Thursday, June 30, 2016

Cybersecurity and privacy | Digital Single Market

Cybersecurity and privacy | Digital Single Market: "trust and security are at the core of the Digital Single Market Strategy, launched in 2015, while the fight against cybercrime is one of the three pillars of the European Agenda on Security."

Wednesday, June 29, 2016

wsRadio.com | 06/24/16 Cyber Boot Camp Report - wsRadio.com

wsRadio.com | 06/24/16 Cyber Boot Camp Report - wsRadio.com: Drew is joined by a team, live from the Cyber Boot Camp.

Mobile ransomware use jumps, blocking access to phones | Network World

Mobile ransomware use jumps, blocking access to phones | Network World: "Kaspersky customers in Germany, Canada, the U.K. and the U.S., in that order, were the top four countries affected by mobile ransomware."



'via Blog this'

The EU’s fight against cybercrime continues – attacks against information systems

"The EU’s fight against cybercrime continues – attacks against information systems | Herbert Smith Freehills – FSR notes: Today is the deadline for transposition into national law of the Directive on attacks against information systems (the “Directive“), which came into force on 24 August 2013. This Directive forms part of the EU’s continuing efforts to keep pace in its fight against the ever evolving nature of cybercrime, and in particular, the increasingly sophisticated and large-scale forms of attack against information systems. It updated (and replaced) minimum rules, established by the Council Framework Decision 2005/222/JHA (the “Framework Decision”), relating to the definition of relevant criminal offences and sanctions across Member States and the improved cooperation between competent authorities."

Friday, June 24, 2016

Don’t Let Cybercriminals Hide from the FBI

"The rest of the security world calls the NIT "malicious code" ("malcode" for short) and deploying it "hacking," because the software exploits a vulnerability in the target's computer, the same way a criminal would."

http://www.govtech.com/opinion/Dont-Let-Cybercriminals-Hide-from-the-FBI.html

Thursday, June 23, 2016

Work and Personality: Use of the NEO-PI-R

Work and Personality: Use of the NEO-PI-R in Industrial/Organisational
Psychology - Costa - 2008 - Applied Psychology - Wiley Online Library

http://onlinelibrary.wiley.com/doi/10.1111/j.1464-0597.1996.tb00766.x/abstract

Wednesday, June 22, 2016

Chapter 1: Section 1: Introduction To Personality Theory And Development | AllPsych

"A trait is a relatively permanent individual characteristic.  For example, most of know people who are outgoing, friendly, confident, or shy.  When we describe these people, we use these traits to better understand their personality; to better understand who they are.  A state, on the other hand, is a temporary change in one's personality.  Examples of states might be angry, depressed, fearful, or anxious.  We typically use states to describe a person's reaction to something."

http://allpsych.com/personalitysynopsis/intro/

Monday, June 20, 2016

Sync NI - Technology News, Business News in Belfast and Northern Ireland - The Evolution of Cloud

Sync NI - Technology News, Business News in Belfast and Northern Ireland - The Evolution of Cloud: 1990 British researcher, Tim Berners-Lee develops a new technique for distributing information on the internet, Hyper Text Markup Language, or HTML, which was eventually called the World Wide Web.

Sunday, June 19, 2016

More Companies Opt to Sit Out Trump’s Coronation in Cleveland - Bloomberg Politics

More Companies Opt to Sit Out Trump's Coronation in Cleveland -
Bloomberg Politics

http://www.bloomberg.com/politics/articles/2016-06-16/more-companies-opt-to-sit-out-trump-s-coronation-in-cleveland

Six Answers to Trump's Question About 'What's Going On' With Muslims - The Atlantic

Six Answers to Trump's Question About 'What's Going On' With Muslims -
The Atlantic

http://www.theatlantic.com/international/archive/2016/06/trump-muslims-ban-orlando/486950/?utm_source=atltw

IEEE Xplore Abstract - Neural Markers of Cybersecurity: An fMRI Study of Phishing, and Malware Warnings

IEEE Xplore Abstract - Neural Markers of Cybersecurity: An fMRI Study of Phishing, and Malware Warnings: "The security of computer systems often relies upon decisions and actions of end users. In this paper, we set out to investigate users’ susceptibility to cybercriminal attacks by concentrating at the most fundamental component governing user behavior – the human brain."

METAPHOR AND WAR: THE METAPHOR SYSTEM USED TO JUSTIFY WAR IN THE GULF on JSTOR

Key document in war as crime argument...

http://www.jstor.org/stable/23609916?seq=1#page_scan_tab_contents

war as crime - Google Scholar

Interesting set of results...

https://scholar.google.com/scholar?hl=en&q=war+as+crime&btnG=&as_sdt=1%2C5&as_sdtp=

Annual Cyberjutsu Awards Nominations - Women's Society of Cyberjutsu

Annual Cyberjutsu Awards Nominations - Women's Society of Cyberjutsu

http://womenscyberjutsu.org/page/AWARDS16

Friday, June 17, 2016

Thursday, June 16, 2016

Monday, June 13, 2016

HIPAA Gotcha Questions for Business Associates

HIPAA Gotcha Questions for Business Associates: "Getting a letter or email from an auditor, business partner or client requesting a written copy of your latest HIPAA risk assessment, policies and procedures, and documented staff training would qualify as an unexpected disconcerting challenge. Based on history many business associates can expect this in the near future."

Orlando nightclub shooting: Talking gun control at a shooting range - BBC News

Orlando nightclub shooting: Talking gun control at a shooting range - BBC News

http://www.bbc.com/news/world-us-canada-36514354

Try VMware Workstation Player. Deliver a virtual desktop to your employees. | United States

Try VMware Workstation Player. Deliver a virtual desktop to your employees. | United States: VMware Workstation 12 Player provides a streamlined user interface for creating, running, and evaluating operating systems and applications in a virtual machine regardless of the operating system.

Healthcare Compliance Gotchas - InformationWeek

Healthcare Compliance Gotchas - InformationWeek: Doing the basics to comply with HIPAA and PCI isn’t always sufficient to keep data safe.

Five Gray Areas of HIPAA You Can’t Ignore | EMR and HIPAA

Five Gray Areas of HIPAA You Can’t Ignore | EMR and HIPAA: Unfortunately many organizations are practicing the “ignorance is bliss” approach to HIPAA compliance.

HIPAA Happenings -- The New HITECH Act Megarule

HIPAA Happenings -- The New HITECH Act Megarule: OCR still recognizes that there are situations where an unauthorized use, disclosure, access, or acquisition is very inconsequential and may not warrant notification.

Timeline of Important Events in the History of HIPAA - HIPAA Journal

Timeline of Important Events in the History of HIPAA - HIPAA Journal: The legislation was originally introduced during Bill Clinton’s tenure as president, and was originally intended to improve the portability and accountability of health insurance coverage.

Why Healthcare Ransomware Attacks Are HIPAA Data Breaches

Why Healthcare Ransomware Attacks Are HIPAA Data Breaches: Ransomware attacks need to be disclosed as unauthorized exposures of private information because they are every bit as dangerous as the outright theft of the laptop, desktop, or server that they infect.

Is Ransomware Considered A HIPAA Breach? |

Is Ransomware Considered A HIPAA Breach? |: Keep in mind that when HIPAA regulations were written no one was thinking about ransomware. In fact, the iPhone had not even been invented when the HIPAA Security Rule was published (yep HIPAA is that old!)

Is Ransomware Considered A Health Data Breach Under HIPAA? - Forbes

Is Ransomware Considered A Health Data Breach Under HIPAA? - Forbes: The fact is, ransomware does represent a new legal ambiguity to the federal legislation known as HIPAA, which was designed to protect patients against the loss, theft or breach of their protected health information (PHI).

Few Consequences For HIPAA Health Privacy Law's Repeat Offenders - ProPublica

Few Consequences For HIPAA Health Privacy Law's Repeat Offenders - ProPublica: Regulators have logged dozens, even hundreds, of complaints against some health providers for violating federal patient privacy law. Warnings are doled out privately, but sanctions are imposed only rarely. Companies say they take privacy seriously.

You can't do that in healthcare: 5 tips on staying true to HIPAA | Healthcare Dive

You can't do that in healthcare: 5 tips on staying true to HIPAA | Healthcare Dive: HIPAA makes it ethically difficult for physicians to respond to online reviews, even those that are specious or untrue.

Upset About Their Bad Yelp Reviews, Your Health Providers Are Spilling Patient Secrets — Pacific Standard

Upset About Their Bad Yelp Reviews, Your Health Providers Are Spilling Patient Secrets — Pacific Standard: Burned by negative reviews, some health providers are casting their patients’ privacy aside and sharing intimate details online as they try to rebut criticism.

Saturday, June 11, 2016

Legacy Chromebooks To Stop Receiving Updates Soon | Androidheadlines.com

I must be reading this wrong...

http://www.androidheadlines.com/2016/06/legacy-chromebooks-stop-receiving-updates-soon.html

'Minnesota Men' on Trial

"Nur had commissioned him to kill 16 Americans supposedly responsible for airstrikes on ISIS in Kobane, Syria. ISIS had come up with the names and addresses of the pilots by hacking a military database. Omar complained this information was too "hot": He had accidentally clicked on the link to the names and addresses, making it possible for law enforcement to track him."

http://www.weeklystandard.com/minnesota-men-on-trial/article/2002781

Cyber risk as systemic risk | VOX, CEPR’s Policy Portal

Cyber risk as systemic risk | VOX, CEPR's Policy Portal

"The root cause of systemic crises is risk-taking behaviour of economic"

http://voxeu.org/article/cyber-risk-systemic-risk

10 ways law firms can make life difficult for hackers | Network World

10 ways law firms can make life difficult for hackers | Network World: "The Wall Street Journal reported recently that hackers broke into the networks of two of the nation’s most prestigious firms, Cravath Swaine & Moore and Weil Gotshal & Manges, in 2015. "



'via Blog this'

HIE Dispute with Vendor Spotlights Critical Security Issues

HIE Dispute with Vendor Spotlights Critical Security Issues: "A HIPAA-related legal dispute between a Chicago-area health information exchange organization and its key IT vendor, which is going out of business, spotlights several important privacy and security issues."



'via Blog this'

Thursday, June 9, 2016

Search Results | NBC 7 San Diego

Local news...

http://www.nbcsandiego.com/results/?keywords=%22Candice+Nguyen%22&byline=y&sort=date


From My iPhone

In Response...

In Response...: "A responsive HTML/CSS website template" that I quite like.

'via Blog this'

NYTimes: There Are More White Voters Than People Think. That’s Good News for Trump.

NYTimes: There Are More White Voters Than People Think. That's Good
News for Trump.

http://www.nytimes.com/2016/06/10/upshot/there-are-more-white-voters-than-people-think-thats-good-news-for-trump.html?smprod=nytcore-iphone&smid=nytcore-iphone-share

Your free anti-virus software is in jeopardy | Komando.com

Your free anti-virus software is in jeopardy | Komando.com

http://www.komando.com/happening-now/358642/your-free-anti-virus-software-is-in-jeopardy


From My iPhone

Psychological tests & quizzes — WordPress Plugins

Psychological tests & quizzes — WordPress Plugins: Create psychological tests/quizzes with scales connected with results through simple formulas like "extraversion > 50%"

Norms for the Big Five Inventory and other personality measures – The Hardest Science

Norms for the Big Five Inventory and other personality measures – The Hardest Science: For published scales that give normed scores, it often turns out to mean the 70th percentile of the distribution of people who somehow made it into the scale author’s convenience sample 20 years ago.

Calculating Scale Scores for Psychological Tests

Calculating Scale Scores for Psychological Tests: This post discusses how to calculate scale scores for multi-item scales.

Free Career Test Based on Holland Codes

RIASEC Occupational Interest Inventory

http://www.truity.com/test/holland-code-career-test

Tuesday, June 7, 2016

Upset About Their Bad Yelp Reviews, Your Health Providers Are Spilling Patient Secrets — Pacific Standard

Upset About Their Bad Yelp Reviews, Your Health Providers Are Spilling Patient Secrets — Pacific Standard: But in trying to respond to critical ones, some doctors, dentists, and chiropractors appear to be violating the federal patient privacy law known as HIPAA.

Can Rambus Hack Auto Cyber-Security? | EE Times

Can Rambus Hack Auto Cyber-Security? | EE Times

http://www.eetimes.com/document.asp?doc_id=1329834

Psychological tests & quizzes — WordPress Plugins

Pretty amazing!

https://wordpress.org/plugins/wp-testing/screenshots/

Take a personality test

"this website provides a collection of interactive personality tests with detailed results that can be taken for personal entertainment or to learn more about personality assessment"

http://personality-testing.info/

Research Background and Frequently Asked Questions on the Big Five

Personality research, like any science, relies on quantifiable concrete data which can be used to examine what people are like. This is where the Big Five plays an important role.

http://www.outofservice.com/bigfive/info/

Handy tools

Website check:
https://sitecheck.sucuri.net//

Parasites:
http://www.unmaskparasites.com/

VirusTotal:
https://www.virustotal.com/

Malware:
http://quttera.com/website-malware-scanner#

IP check:
http://mxtoolbox.com/blacklists.aspx

Shipowners are unprepared for cyber risks

Shipowners are unprepared for cyber risks...no surprise there then.

http://www.marinemec.com/news/view,shipowners-are-unprepared-for-cyber-risks_43195.htm

Monday, June 6, 2016

Upset About Their Bad Yelp Reviews, Your Health Providers Are Spilling Patient Secrets — Pacific Standard

Upset About Their Bad Yelp Reviews, Your Health Providers Are Spilling Patient Secrets — Pacific Standard: "n trying to respond to critical ones, some doctors, dentists, and chiropractors appear to be violating the federal patient privacy law known as HIPAA"



'via Blog this'

Single Group Correlational Study: Basic Analyses

Single Group Correlational Study: Basic Analyses: This post sets a basic procedure for analysing a single group observational study in psychology. It aims to provide a starting point, particularly for researchers who do analyse data infrequently.

Protecting Corporate Data... When an Employee Leaves

Protecting Corporate Data... When an Employee Leaves: When someone leaves the company, the HR department is quick to grab the employee’s laptop. But what about the data on other equipment?

Why Ex-Employees Might Just Be Your Company's Biggest Threat - Forbes

Why Ex-Employees Might Just Be Your Company's Biggest Threat - Forbes: “The exploitation of business networks and servers by disgruntled and/or former employees has resulted in several significant FBI investigations,” the FBI said, “in which individuals used their access to destroy data, steal proprietary software, obtain customer information, purchase unauthorized goods and services using customer accounts, and gain a competitive edge at a new company.”

A Third of Ex-Employees Accessing Company Data - Enterprise Network Security Blog from ISDecisions

A Third of Ex-Employees Accessing Company Data - Enterprise Network Security Blog from ISDecisions: Our latest research which surveyed 2,000 desk-based workers in the UK and US reveals at least one in three ex-employees are left with access to systems or data after leaving a company.

Thursday, June 2, 2016

wsRadio.com | 05/27/16 Mayor's Cyber Cup Winners Take on The Cyber Boot Camp - wsRadio.com

wsRadio.com | 05/27/16 Mayor's Cyber Cup Winners Take on The Cyber Boot Camp - wsRadio.com: Stephen Cobb, Sr. Researcher, ESET North America Liz Fraumann, Executive Director, Securing our eCity Foundation provide the details about the upcoming Cyber Boot Camp.

Recalls Look-up by VIN (Vehicle Identification Number)

Recalls Look-up by VIN (Vehicle Identification Number): NHTSA's new search tool lets you enter a Vehicle Identification Number (VIN) to quickly learn if a specific vehicle has not been repaired as part of a safety recall in the last 15 years.

With Remote Hacking, the Government’s Particularity Problem Isn’t Going Away | Just Security

With Remote Hacking, the Government's Particularity Problem Isn't
Going Away | Just Security

https://www.justsecurity.org/31365/remote-hacking-governments-particularity-problem-isnt/

Wednesday, June 1, 2016

Out-of-Box Exploitation: A Security Analysis of OEM Updaters: Blog: Duo Security

Out-of-Box Exploitation: A Security Analysis of OEM Updaters: Blog: Duo Security: "Today, Duo Labs is publishing our take on the OOBE; Out-of-Box Exploitation: A Security Analysis of OEM Updaters."



'via Blog this'

How Kristen Bell Is Destigmatizing Depression | E! Online Mobile

Share....

http://m.eonline.com/news/769272/how-kristen-bell-is-destigmatizing-depression

Five tests for a theory of the crime drop - Springer

Five tests for a theory of the crime drop - Springer: "It finds that fourteen of the fifteen hypotheses fail two or more tests. The security hypothesis appears to pass the tests, and thereby pave the way for further research."



'via Blog this'

State CIOs struggle with cybersecurity, cloud computing amid rampant workforce changes, report finds | Healthcare IT News

"State governments face persistent challenges in cybersecurity risk reduction because of four key issues: inadequate strategic direction and organizational structure, constrained security budgets, increasing the sophistication of the threats, and lack of cybersecurity professionals."

http://www.healthcareitnews.com/news/state-cios-struggle-cybersecurity-cloud-computing-amid-rampant-workforce-changes-report-finds

The EU General Data Protection Regulation : : Privacy & Information Security Law Blog

The EU General Data Protection Regulation : : Privacy & Information Security Law Blog: Right to Erasure. Subject to certain exceptions, individuals will be able to request the erasure of their personal data without undue delay.