Malignant Melanoma Misdiagnosed as a Diabetic Foot Ulcer: Malignant melanoma, although rare, is a skin cancer with the highest mortality.

Keys To Diagnosing Metastatic Melanoma In The Foot And Ankle | Podiatry Today

Keys To Diagnosing Metastatic Melanoma In The Foot And Ankle | Podiatry Today: Lesions of the feet and ankle are notoriously misdiagnosed. Without early detection and treatment, survival rates plunge for these patients.

The patient in our case report was receiving primary treatment from an oncologist. By the time we saw him in the podiatry clinic, palliative care was the only treatment available for his chronic pain. Our patient died one year later. It is of paramount importance to identify these lesions and provide proper treatment as early as possible.

Monday, November 2, 2015

EPA: VW cheated on Audi, Porsche diesel SUVs, too

EPA: VW cheated on Audi, Porsche diesel SUVs, too


http://www.usatoday.com/story/money/cars/2015/11/02/epa-diesel-suv-volkswagen-audi-porsche/75044132/

Minorities Absent In Growing Cyber War | The Daily Caller

Minorities Absent In Growing Cyber War | The Daily Caller: "African-Americans and Latinos make up less than 10 percent of the cyber workforce, according to the International Consortium of Minority Cybersecurity Professionals, who hosted the briefing, along with cyber think tank Institute for Critical Infrastructure Technology and Texas Democrat Sheila Jackson-Lee."



'via Blog this'

Thursday, October 29, 2015

Wednesday, October 28, 2015

Study Reveals Why Lefties Are Rare

Study Reveals Why Lefties Are Rare

Professor Daniel M. Abrams and graduate student Mark J. Panaggio—both
right-handers—are the first to use real-world data (from competitive
sports) to test and confirm the hypothesis that social behavior is
related to population-level handedness.

http://m.livescience.com/19968-study-reveals-lefties-rare.html

Ready or Not, Millennials Are Changing How We Do Business Forever

Useful stats...

http://m.huffpost.com/us/entry/7673932

Saturday, October 24, 2015

Risky business – five facts you should know about the EMV Liability Shift - Lexology

Risky business – five facts you should know about the EMV Liability
Shift - Lexology

http://www.lexology.com/library/detail.aspx?g=2dec0544-d3e6-4513-90d7-2842e5752d14

EMV liability shift calls for renewed focus on employee security behaviors | Point of Sale News | POS News, Information and Resources

EMV liability shift calls for renewed focus on employee security
behaviors | Point of Sale News | POS News, Information and Resources

http://pointofsale.com/201510067817/Point-of-Sale-News/EMV-liability-shift-calls-for-renewed-focus-on-employee-security-behaviors.html

emv deadline - Google Search

emv deadline - Google Search


https://www.google.com/search?q=emv+deadline&client=safari&hl=en&prmd=nisv&source=lnms&tbm=nws&sa=X&ved=0CAcQ_AUoAWoVChMItbS5g8PbyAIVB9ZjCh251gMj

emv woes - Google Search

emv woes - Google Search

https://www.google.com/search?q=emv+woes&client=safari&hl=en&prmd=nsvi&source=lnms&tbm=nws&sa=X&ved=0CAgQ_AUoAWoVChMIufaY08LbyAIVBtBjCh2P2AgJ

CAESS - FAQ

CAESS - FAQ - Car hacking context:

http://www.autosec.org/faq.html#q3

Security Research Publications

Publications from UCSD:

http://cseweb.ucsd.edu/~savage/pubs.htm

Thursday, October 15, 2015

Friday, October 2, 2015

5 Tools To Check For Broken Links On Your Website - WPUniversity

5 Tools To Check For Broken Links On Your Website - WPUniversity: Unlike Xenu’s Link Sleuth, Screaming Frog is explicitly intended for site optimization. It dives deeper into page-level elements like heading tags and meta data.

Find broken links on your site with Xenu's Link Sleuth (TM)

Find broken links on your site with Xenu's Link Sleuth (TM): Find broken links on web sites

Privacy in the Age of Big Data - Stanford Law Review

Privacy in the Age of Big Data - Stanford Law Review: At the same time, the “data deluge” presents privacy concerns that could stir a regulatory backlash, dampening the data economy and stifling innovation.

The Schizophrenic State: Data Protection versus Surveillance in Europe and America by Alessandro Guarino :: SSRN

The Schizophrenic State: Data Protection versus Surveillance in Europe and America by Alessandro Guarino :: SSRN: On both sides of the Atlantic the tension between privacy and security in cyberspace, as well as the very definition of these concepts has been very much in the forefront since 2001 and recently much more so

The Right to Be Forgotten - Stanford Law Review

The Right to Be Forgotten - Stanford Law Review: Although Reding depicted the new right as a modest expansion of existing data privacy rights, in fact it represents the biggest threat to free speech on the Internet in the coming decade.