Monday, December 5, 2016

Global Law Enforcers Finally Take Down Avalanche Cybercrime Ring: Here's How They Did It : TECH : Tech Times

Global Law Enforcers Finally Take Down Avalanche Cybercrime Ring: Here's How They Did It : TECH : Tech Times: "Companies and consumers should take this opportunity to scan their systems for the different families of malware that the Avalanche botnet distributed," said Stephen Cobb, senior security researcher for ESET, a security company in Slovakia."



'via Blog this'

Sunday, December 4, 2016

The Future Of Insider Threats

Half of IT Pros Say Insider Threats Are a Bigger Concern Than Hackers - Infosecurity Magazine

Half of IT Pros Say Insider Threats Are a Bigger Concern Than Hackers - Infosecurity Magazine

http://www.infosecurity-magazine.com/news/half-of-it-pros-say-insider/

More than 5,550 defense contractors have basic insider threat programs, DoD says - FederalNewsRadio.com

More than 5,550 defense contractors have basic insider threat programs, DoD says - FederalNewsRadio.com

http://federalnewsradio.com/industryassociations/2016/12/5550-defense-contractors-basic-insider-threat-programs-dod-says/

Gov. Brown Signs Legislation Punishing Ransomware | Senator Robert M. Hertzberg

EIA - Electricity Data (outages)

Beware of these cyber hazards in 2017 | VentureBeat | Security | by Avi Chesla, empow

Beware of these cyber hazards in 2017 | VentureBeat | Security | by Avi Chesla

http://venturebeat.com/2016/12/03/beware-of-these-cyber-hazards-in-2017/

EHR adverse events data cause for alarm | Healthcare IT News

Deaths by medical mistakes hit records | Healthcare IT News

Hoodie

Tuesday, November 29, 2016

Masooda Bashir | ischool.illinois.edu

Masooda Bashir | ischool.illinois.edu: "Unfortunately, the U.S. lacks the cyber security workforce needed to manage many of the threats our society faces."



'via Blog this'

Monday, November 28, 2016

Graduation Dates

Graduation Dates: The College of Social Sciences, Arts and Humanities

PropOrNot - Black Friday Report On Russian Propaganda Network Mapping.pdf - Google Drive

PropOrNot - Black Friday Report On Russian Propaganda Network Mapping.pdf - Google Drive

https://drive.google.com/file/d/0Byj_1ybuSGp_NmYtRF95VTJTeUk/view

Hatemi: Not by twins alone: Using the extended family... - Google Scholar

Hatemi: Not by twins alone: Using the extended family... - Google Scholar

https://scholar.google.com/scholar?cites=10005905925752745289&as_sdt=2005&sciodt=0,5&hl=en

Not by Twins Alone: Using the Extended Family Design to Investigate Genetic Influence on Political Beliefs

Not by Twins Alone: Using the Extended Family Design to Investigate Genetic Influence on Political Beliefs - Hatemi - 2010 - American Journal of Political Science - Wiley Online Library


http://onlinelibrary.wiley.com/doi/10.1111/j.1540-5907.2010.00461.x/full

Continuous Monthly Calendar for Excel

Continuous Monthly Calendar for Excel: "This new continuous monthly calendar template for Microsoft Excel® will let you create and print a calendar without breaks between months, all on one worksheet. "



'via Blog this'

Advanced Calendar Creator

Advanced Calendar Creator: "This is the advanced configuration form for the calendar customizer. "



'via Blog this'

Sunday, November 27, 2016

White Nationalist Richard Spencer Uses Diffusionist Fringe History in Speech Praising Trump, White America - Jason Colavito

Tweetable...

http://www.jasoncolavito.com/blog/white-nationalist-richard-spencer-uses-diffusionist-fringe-history-in-speech-praising-trump-white-america

Intel NUC Mini PC Review: Core i5 and i7 Benchmarked

Check it out...

http://www.tomsguide.com/us/intel-broadwell-nuc-mini-pc,review-2688.html

ZOTAC ZBOX MAGNUS EN1070 Gaming Mini PC, ZBOX-EN1070-U, Intel Core i5-6400T Quad-core CPU NVIDIA GeForce GTX 1070 Graphics

Video editor...

http://www.newegg.com/Product/Product.aspx?Item=9SIA24G5326076

How to use an external graphics card with a laptop

Good explanation...

http://www.pcworld.com/article/2984716/laptop-computers/how-to-transform-your-laptop-into-a-gaming-powerhouse-with-an-external-graphics-card.html

A Cyber Security Agency –A Suggestion to President-Elect Trump | A blog written by Dr. Stephen Bryen

A Cyber Security Agency –A Suggestion to President-Elect Trump | A blog written by Dr. Stephen Bryen

http://www.bryensblog.com/cyber-security-agency-suggestion-president-elect-trump/

Pauline Oliveros, Creator of ‘Deep Listening,’ Dies at 84 | Billboard

Companies are in short supply of cyber security talent

Monday, November 21, 2016

5 free tools for editing images on a Chromebook

Check it out, especially first tip...

https://www.google.com/amp/www.pcworld.com/article/2885579/5-free-tools-for-editing-images-on-a-chromebook.amp.html?client=ms-android-att-us

64 Online Resources to Learn to Code for Free

64 Online Resources to Learn to Code for Free: "Large online course library, where classes are taught by real university professors. All courses are free of charge, but you have the option to pay for a “Coursera Verified Certificate” to prove course completion."



'via Blog this'

Steiner Waldorf Schools Part 3. The problem of racism

Oops...

http://www.dcscience.net/2010/12/16/steiner-waldorf-schools-part-3-the-problem-of-racism/

Deaths from medical errors inflated in journal report, news

Cybersecurity risk versus errors...

https://www.statnews.com/2016/05/09/medical-errors-deaths-bmj/

Medical Errors | The American Association For Justice

Cybersecurity risk versus errors...

https://www.justice.org/what-we-do/advocate-civil-justice-system/issue-advocacy/medical-errors

A New, Evidence-based Estimate of Patient Harms Associated w... : Journal of Patient Safety

Cybersecurity risk versus errors...?

http://journals.lww.com/journalpatientsafety/Fulltext/2013/09000/A_New,_Evidence_based_Estimate_of_Patient_Harms.2.aspx

Deluxe Thanksgiving Dinner for 4-6

Possible...TD TBD...

http://www.magickitchen.com/menu/thanksgiving/97505.html

Thursday, November 17, 2016

Sunday, November 13, 2016

Trump says cybersecurity maybe hardly doable

The answer that best exemplifies how badly Donald Trump was out of his depth in the debate - The Washington Post: "So we have to get very, very tough on cyber and cyber warfare. It is — it is a huge problem. I have a son. He's 10 years old. He has computers. He is so good with these computers, it's unbelievable. The security aspect of cyber is very, very tough. And maybe it's hardly doable."

What Trump's victory means for cybersecurity - CSMonitor.com

What Trump's victory means for cybersecurity - CSMonitor.com



"The security aspect of cyber is very, very tough. And maybe it's hardly doable."

Trump's First 100 Days: Restoring National Security Act

"Restoring National Security Act. Rebuilds our military by eliminating the defense sequester and expanding military investment; provides Veterans with the ability to receive public VA treatment or attend the private doctor of their choice; protects our vital infrastructure from cyber-attack; establishes new screening procedures for immigration to ensure those who are admitted to our country support our people and our values."

http://www.npr.org/2016/11/09/501451368/here-is-what-donald-trump-wants-to-do-in-his-first-100-days

Donald Trump is about to face a rude awakening over Obamacare - SFGate

Some good points...

http://www.sfgate.com/news/article/Donald-Trump-is-about-to-face-a-rude-awakening-10610353.php?ipid=articlerecirc

Friday, November 11, 2016

War Letters: Communication between Front and Home Front | International Encyclopedia of the First World War (WW1)

War Letters: Communication between Front and Home Front | International Encyclopedia of the First World War (WW1): "In nations where literacy was well-established by 1914, letter-writing was critical to the emotional well-being of soldiers and their families."



'via Blog this'

Study finds malware lurking in Amazon, Google and Groupon cloud services

XYZprinting da Vinci 1.0 AiO 3D Printer/Scanner | Staples®

XYZprinting da Vinci 1.0 AiO 3D Printer/Scanner | Staples®: "Dual-laser 3D scanning technology for distortion-free capture of desired object. Automatic imaging takes only 5 minutes!"



'via Blog this'

Critical Infrastructure Sectors | Homeland Security

Critical Infrastructure Sectors | Homeland Security: "There are 16 critical infrastructure sectors whose assets, systems, and networks, whether physical or virtual, are considered so vital to the United States that their incapacitation or destruction would have a debilitating effect on security, national economic security, national public health or safety, or any combination thereof."



'via Blog this'

Thursday, November 10, 2016

ASUS Chromebook C301SA | Notebooks | ASUS USA

ASUS Chromebook C301SA | Notebooks | ASUS USA: "The incredibly sleek and light Chromebook C301 is designed to go everywhere you want to go. Weighing just 2.97 lbs"



'via Blog this'

ASUS ZenPad S 8.0 (Z580CA) | Tablets | ASUS USA

ASUS ZenPad S 8.0 (Z580CA) | Tablets | ASUS USA:



Need to check firmware by SKU?



'via Blog this'

Donald Trump wins US Presidential election 2016: What does it mean for the tech sector?

Donald Trump wins US Presidential election 2016: What does it mean for
the tech sector? - Computer Business Review

http://www.cbronline.com/news/verticals/central-government/donald-trump-wins-us-presidential-election-2016-mean-tech-sector/

China Passes Long-Awaited Cyber Security Law

Blog it...

http://www.forbes.com/sites/roncheng/2016/11/09/china-passes-long-awaited-cyber-security-law/#5bce2cfb6868

Cyber Security for Critical Infrastructure Protection - SCADAhacker

Cyber Security for Critical Infrastructure Protection - SCADAhacker: "SCADAhacker was conceived with the idea of providing relevant, candid, mission-critical information relating to industrial security of Supervisory Control and Data Acquisition (SCADA), Distributed Control (DCS) and other Industrial Control Systems (ICS) in a variety of public and social media forums."

'via Blog this'

Donald Trump wins US Presidential election 2016: What does it mean for the tech sector? - Computer Business Review

Donald Trump wins US Presidential election 2016: What does it mean for
the tech sector? - Computer Business Review

http://www.cbronline.com/news/verticals/central-government/donald-trump-wins-us-presidential-election-2016-mean-tech-sector/

Sunday, October 30, 2016

Coming to a Government Contract Near You: Mandatory Information Safeguarding Requirements | Cybersecurity Law Watch

Coming to a Government Contract Near You: Mandatory Information Safeguarding Requirements | Cybersecurity Law Watch



"The government recently finalized a sweeping amendment to the Federal
Acquisition Regulation (“FAR”) that will impose basic information system
safeguarding requirements on many federal acquisitions, marking the
latest in the continuing government effort to regulate and enhance
cybersecurity protections in the industry. The Final Rule, effective
June 15, 2016, imposes fifteen basic safeguarding requirements for
contractors with information systems containing information provided by,
or generated for, the government under a federal contract."

Tuesday, October 25, 2016

US transport agency guidance on vehicle cybersecurity irks lawmakers | CSO Online

For trends and such...

http://www.csoonline.com/article/3134858/security/us-transport-agency-guidance-on-vehicle-cybersecurity-irks-lawmakers.html

Enterprises Slow to Share Cyber-Threat Data Despite Federal Protection

For trends and such...

http://mobile.eweek.com/security/cyber-threat-data-sharing-off-to-slow-start-despite-u.s.-legislation.html

Senator: Industry needs to educate Congress on cyber -- FCW

For trends and such...

https://fcw.com/articles/2016/10/25/warner-cyber-congress.aspx?m=1

Converting Email from Eudora: Why I No Longer Live at the P.O.

Converting Email from Eudora: Why I No Longer Live at the P.O.: "But after 18 years of using Eudora, I couldn’t just quit cold turkey. "



'via Blog this'

Emailchemy 13.2.1 Released – Weird Kid Software

Emailchemy 13.2.1 Released – Weird Kid Software: "Emailchemy’s built-in IMAP server is now compatible with the Apple Mail app that comes with macOS Sierra (10.12)."



'via Blog this'

culture.it.newsscan - NewsScan Daily, 30 May 2003 ("Above The Fold") - msg#00021 - Recent Discussion OSDir.com

culture.it.newsscan - NewsScan Daily, 30 May 2003 ("Above The Fold") - msg#00021 - Recent Discussion OSDir.com: Safe & Sound in the Cyber Age: "Of Terrorists and Lingerie"

Religious Psychosis - The Global Nightmare, Part 1 - The Faithless Feminist

Religious psychosis essay...

http://faithlessfeminist.com/blog-posts/religious-psychosis-global-nightmare-part-1/

Monday, October 24, 2016

GSA Proposes New Highly Adaptable Cybersecurity Services Special Item Number (SIN) | Interact

GSA Proposes New Highly Adaptable Cybersecurity Services Special Item Number (SIN) | Interact: In support of the President’s Cybersecurity National Action Plan, the General Services Administration (GSA) intends to establish a new Special Item Number (SIN) on the IT Schedule 70 contract vehicle to offer cybersecurity services that Federal agencies can quickly leverage to assess and protect their IT assets and infrastructure.

On freedom of the press, Donald Trump wants to make America like England again - The Washington Post

On freedom of the press, Donald Trump wants to make America like England again - The Washington Post:



Until recently, English law was so tough on the media that disgruntled subjects of news reports could use the country's court system to carry out what the New York legislature called “libel terrorism.” 



'via Blog this'

NICE (National Initiative for Cybersecurity Education) Conference 2016

NICE (National Initiative for Cybersecurity Education) Conference 2016



Getting ready to be NICE!

Using Rowhammer bitflips to root Android phones is now a thing | Ars Technica

For the blog...

http://arstechnica.com/security/2016/10/using-rowhammer-bitflips-to-root-android-phones-is-now-a-thing/

Data Breach and Due Diligence: Why Boards Need to Get Involved with Cyber Insurance | ID Experts

Data Breach and Due Diligence: Why Boards Need to Get Involved with
Cyber Insurance

https://www2.idexpertscorp.com/blog/single/data-breach-due-diligence-why-boards-need-to-get-involved-cyber-insurance

Game changer: California investigating Wells Fargo for identity theft | 2016-10-19 | HousingWire

Game changer: California investigating Wells Fargo for identity theft...

http://www.housingwire.com/blogs/1-rewired/post/38325-game-changer-california-investigating-wells-fargo-for-identity-theft

Sunday, October 23, 2016

How Much Will Today’s Internet Outage Cost? - The Atlantic

For the blog...

http://www.theatlantic.com/technology/archive/2016/10/a-lot/505025/

Is the Internet of Things a developer's dream or a million new headaches? | ZDNet

For the blog...

http://www.zdnet.com/article/is-the-internet-of-things-a-developers-dream-or-a-million-new-headaches/

How insecurity is damaging the IoT industry « Tech Talks

For the blog...

https://bdtechtalks.com/2016/10/23/how-insecurity-is-damaging-the-iot-industry/

How to Rig a Presidential Election in 1000 Easy Steps | WIRED

For the blog...

https://www.wired.com/2016/10/wireds-totally-legit-guide-rigging-presidential-election/?mbid=social_twitter

Heightened DDoS Threat Posed by Mirai and Other Botnets

Some good advice...

https://www.us-cert.gov/ncas/alerts/TA16-288A

Migrating Eudora from Windows to the MAC (w. la... | Official Apple Support Communities

Migrating Eudora from Windows to the MAC (w. la... | Official Apple Support Communities:



http://www.aid4mail.com/email-migration



"application will convert on the PC my Emails to MBOX files that can be then copied to the MAC and imported into Apple's mail. "  



'via Blog this'

Thursday, October 20, 2016

What It Means To 'Rig' An Election: Law Expert Says In Election 2016 It's 'Extraordinarily Unlikely' : NPR

Add to blog...http://www.npr.org/2016/10/18/498296000/election-law-expert-isnt-buying-claims-that-nov-8-will-be-rigged

Game changer: California investigating Wells Fargo for identity theft | 2016-10-19 | HousingWire

Game changer: California investigating Wells Fargo for identity theft
| 2016-10-19 | HousingWire

http://www.housingwire.com/blogs/1-rewired/post/38325-game-changer-california-investigating-wells-fargo-for-identity-theft

Fact check: Trump's bogus voter fraud claims

Thursday notes...

https://news.google.com/news/amp?caurl=http%3A%2F%2Famp.usatoday.com%2Fstory%2F92434104%2F#pt0-681842

PLUG - The World's Most Powerful Battery Pack | Indiegogo

Did I back this...

https://www.indiegogo.com/projects/plug-the-world-s-most-powerful-battery-pack-powerbank-solar--2#/

Elon Musk: negative media coverage of autonomous vehicles could be 'killing people'

Autonomous vehicles...

https://news.google.com/news/amp?caurl=http%3A%2F%2Fwww.theverge.com%2Fplatform%2Famp%2F2016%2F10%2F19%2F13341306%2Felon-musk-negative-media-autonomous-vehicles-killing-people#pt0-276020

Startup key combinations for Mac - Apple Support

Startup key combinations for Mac - Apple Support: Press and hold the keys immediately after you turn on your Mac and hear the startup sound. Keep holding until the described behavior occurs.

Monday, October 17, 2016

Donald Trump's ridiculous claims about voter fraud are an embarrassment

Donald Trump's ridiculous claims about voter fraud are an embarrassment

https://news.google.com/news/amp?caurl=https%3A%2F%2Fwww.washingtonpost.com%2Famphtml%2Fnews%2Fthe-fix%2Fwp%2F2016%2F10%2F17%2Fdonald-trumps-ridiculous-claims-about-voter-fraud-are-an-embarrassment%2F#pt0-791466

The Flames of November: What if some Trump backers turn to resistance? | Foreign Policy

Great piece of scenario work...

http://foreignpolicy.com/2016/08/08/round-ii-what-if-trump-loses-ugly/

Donald Trump loses it, calls for “revolution” - Salon.com

""We should have a revolution in this country." That was the opinion of Donald Trump after President Obama won re-election..."

http://www.salon.com/2012/11/07/donald_trump_loses_it_calls_for_revolution/

Trump calls for revolution, blasts Electoral College | TheHill

"The real estate mogul and host of reality show "The Apprentice" has been an outspoken supporter of Mitt Romney. He used Twitter to object vehemently to the Electoral College system that he predicted would give the win to Obama and the popular vote to the GOP challenger."

http://thehill.com/blogs/twitter-room/other-news/266423-trump-calls-for-revolution-blasts-electoral-college

Hackers, Organizational Doxing, and Data Forgeries - The Atlantic

Hackers, Organizational Doxing, and Data Forgeries - The Atlantic: "But what if hackers were to alter documents before releasing them? This is the next step in organizational doxing—and the effects can be much worse."

Saturday, October 15, 2016

Trump’s supporters talk rebellion, assassination at his rallies - The Boston Globe

Trump's supporters talk rebellion, assassination at his rallies - The
Boston Globe

Note voting stat of 1.5%...

https://www.bostonglobe.com/news/politics/2016/10/15/donald-trump-warnings-conspiracy-rig-election-are-stoking-anger-among-his-followers/LcCY6e0QOcfH8VdeK9UdsM/story.html

How Cannabis Can Help You Manage Your Arthritis - The Weed Blog

How Cannabis Can Help You Manage Your Arthritis - The Weed Blog

https://www.theweedblog.com/cannabis-can-help-manage-arthritis/?google_editors_picks=true

Trump calls for U.S. to use offensive cyberweapons | PCWorld

Trump calls for U.S. to use offensive cyberweapons | PCWorld

http://www.pcworld.com/article/3126578/security/trump-calls-for-us-to-use-offensive-cyberweapons.html

Actual white supremacist: Trump’s success “proves that our views resonate with millions” - Vox

Quote!

http://www.vox.com/policy-and-politics/2016/10/14/13287532/trump-white-supremacists-racists

Billing Schemes, Part 1: Shell Companies That Don’t Deliver

ER scenario 2: http://www.journalofaccountancy.com/issues/2002/jul/billingschemespart1shellcompaniesthatdontdeliver.html

Lessons from an $8 million fraud

ER scenario 2: http://www.journalofaccountancy.com/issues/2014/aug/fraud-20149862.html

CSC sues Eric Pulier for alleged fraud

ER scenario 2: http://www.businessinsider.com/csc-sues-eric-pulier-for-alleged-fraud-2015-5

Wethersfield woman admits embezzling $1.7M from computer company | WTNH Connecticut News

ER scenario 2: http://wtnh.com/2015/08/21/wethersfield-woman-admits-embezzling-1-7m-from-computer-company/

Wednesday, October 12, 2016

6 Cyber Security Strategies To Protect Your Small Business

6 Cyber Security Strategies To Protect Your Small Business: Every firm is unique. Your needs may be dramatically different from those of your closest competitor. Given that, here are a handful of cyber security strategies and tips that virtually any business should consider for better security.

A history of denial

A history of denial - check it out.

http://www.washingtonpost.com/sf/brand-connect/bleecker-street/denial/

Tuesday, October 11, 2016

EU Finalizes General Data Protection Regulation: Implications for U.S. Businesses

EU Finalizes General Data Protection Regulation: Implications for U.S. Businesses: One of the most significant changes in the GDPR is the very fact that it is a “regulation,” as opposed to a “directive.”

6 Ways To Prepare For The EU's GDPR

6 Ways To Prepare For The EU's GDPR: "The GDPR introduces tough new privacy requirements for companies handling EU data and vests consumers with significantly greater control and rights over the manner in which their data is collected, shared, retained, and destroyed. The GDPR gives EU regulators the authority to impose fines ranging from 2 percent to 4 percent of a company’s global revenues for violations of the regulation."

GDPR: Who does the EU GDPR Apply To? | Varonis Systems

GDPR: Who does the EU GDPR Apply To? | Varonis Systems: So under these new rules, if a US company collects data from EU citizens, it would be under the same legal obligations as though the company had headquarters in say France, UK, or Germany — even though they don’t have any servers or offices there!

Top 10 operational impacts of the GDPR: Part 1 – data security and breach notification

Top 10 operational impacts of the GDPR: Part 1 – data security and breach notification



Great series to read NOW...

New Survey Shows U.S. Companies Face Major Challenges Complying with EU General Data Protection Regulations (GDPR)

New Survey Shows U.S. Companies Face Major Challenges Complying with EU General Data Protection Regulations (GDPR): 39 percent of U.S. respondents do not anonymize or leverage other techniques to depersonalize customer data before using it in application testing environments.

Internet Speed Test - HTML5 Speed Test

Internet Speed Test - HTML5 Speed Test: Welcome to the SourceForge Speed Test. This speed test is uniquely designed to test your current Internet connection speed for Latency/Ping, Jitter, Download Speed, Upload Speed, Buffer Bloat, and Packet Loss.

Monday, October 10, 2016

EU General Data Protection Regulation, Binding Corporate Rules And Privacy Shield Training Requirements | Bloomberg BNA

EU General Data Protection Regulation, Binding Corporate Rules And Privacy Shield Training Requirements | Bloomberg BNA

Under Article 37, the GDPR tasks the Data Protection Officer (DPO) with “awareness raising and training of staff involved in the processing operations.”

Under Article 43, in connection with Binding Corporate Rules(BCRs), the GDPR requires “the appropriate data protection training to personnel having permanent or regular access to personal data.”

EU-US Privacy Shield becomes operational with the GDPR on the horizon - Lexology

EU-US Privacy Shield becomes operational with the GDPR on the horizon - Lexology



The Privacy Shield will operate in parallel with other existing data transfer mechanisms including Standard Contractual Clauses ("SCCs") and Binding Corporate Rules ("BCRs").

The EU-U.S. Privacy Shield Versus Other EU Data Transfer Compliance Options | Bloomberg BNA

The EU-U.S. Privacy Shield Versus Other EU Data Transfer Compliance Options | Bloomberg BNA: The EU-U.S. Privacy Shield Versus Other EU Data Transfer Compliance Options

Google Signs Up For EU/U.S. Privacy Shield | SecurityWeek.Com

Google Signs Up For EU/U.S. Privacy Shield | SecurityWeek.Com: The reality, however, is that Safe-Harbor compliance isn't a simple shoehorn into Privacy Shield compliance.

20/20 Software EU-US PRIVACY SHIELD PRIVACY POLICY

Sample of how this works: Contact - 20/20 Software: EU-US PRIVACY SHIELD PRIVACY POLICY

What is BBB EU Privacy Shield?

BBB EU Privacy Shield is a successor program to BBB EU Safe Harbor, one of two original independent dispute resolution mechanisms supporting the US-EU Safe Harbor Framework when it came into effect in 2000.

EU-U.S. ‘Privacy Shield’ Agreement: Useful Or Useless? Yahoo Surveillance Scandal Should Decide That

EU-U.S. ‘Privacy Shield’ Agreement: Useful Or Useless? Yahoo Surveillance Scandal Should Decide That: It’s the U.S. Department of Commerce, an agency in charge of helping American business interests, that needs to audit the U.S. companies for violating EU laws.

Jones Day | The EU–U.S. Privacy Shield Approved

Jones Day | The EU–U.S. Privacy Shield Approved: After months of criticism from various EU bodies and institutions, the much-anticipated EU–U.S. Privacy Shield finally has been approved by the European Commission, paving the way for self-certifying U.S. organizations to transfer legally EU personal data across the Atlantic.

Privacy Shield's Drama Is Far From Over

Privacy Shield's Drama Is Far From Over: Of US firms, 73% had previously been certified under Safe Harbor, but only 42% are currently certified or plan to seek certification under Privacy Shield. Most will rely on standard contractual clauses to set the rules.

Downloads - Ping Monitor

Downloads - Ping Monitor: "
EMCO Ping Monitor - Downloads"



'via Blog this'

What would a CYBERCOM-NSA split mean?

What would a CYBERCOM-NSA split mean?

http://www.c4isrnet.com/articles/what-would-a-cybercom-nsa-split-mean

Hack warnings prompt cyber 'security fatigue'

Hack warnings prompt cyber 'security fatigue'

https://news.google.com/news/amp?caurl=http%3A%2F%2Fwww.bbc.co.uk%2Fnews%2Famp%2F37573795#pt0-640939

Harbor Pilots Called to Steer Larger Ships - WSJ

So, data or docks, containers secured. Physical or digital?

http://www.wsj.com/articles/harbor-pilots-called-to-steer-larger-ships-1451072906

How overtime has made L.A.'s port pilots the city's best paid employees, averaging $450,000 a year - LA Times

More than the CISO...

http://www.latimes.com/local/california/la-me-port-pilots-overtime-20160725-snap-story.html

Saturday, October 1, 2016

Tuesday, September 27, 2016

Transcript: Here are words Trump just used to talk about 'the cyber' - The Verge

Transcript: Here are words Trump just used to talk about 'the cyber' - The Verge: "He's 10 years old. He has computers. He is so good with these computers, it's unbelievable."



'via Blog this'

Why Many Doctors Don't Say 'I'm Sorry' | ConsultantLive

Why Many Doctors Don't Say 'I'm Sorry' | ConsultantLive: "The legacy of the apology and admissibility law movement has turned out to be a raft of statutes that suggest new ways of protecting the medical establishment from its own mistakes. The unintended consequences of these seemingly well-intentioned laws are doctors who can't apologize for harming their patients even if they want to, and injured patients who've been abandoned by their caregivers."

Sunday, September 25, 2016

Tracing the hidden River Sherbourne under Coventry - BBC News

Tracing the hidden River Sherbourne under Coventry - BBC News: Crouching between a high rise estate and a busy dual carriageway, the slow-flowing river looks nondescript until it comes to a large caged concrete tunnel, thrusting under the city's ring road.

Tuesday, September 20, 2016

Marshmallow for Dell Venue 8 7840? - Android Mobile Products - Mobile Devices - Dell Community

"Nop, no, niet, nada. Not going to happen. Dell ditched the device 4 weeks ago (NO more support, NO more update, nothing!) and hence have given prove once again that you must never ever buy anything this company releases. I made that mistake twice now, I´m healed."

http://en.community.dell.com/support-forums/mobile-devices/f/4585/t/19664451?pi41117=2

Stop victim shaming in cyber attacks | TheHill

Stop victim shaming in cyber attacks | TheHill: "companies that publicly disclose that they have been the victim of a cybercrime are not treated like a typical victim by federal and state regulators"

Thursday, September 8, 2016

What was Silicon Valley like after the bubble burst in the early 2000s? - Quora

What was Silicon Valley like after the bubble burst in the early 2000s? - Quora: "The company shut its doors in March 2002; as part of the legal team handling the bankruptcy, I was one of the last 50 or so employees left standing, less than two years after joining a company of 3,000."

ESET Knowledgebase

ESET Knowledgebase



For more information about free ESET Online Scanner visit
ESET
Knowledgebase
or run it
directly from Eset.com

Thursday, September 1, 2016

Wednesday, August 31, 2016

Why you need a CSO/CISO | CIO

Why you need a CSO/CISO | CIO: "Even though we found that cybersecurity professionals, at all levels, are fully aware, and experiencing first-hand that the available talent is not keeping pace with demand needs, I was surprised by the alarmingly low number of companies that employ a CSO/CISO who is responsible for security," says Trevor Halstead, product specialist, talent services, Cybrary.

Why a CSO/CISO?

Tuesday, August 30, 2016

Under Cyber Siege: Nearly Half of Americans Report Being Victims of Scam or Fraud; Majority Say

Under Cyber Siege: Nearly Half of Americans Report Being Victims of Scam or Fraud; Majority Say: The Digital Citizens Alliance is a consumer-oriented coalition focused on educating the public and policy makers on the threats that consumers face on the Internet and the importance for Internet stakeholders

Ultimate Guide to Harvard Referencing - Cite This For Me

Ultimate Guide to Harvard Referencing - Cite This For Me: Blogs are regularly updated webpages that are generally run by an individual.

Monday, August 29, 2016

These countries are facing the greatest skills shortages | World Economic Forum

These countries are facing the greatest skills shortages | World Economic Forum: The scale of the problem varies from country to country, but is particularly bad in Japan, where 81% of firms (with 10 or more employees) have difficulty finding qualified employees, according to recent data from the OECD

Articles by Steve Morgan | CSO Online

Articles by Steve Morgan | CSO Online: The Cybersecurity Market Report is published quarterly and covers the business of cybersecurity, including global market sizing and industry forecasts from consolidated research

Thursday, August 25, 2016

Half of High School Seniors Lack Access to Computer Science -- THE Journal

Half of High School Seniors Lack Access to Computer Science -- THE Journal: Only 22 percent of 12th graders say they’ve ever taken a computer science course, according to the analysis.

Ashley Madison Blasted Over Fake Security Award

Ashley Madison Blasted Over Fake Security Award: How not to do data security

If a company’s main product is discreet sexual services, it should probably lock down its customer data good and tight.

Federal CIO: More than 10,000 Openings for Cyber Pros in the Federal Government - Nextgov.com

Federal CIO: More than 10,000 Openings for Cyber Pros in the Federal Government - Nextgov.com:

In November of 2015, federal CIO Tony Scott said he was "attempting to fill more than 10,000 estimated openings for cyber professionals in the federal government"




Reporter's Notebook: Testing Out the World's First Self-Driving Taxi

Reporter's Notebook: Testing Out the World's First Self-Driving Taxi

https://news.google.com/news/ampviewer?caurl=http%3A%2F%2Fwww.wsj.com%2Famp%2Farticles%2Freporters-notebook-testing-out-the-worlds-first-self-driving-taxi-1472125855#pt0-44718

The biggest threat facing connected autonomous vehicles is cybersecurity | TechCrunch

The biggest threat facing connected autonomous vehicles is
cybersecurity | TechCrunch

https://techcrunch.com/2016/08/25/the-biggest-threat-facing-connected-autonomous-vehicles-is-cybersecurity/

How We Can Identify Promising Candidates for Open IT Security Positions

How We Can Identify Promising Candidates for Open IT Security Positions

http://www.tripwire.com/state-of-security/risk-based-security-for-executives/connecting-security-to-the-business/how-we-can-identify-promising-candidates-for-open-it-security-positions/?utm_medium=twitter&utm_source=twitterfeed

Apple could be on the hook for $19 billion in taxes, and the Obama administration is livid

Apple could be on the hook for $19 billion in taxes, and the Obama
administration is livid

https://news.google.com/news/ampviewer?caurl=https%3A%2F%2Famp.businessinsider.com%2Fapple-taxes-us-treasury-european-commission-2016-8#pt0-992520

Wednesday, August 24, 2016

New computer science course’s challenge is finding qualified teachers to teach it | EdSource

New computer science course’s challenge is finding qualified teachers to teach it | EdSource: Expansion of a new Advanced Placement computer science course aimed at drawing young women and minorities into high-tech fields is being hampered by a nationwide shortage of teachers qualified to teach it.

Manpower says businesses face 'crippling talent shortage’ across the world

Manpower says businesses face 'crippling talent shortage’ across the world: ManpowerGroup 2015 Talent Shortage survey released��
Monday, 18 May 2015 | 11:00 AM ET|00:34
More than one-third of employers around the world are experiencing difficulty filling job positions, global employment consultancy Manpower reported on Monday.

Cybersecurity job market to suffer severe workforce shortage | CSO Online

Cybersecurity job market to suffer severe workforce shortage | CSO Online: Symantec is pursuing another option, which may spur a trend if it works. The National Association of Software and Service Companies (Nasscom), a non-profit trade association in the Indian information technology and business process outsourcing industry, and Symantec recently signed a pact to develop world class skilled and certified cyber-security professionals

Automated Cybersecurity Tools Can Aid Agencies Facing a Talent Gap | FedTech Magazine

Automated Cybersecurity Tools Can Aid Agencies Facing a Talent Gap | FedTech Magazine: ...And as part of the president’s Cybersecurity National Action Plan, the administration seeks to spend $62 million to combat cyberworkforce shortages. In terms of staffing, the federal government will cast a wider net to include candidates who know foreign languages, biology and anthropology; will emphasize critical measures such as training, scholarships and debt forgiveness; and will create a corps of cyberprofessionals to instill best practices across government.

Rockwell Automation addresses global skills shortage

Rockwell Automation addresses global skills shortage - Plant & Works Engineering: The five steps for addressing workforce availability include:

 • Improving machinery design to address ergonomics and safety risks for a more diverse workforce, including older and younger workers.

 • Building a Connected Enterprise to improve productivity and efficiency through information-enabled operations.

 • Training workers to preserve and pass on the knowledge of experienced workers, and to equip workers with the skills needed to take advantage of new technologies.

 • Leveraging vendors and suppliers to augment core competencies when specialised skills are only occasionally required or when local talent is not available.

 • Engaging the community to improve the skills and availability of young workers.

Only 1 in 60 students have access to digital learning opportunities outside of the classroom

Only 1 in 60 students have access to digital learning opportunities outside of the classroom: The latest numbers from the UK Parliament estimate that the digital skills gap currently costs the UK #63 billion a year. This number is hardly surprising when only 35% of teachers in the UK have the relevant degree to be teaching these skills. As a result, students need to turn to other sources of information to not only find out what options are available to them after they leave education, but to get to grips with the skills that they need to succeed once they do.

Half of High School Seniors Lack Access to Computer Science -- THE Journal

Half of High School Seniors Lack Access to Computer Science -- THE Journal: According to the U.S. Bureau of Labor Statistics, 3.8 million people in the United States work in computing occupations. Yet, CTEq determined last year that more than twice as many — 7.7 million Americans — said they use computers in complex ways in their jobs.

New Data: Bridging the Computer Science Access Gap | Change the Equation

New Data: Bridging the Computer Science Access Gap | Change the Equation: yet only 22 percent of U.S. 12th-graders say they have ever taken a computer programming class

Secrecy News 07/17/01

Secrecy News 07/17/01: "James Bamford has done more than any other individual to shed light on the National Security Agency and to promote public accountability of this intensely secretive organization, dating back to his landmark 1982 book The Puzzle Palace. The list of his reportorial coups to the present day is long and impressive."

Snowden’s New Lies for Old | The XX Committee

Snowden’s New Lies for Old | The XX Committee: "As I’ve said before, whether Ed was cooperating with the Russians before he reached Moscow is a debatable question, but his status with the FSB now is not actually an open matter, as everyone who understands Russian intelligence knows. Bamford believes his subject is the first Western intelligence defector to Russia ever not to cooperate with the Kremlin’s secret services, and that is his right. It is also everyone else’s right to point out this claim is ridiculous." Schindler

So you want to know about NSA … | The XX Committee

So you want to know about NSA … | The XX Committee: Bamford’s writings on NSA, which are considerable, are noted for their quantity, not quality.

Half of High School Seniors Lack Access to Computer Science -- THE Journal

Half of High School Seniors Lack Access to Computer Science -- THE Journal: More than half of high school seniors attend schools that don’t offer computer science, according to a new analysis by Change the Equation, a nonprofit organization that aims to mobilize businesses to improve STEM learning.

The Real Russian Mole Inside NSA | | Observer

The Real Russian Mole Inside NSA | | Observer

http://observer.com/2016/08/the-real-russian-mole-inside-nsa/

Tuesday, August 23, 2016

Hacking a WordPress Botnet - Wordfence

Hacking a WordPress Botnet - Wordfence: "While analyzing some of the attacks we see on the Wordfence Web Application Firewall, we discovered code that an attacker was trying to upload that was part of a botnet."



'via Blog this'

SXSW PanelPicker

SXSW PanelPicker: Imagine the consequences of a drone in the hands of a hacker.

How do I interpret data in SPSS for an independent samples T-test?

How do I interpret data in SPSS for an independent samples T-test?: "You can conclude that there is no statistically significant difference between your two conditions. You can conclude that the differences between condition Means are likely due to chance and not likely due to the IV manipulation.
 "



'via Blog this'

Sunday, August 21, 2016

NICE strategic plan lays path for training cyber workforce

NICE strategic plan lays path for training cyber workforce: “Together, as a community, we can collectively make progress to close the cybersecurity skills gap and enhance our economic and national security.”

Top US Undergraduate Computer Science Programs Skip Cybersecurity Classes

Top US Undergraduate Computer Science Programs Skip Cybersecurity Classes: An analysis of the top 121 US university computer science and engineering programs found that none of the top 10 requires students take a cybersecurity class for their degree in computer science, and three of the top 10 don’t offer any cybersecurity courses at all.

IEEE Quote on cybersecurity path - Platt

http://theinstitute.ieee.org/career-and-education/career-guidance/no-clear-path-for-prospective-cybersecurity-specialists

“This confusion causes the profession to grow less efficiently than it could,” says IEEE Senior Member Greg Shannon, chief scientist for the CERT Division at Carnegie Mellon University Software Engineering Institute, in Pittsburgh, and chair of the IEEE Cybersecurity Initiative. “People can’t say, ‘These are the credentials I need’ and ‘This is how much it is going to cost me to get them.’”


Universities aren’t doing enough to train the cyberdefenders America desperately needs - The Washington Post

Universities aren’t doing enough to train the cyberdefenders America desperately needs - The Washington Post: None of America's top 10 computer science programs -- as ranked by U.S. News & World Report in 2015 -- requires graduates to take even one cybersecurity course, according to a new analysis from security firm CloudPassage.

Report Shows Few Solutions to Filling Cyber Skills Gap | SecurityWeek.Com

Report Shows Few Solutions to Filling Cyber Skills Gap | SecurityWeek.Com: few new insights and no new solutions to the problem

Cyber security sector struggles to fill skills gap - FT.com

Cyber security sector struggles to fill skills gap - FT.com: Global demand for cyber security experts is forecast to outstrip supply by a third before the end of the decade, with companies struggling against what one senior industry figure has called the “largest human capital shortage in the world”.

The Most Serious Skill Gap Of All - Forbes

The Most Serious Skill Gap Of All - Forbes: Here is the biggest and most dangerous skills gap of all: It’s the gap between our employees’ limited or nonexistent awareness of themselves as economic units, and the reality of the world we are living in now.

Sadly truthy... http://xkcd.com/1718

Sadly truthy...

http://xkcd.com/1718

Cybersecurity Snapshot: Cyberthreats, Regulations, Workforce Issues in 2016 - ISACA Now

Cybersecurity Snapshot: Cyberthreats, Regulations, Workforce Issues in 2016 - ISACA Now: "Finding well-qualified cybersecurity professionals, however, is an ongoing, global issue. Nearly half of global organizations are planning to hire more cybersecurity personnel in 2016, and 94% say they will expect to have a difficult time finding skilled candidates."



'via Blog this'

Saturday, August 20, 2016

Consumer Attitudes Toward Data Breach Notifications and Loss of Personal Information | RAND

Consumer Attitudes Toward Data Breach Notifications and Loss of Personal Information | RAND: nationally representative survey of the consumer experience with data breaches

Report Shows Few Solutions to Filling Cyber Skills Gap | SecurityWeek.Com

http://www.securityweek.com/report-shows-few-solutions-filling-cyber-skills-gap

"Our experience shows that the lack of security managers is more severe and impactful than the lack of technology experts. Growing technical skills is important, but seeing a bigger picture of all threats or those relevant to a particular business is paramount." _ Kaspersky

Wednesday, August 17, 2016

Reimagining the Cybersecurity Profession | US News

Reimagining the Cybersecurity Profession | US News: "In reality, there are dozens of different types of cybersecurity jobs that have nothing to do with computer programming. In fact, 48 percent of the workforce in cyber risk management is comprised of women."



'via Blog this'

Charger: Omnicharge: Smart & Compact Portable Power Bank | Indiegogo | Indiegogo

Charger: Omnicharge: Smart & Compact Portable Power Bank | Indiegogo | Indiegogo: World's smallest power bank with (1) AC/DC Power Outlet and (2) USB Fast-Charging ports for charging or powering nearly any device.