Sunday, November 29, 2015

Verizon PHI Data Breach Report Highlights Challenges Of Security

The research demonstrates the type of data targeted and where the data is stored and processed determines the tactics of hackers. 

http://www.healthitoutcomes.com/doc/verizon-phi-data-highlights-challenges-security-0001?utm_content=buffer9763d&utm_medium=social&utm_source=twitter.com&utm_campaign=buffer

The FISA Court’s Uncelebrated Good Points | emptywheel

"...However, I think it likely that after both instances, the NSA took its toys and went elsewhere for part of the relevant collection, in the first case to SPCMA analysis on EO 12333 collected Internet metadata, and in the second to CISA (though just for cyber applications)"

https://www.emptywheel.net/2015/11/04/the-fisa-courts-uncelebrated-good-points/

VIDEO: Satcom Guru on cyber security, EFB and sneakernet concerns - Runway GirlRunway Girl

VIDEO: Satcom Guru on cyber security, EFB and sneakernet concerns -
Runway GirlRunway Girl

http://www.runwaygirlnetwork.com/2015/11/27/video-satcom-guru-on-cyber-security-efb-and-sneakernet-concerns/

IoT: Turns out, consumers don’t trust IoT security

Turns out, consumers don't trust IoT security


https://auth0.com/blog/2015/11/06/surprised-turns-out-consumers-dont-trust-iot-security/

Solving The Persistent Security Threats For The Internet Of Things | TechCrunch

Solving The Persistent Security Threats For The Internet Of Things | TechCrunch

http://techcrunch.com/2015/11/28/solving-the-persistent-security-threats-for-the-internet-of-things/?ncid=rss&utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+Techcrunch+%28TechCrunch%29&sr_share=twitter

Verizon PHI Data Breach Report Highlights Challenges Of Security

HIMSS triage....

http://www.healthitoutcomes.com/doc/verizon-phi-data-highlights-challenges-security-0001?utm_content=buffer9763d&utm_medium=social&utm_source=twitter.com&utm_campaign=buffer

Are Wearables Fit for Clinical Trials? - Smarter With Gartner - Linkis.com

Wearables slides....

http://linkis.com/www.gartner.stfi.re/irdnL

Cybersecurity professionals: The healthcare industry needs you - TechRepublic

HIMSS triage fodder...

http://www.techrepublic.com/article/cybersecurity-professionals-the-healthcare-industry-needs-you/

Wednesday, November 25, 2015

The Paris attacks weren’t stopped by metadata surveillance. That hasn’t stopped officials from saying it might have.

The Paris attacks weren't stopped by metadata surveillance. That
hasn't stopped officials from saying it might have.

Surveillance for coercion...

http://www.slate.com/articles/technology/future_tense/2015/11/the_paris_attacks_weren_t_stopped_by_metadata_surveillance_that_hasn_t_stopped.2.html

California amends its breach notification requirements (again) - Lexology

California amends its breach notification requirements (again) - Lexology

http://www.lexology.com/library/detail.aspx?g=1886ce80-2c68-47e2-ac86-271abdc08cd3&utm_term=&utm_content=buffercfffd&utm_medium=social&utm_source=twitter.com&utm_campaign=buffer

Health data from wearable devices could be restricted under new EU regulation - Telegraph

Health data from wearable devices could be restricted under new EU
regulation - Telegraph

http://www.telegraph.co.uk/technology/news/12012430/Health-data-from-wearable-devices-could-be-restricted-under-new-EU-regulation.html

FCC Hires Online Tracking Expert Jonathan Mayer 11/24/2015

FCC Hires Online Tracking Expert Jonathan Mayer 11/24/2015

http://www.mediapost.com/publications/article/263390/fcc-hires-online-tracking-expert-jonathan-mayer.html

Check "extremist" quote at end.

No-Harm-Big-Foul: The FTC’s latest overreach in data privacy

From TheHill.com:

No-Harm-Big-Foul: The FTC's latest overreach in data privacy

http://thehill.com/blogs/ballot-box/247575-no-harm-big-foul-the-ftcs-latest-overreach-in-data-privacy

FTC ALJ: Embarrassment/Emotional Harm and Risk of Harm Does Not Satisfy “Substantial Consumer Injury” Prong of Unfairness

"Complaint counsel may find it preferable to have an ALJ decision on the books rather than a more precedential adverse Commission or Circuit Court of Appeal's decision, which could bind the FTC more significantly in data security cases going forward."

http://www.hldataprotection.com/2015/11/articles/consumer-privacy/ftc-alj-embarrassmentemotional-harm-and-risk-of-harm-does-not-satisfy-substantial-consumer-injury-prong-of-unfairness/

Monday, November 23, 2015

USA Conference - Wearables

USA Conference



Check out who is speaking, company profiles, etc.



Also VB results last year.

This Fancy Rock Wants to Protect Your Connected Devices | WIRED

This Fancy Rock Wants to Protect Your Connected Devices | WIRED: a connected device meant to watch over the security of other connected devices

Start with Security: A Guide for Business | Federal Trade Commission

Start with Security: A Guide for Business | Federal Trade Commission: here are ten lessons to learn that touch on vulnerabilities that could affect your company, along with practical guidance on how to reduce the risks they pose.

  1. Start with security.
  2. Control access to data sensibly.
  3. Require secure passwords and authentication.
  4. Store sensitive personal information securely and protect it during transmission.
  5. Segment your network and monitor who’s trying to get in and out.
  6. Secure remote access to your network.
  7. Apply sound security practices when developing new products.
  8. Make sure your service providers implement reasonable security measures.
  9. Put procedures in place to keep your security current and address vulnerabilities that may arise.
  10. Secure paper, physical media, and devices.

Privacy groups fight to expose secret cyber ruling | TheHill

Privacy groups fight to expose secret cyber ruling | TheHill

http://thehill.com/policy/cybersecurity/260986-privacy-groups-fight-to-expose-secret-cyber-ruling

Authorities Missed Many 'Red Flags' Before Paris Attacks

Authorities Missed Many 'Red Flags' Before Paris Attacks

http://m.huffpost.com/us/entry/5651dab1e4b0258edb31d9c2

Criminal Ruskie BOFHs help hackers steal $790 million in three years • The Register

Criminal Ruskie BOFHs help hackers steal $790 million in three years •
The Register

http://www.theregister.co.uk/2015/11/23/790_million_russian_financial_cybercrime/

Saturday, November 21, 2015

Privacy Not Included: Federal Law Lags Behind New Tech

Privacy Not Included: Federal Law Lags Behind New Tech

Use in essay...

http://www.truth-out.org/news/item/33715-privacy-not-included-federal-law-lags-behind-new-tech

Administrative Law Judge Dismisses FTC’s LabFTC LabMD: "no substantial Injury” to Consumers

Administrative Law Judge Dismisses FTC's LabMD Complaint, Finding
Insufficient Evidence of "Substantial Injury" to Consumers | The
National Law Review

...dismissing the FTC's complaint against LabMD, on the ground that
the Commission's staff had failed to carry its burden of demonstrating
a "likely substantial injury" to consumers resulting from LabMD's
allegedly "unfair" data security practices...

http://www.natlawreview.com/article/administrative-law-judge-dismisses-ftc-s-labmd-complaint-finding-insufficient

Int D Pri Law: GCHQ and Data Protection

http://m.idpl.oxfordjournals.org/content/early/2013/09/11/idpl.ipt020.short#

Check out articles...

Saturday, November 14, 2015

American Rifleman | NRA Gun of the Week: CZ Scorpion EVO 3 S1 Pistol

American Rifleman | NRA Gun of the Week: CZ Scorpion EVO 3 S1 Pistol

http://www.americanrifleman.org/articles/2015/10/31/nra-gun-of-the-week-cz-scorpion-evo-3-s1-pistol/

NRA pushes bill making it a crime to photograph or videotape Wisconsin hunters | Opinion

NRA pushes bill making it a crime to photograph or videotape Wisconsin
hunters | Opinion | Wisconsin Gazette

http://www.wisconsingazette.com/opinion/nra-pushing-bill-making-it-a-crime-to-photograph-or-videotape-wisconsin-hunters.html

Hired-gun hacking played key role in JPMorgan, Fidelity breaches | Reuters

Hired-gun hacking played key role in JPMorgan, Fidelity breaches | Reuters


http://mobile.reuters.com/article/internal_ReutersNewsRoom_ExclusivesAndWins_MOLT/idUSKCN0T22E920151113

Endpoint security lags in spite of vulnerabilities

http://www.net-security.org/secworld.php?id=19096

majority of VP and C-Level IT leaders surveyed indicated a heightened fear of a security breach in the coming year and acknowledged a rapidly shifting security landscape, which now includes endpoint security.  

Triage and emergency assessment - Manual for the Health Care of Children in Humanitarian Emergencies - NCBI Bookshelf

Use for my preso...

http://www.ncbi.nlm.nih.gov/books/NBK143755/

Triage in general practice

Develop a practice based triage protocol which clearly outlines the steps of the triage process and the roles and responsibilities of those involved.

http://www.medicalprotection.org/uk/practice-matters-issue-3/triage-in-general-practice

Tuesday, November 10, 2015

primary aldosteronism screening - Google Search

Search for primary aldosteronism screening - Google Search. Check for
hi-res results

https://www.google.com/search?q=primary+aldosteronism&ie=UTF-8&oe=UTF-8&hl=en&client=safari#hl=en&q=primary+aldosteronism+screening

Earlier Intervention for High Blood Pressure Reduces Heart Risk by 40 Percent

Earlier Intervention for High Blood Pressure Reduces Heart Risk by 40 Percent

Personal blog post tying this to aldosterone.

http://www.newsweek.com/earlier-intervention-high-blood-pressure-reduces-heart-risk-40-percent-392538

Buy Duck Breasts - Maple Leaf Farms

Buy Duck Breasts - Maple Leaf Farms

For Ducky Day

http://www.mapleleaffarms.com/shop-duck-breasts

cyberwarfare Articles : Risk of crippling cyber war yet to be addressed, says former US official

Check out these cyberwarfare Articles : Risk of crippling cyber war
yet to be addressed, says former US official

http://www.rightrelevance.com/search/articles/hero?article=f8286c60109fd77f35ab6ae703201d06214bbf22&query=cyberwarfare&taccount=cyberwarfarre

Montefiore employee steals 12,000 patients' personal information | Healthcare Dive

Insider threat...

http://www.healthcaredive.com/news/montefiore-employee-steals-12000-patients-personal-information/401122/

Arrest Of Immigrant At Texas Clinic Isn't A HIPAA Issue - Law360

Share and connect. Good stuff...

http://www.law360.com/articles/718760/arrest-of-immigrant-at-texas-clinic-isn-t-a-hipaa-issue

Conferences and Meetings on Information Security and Information Privacy

Review as needed:

http://www.conference-service.com/conferences/information-security.html

Lawsuits against Excellus, claims of fraud mount

Lawsuits against Excellus, claims of fraud mount

http://www.democratandchronicle.com/story/news/2015/11/08/excellus-hack-details/75039932/

Hackers can profit greatly by stealing your health data. Are you protected? - The Washington Post

Hackers can profit greatly by stealing your health data. Are you
protected? - The Washington Post

https://www.washingtonpost.com/national/health-science/hackers-can-profit-greatly-by-stealing-your-health-data-are-you-protected/2015/11/09/e1f126f6-5181-11e5-933e-7d06c647a395_story.html

Owner of Los Angeles Medical Supply Company Convicted in $4 Million Medicare Fraud Scheme

Check bottom line...

http://www.imperialvalleynews.com/index.php/news/california-news/6161-owner-of-los-angeles-medical-supply-company-convicted-in-4-million-medicare-fraud-scheme.html


From My iPhone

Sunday, November 8, 2015

Saturday, November 7, 2015

U.S. wants spectrum for 5G; lethal cyber weapons in the works; pro-Palestine hackers claim to dox military - The Washington Post

U.S. wants spectrum for 5G; lethal cyber weapons in the works

https://www.washingtonpost.com/news/powerpost/wp/2015/11/06/u-s-wants-spectrum-for-5g-lethal-cyber-weapons-in-the-works-pro-palestine-hackers-claim-to-dox-military/

Oklahoma Earthquakes Are a National Security Threat - Bloomberg Business

Oklahoma Earthquakes Are a National Security Threat - Bloomberg Business

"Now the massive oil stockpile faces an emerging threat: earthquakes.
In the past month, a flurry of quakes have hit within a few miles of
Cushing, rattling the town and its massive tanks. According to the
Oklahoma Geological Survey, more than a dozen quakes have registered
3.0 or higher on the Richter scale within a few miles of Cushing since
mid-September. The biggest, registering at 4.5, hit about three miles
away on Oct. 10."

http://www.bloomberg.com/news/articles/2015-10-23/oklahoma-earthquakes-are-a-national-security-threat

5 Recent Reports on Businesses and Cyber Security, Liability and Insurance

5 Recent Reports on Businesses and Cyber Security, Liability and Insurance

http://www.insurancejournal.com/news/national/2015/11/06/387756.htm

Wednesday, November 4, 2015

[1509.06533] Factors influencing risk acceptance of Cloud Computing services in the UK Government

[1509.06533] Factors influencing risk acceptance of Cloud Computing services in the UK Government: We focused on perceived risks and perceived security concerns. Based on these results, we suggest a number of implications for risk managers, policy makers and cloud service providers.

“Fracking” controversy and communication: Using national survey data to understand public perceptions of hydraulic fracturing

“Fracking” controversy and communication: Using national survey data to understand public perceptions of hydraulic fracturing: In contrast, people more likely to support fracking tend to be older, hold a bachelor's degree or higher, politically conservative, watch TV news more than once a week, and associate the process with positive economic or energy supply outcomes.

The “Nasty Effect:” Online Incivility and Risk Perceptions of Emerging Technologies - Anderson - 2013 - Journal of Computer-Mediated Communication - Wiley Online Library

The “Nasty Effect:” Online Incivility and Risk Perceptions of Emerging Technologies - Anderson - 2013 - Journal of Computer-Mediated Communication - Wiley Online Library: we examine the effects online incivility on perceptions toward a particular issue—namely, an emerging technology, nanotechnology. We found that exposure to uncivil blog comments can polarize risk perceptions of nanotechnology along the lines of religiosity and issue support.

Risky business: How social psychology can help improve corporate risk management

Risky business: How social psychology can help improve corporate risk management: The article then applies these worldviews and psychological phenomena to the case of risk management.

Measuring cultural values and beliefs about environment to identify their role in climate change responses

Measuring cultural values and beliefs about environment to identify their role in climate change responses: Cultural biases were found to directly influence climate change responses.

Cultural worldviews and environmental risk perceptions: A meta-analysis

Cultural worldviews and environmental risk perceptions: A meta-analysis: individuals who scored higher on egalitarianism perceived more environmental risks (r = .25), whereas individuals who scored higher on hierarchism and individualism perceived fewer environmental risks (r = −.18 and −.17, respectively).

Technologies, Security, and Privacy in the Post-9/11 European Information Society - Levi - 2004 - Journal of Law and Society - Wiley Online Library

Technologies, Security, and Privacy in the Post-9/11 European Information Society - Levi - 2004 - Journal of Law and Society - Wiley Online Library



Post 9/11 perspective.

23 University of Kansas Law Review 1974-1975 Is an Expanded Right of Privacy Consistent with Fair and Effective Law Enforcement

23 University of Kansas Law Review 1974-1975 Is an Expanded Right of Privacy Consistent with Fair and Effective Law Enforcement 



Rehnquist!

THE FTC AND THE NEW COMMON LAW OF PRIVACY on JSTOR

THE FTC AND THE NEW COMMON LAW OF PRIVACY on JSTOR



Good for law essay.

College Law Enforcement and Security Department Responses to Alcohol-Related Incidents: A National Study - Bernat - 2014 - Alcoholism: Clinical and Experimental Research - Wiley Online Library

College Law Enforcement and Security Department Responses to Alcohol-Related Incidents: A National Study - Bernat - 2014 - Alcoholism: Clinical and Experimental Research - Wiley Online Library



Case study for citation.

The Logic of Masculinist Protection: Reflections on the Current Security State on JSTOR

The Logic of Masculinist Protection: Reflections on the Current Security State on JSTOR



Privacy and security.

An Open Letter from Crypto and IS Folks

Ax14.pdf: As
leading
members
of the US
cryptog
raphy and information
-
security research communities
, we
deplore these practices
and urge that they be changed

The Value of Privacy in an Era of Security: Embedding Constitutional Limits on Preemptive Surveillance - Mitsilegas - 2014 - International Political Sociology - Wiley Online Library

The Value of Privacy in an Era of Security: Embedding Constitutional Limits on Preemptive Surveillance - Mitsilegas - 2014 - International Political Sociology - Wiley Online Library

Your Secret Stingray's No Secret Anymore: The Vanishing Government Monopoly over Cell Phone Surveillance and Its Impact on National Security and Consumer Privacy by Stephanie K. Pell, Christopher Soghoian :: SSRN

Your Secret Stingray's No Secret Anymore: The Vanishing Government Monopoly over Cell Phone Surveillance and Its Impact on National Security and Consumer Privacy by Stephanie K. Pell, Christopher Soghoian :: SSRN: This Article argues that current policy makers should not follow the worn path of attempting to outlaw technology while ignoring, and thus perpetuating, the significant vulnerabilities in cellular communications networks on which it depends

Privacy and National Security in the Digital Age. European and Comparative Constitutional Perspectives by Federico Fabbrini :: SSRN

Privacy and National Security in the Digital Age. European and Comparative Constitutional Perspectives by Federico Fabbrini :: SSRN: The article introduces the theme of the protection of the right to privacy in a world characterized by rapid developments in digital technology and the need to fight terrorism.

Tuesday, November 3, 2015

How Could Volkswagen’s Top Engineers Not Have Known? - Bloomberg Business

Wow!

http://www.bloomberg.com/news/articles/2015-10-21/how-could-volkswagen-s-top-engineers-not-have-known-

Death Rates Rising for Middle-Aged White Americans, Study Finds - NYTimes.com

Death Rates Rising for Middle-Aged White Americans, Study Finds - NYTimes.com


http://mobile.nytimes.com/2015/11/03/health/death-rates-rising-for-middle-aged-white-americans-study-finds.html?_r=0&referer=https://news.google.com/

11/02/2015: EPA, California Notify Volkswagen of Additional Clean Air Act Violations

11/02/2015: EPA, California Notify Volkswagen of Additional Clean Air
Act Violations

http://yosemite.epa.gov/opa/admpress.nsf/bd4379a92ceceeac8525735900400c27/4a45a5661216e66c85257ef10061867b!OpenDocument

African training on cybercrime starts in Kigali

Continental training on cybercrime starts in Kigali

http://www.police.gov.rw/news-detail/?tx_ttnews%5Btt_news%5D=5470&cHash=2a07d6f77316d4583a143c48f6d32707

Malignant Melanoma Misdiagnosed as a Diabetic Foot Ulcer

Malignant Melanoma Misdiagnosed as a Diabetic Foot Ulcer: Malignant melanoma, although rare, is a skin cancer with the highest mortality.

Keys To Diagnosing Metastatic Melanoma In The Foot And Ankle | Podiatry Today

Keys To Diagnosing Metastatic Melanoma In The Foot And Ankle | Podiatry Today: Lesions of the feet and ankle are notoriously misdiagnosed. Without early detection and treatment, survival rates plunge for these patients.

The patient in our case report was receiving primary treatment from an oncologist. By the time we saw him in the podiatry clinic, palliative care was the only treatment available for his chronic pain. Our patient died one year later. It is of paramount importance to identify these lesions and provide proper treatment as early as possible.

Monday, November 2, 2015

EPA: VW cheated on Audi, Porsche diesel SUVs, too

EPA: VW cheated on Audi, Porsche diesel SUVs, too


http://www.usatoday.com/story/money/cars/2015/11/02/epa-diesel-suv-volkswagen-audi-porsche/75044132/

Minorities Absent In Growing Cyber War | The Daily Caller

Minorities Absent In Growing Cyber War | The Daily Caller: "African-Americans and Latinos make up less than 10 percent of the cyber workforce, according to the International Consortium of Minority Cybersecurity Professionals, who hosted the briefing, along with cyber think tank Institute for Critical Infrastructure Technology and Texas Democrat Sheila Jackson-Lee."



'via Blog this'