Thursday, November 30, 2017

More Industrial Products at Risk of KRACK Attacks | SecurityWeek.Com

More Industrial Products at Risk of KRACK Attacks | SecurityWeek.Com: Siemens said the KRACK vulnerabilities affect some of its SCALANCE, SIMATIC, RUGGEDCOM, and SINAMICS products. The company is working on releasing updates that will address the security holes and, in the meantime, it has provided some mitigations.

Opioid Use for Osteoarthritis Is Prevalent | Rheumatology Network

Opioid Use for Osteoarthritis Is Prevalent | Rheumatology Network: The highest rate of opioid use, at 40%, was found in patients who had spine osteoarthritis.

Tuesday, November 28, 2017

Threat Predictions for Industrial Security in 2018 - Securelist

Threat Predictions for Industrial Security in 2018 - Securelist: 2017 was one of the most intense in terms of incidents affecting the information security of industrial systems.

Don’t get lost in translation, use SurveyMonkey Audience in 16 languages

Don’t get lost in translation, use SurveyMonkey Audience in 16 languages | Curiosity at Work: SurveyMonkey Audience, the easiest DIY market research solution, has just amplified your ability to make an authentic connection with consumers around the world.

Watch thieves clone a Mercedes key from outside the owner’s house, stealing his car in seconds

ROCA 'round the lock: Gemalto says IDPrime .NET access cards bitten by TPM RSA key gremlin • The Register

TPM update - Infineon Technologies

Information on TPM firmware update for Microsoft Windows systems as announced on Microsoft`s patchday on October 10th 2017

https://www.infineon.com/cms/en/product/promopages/tpm-update/?redirId=59160

Infineon Trusted Platform Module (TPM) Vulnerability (CVE-2017-15361) : Impact Status on Dell Products | Dell US

ROCA: BLAMING INFINEON IS THE EASY WAY OUT

timestamping a legally binding digital signature is not yet mandatory,

https://www.rsa.com/en-us/blog/2017-10/roca-blaming-infineon-is-the-easy-way-out

Vulnerability in TPM could allow Security Feature Bypass

"After the applicable Windows update is applied, the system will generate Event ID 1794 in the Event Viewer after each reboot under Windows Logs - System when vulnerable firmware is identified."



'via Blog this'

Monday, November 27, 2017

FSE 2018

FSE 2018: Fast Software Encryption 2018 will take place in Bruges, Belgium in March 5-7 2018. FSE 2018 is organized by COSIC at KU Leuven in collaboration with the International Association for Cryptologic Research (IACR).

The Official Cybersecurity Conferences 2018 Directory: USA, UK, India

The Official Cybersecurity Conferences 2018 Directory: USA, UK, India: Welcome to the InfoSec Community's favorite Cybersecurity Conference Directory! We list every major global IT Security Event taking place in 2018.

Observatory by Mozilla

Observatory by Mozilla: Observatory by Mozilla has helped over 80,000 websites by teaching developers, system administrators, and security professionals how configure their sites safely and securely.

Thursday, November 23, 2017

Convivio Society for Italian Humanities - Promoting Italian arts, culture, and heritage in San Diego

Convivio Society for Italian Humanities - Promoting Italian arts, culture, and heritage in San Diego:



'via Blog this'

Averting the Software Apocalypse

Averting the Software Apocalypse: "But risks tend to shift somewhere else, not go away. Everything as a service implies the risk of single points of failure of a magnitude that we might not fully comprehend until there is a sustained outage with significant loss of services and data."



'via Blog this'

The Coming Software Apocalypse - The Atlantic

The Coming Software Apocalypse - The Atlantic: "It’s been said that software is “eating the world.” More and more, critical systems that were once controlled mechanically, or by people, are coming to depend on code."



'via Blog this'

Wednesday, November 22, 2017

Oh $#! : Your website got hacked—now what!?

Oh $#! : Your website got hacked—now what!?: After the initial panic subsides, your mind starts racing and you find yourself asking the question, “What do I (or my IT folks), need to do to get our site back online?” Read on for more…

EU to Declare Cyber-Attacks “Act of War”. USA likely to follow

EU to Declare Cyber-Attacks “Act of War”. USA likely to follow: The framework on a joint EU diplomatic response to malicious cyber activities would seem to raise the stakes significantly on state-sponsored attacks, especially those focused on critical infrastructure.

Sunday, November 19, 2017

Closing the Cybersecurity Skills Gap With a New Collar Approach

Closing the Cybersecurity Skills Gap With a New Collar Approach: "the well-documented skills shortage in cybersecurity, which is expected to reach 1.5 million unfilled positions by 2020. Closing that gap is daunting, and requires us to find and nurture different types of talent in new ways."



'via Blog this'

It’s time to think differently about cyber security. Here’s how | World Economic Forum

It’s time to think differently about cyber security. Here’s how | World Economic Forum: "The only effective response to this level of cyber attack is a major step up in cyber security to give us national-level insight and oversight that will work closely with industry and government. Those of us with national responsibilities, the leaders of nationally-important businesses, and major institutions, need to unite to fight. We need to lead a defence strategy against this cyber warfare at a national level, bringing the best minds and tools together to protect assets."



'via Blog this'

Resources Courtesy of Regina Lundgren, Writer, Consultant, and Trainer

Resources Courtesy of Regina Lundgren, Writer, Consultant, and Trainer: "For Risk Communication, Public Involvement, and Science and Strategic Communication"



'via Blog this'

Regina Lundgren, Why People Don't Respond

Regina Lundgren, Why People Don't Respond: "You've crafted the perfect message, designed to get people to take notice and take action, safeguarding lives and protecting the environment. Only, that's not what happens. Why?"



'via Blog this'

Art. 17 GDPR – Right to erasure (‘right to be forgotten’) | General Data Protection Regulation (GDPR)

Art. 17 GDPR – Right to erasure (‘right to be forgotten’) | General Data Protection Regulation (GDPR): "The data subject shall have the right to obtain from the controller the erasure of personal data concerning him or her without undue delay and the controller shall have the obligation to erase personal data without undue delay where one of the following grounds applies:"



'via Blog this'

A Board Member's Top Five Recommendations For Cybersecurity And Risk Management

A Board Member's Top Five Recommendations For Cybersecurity And Risk Management: "top five recommendations for boards to consider in their oversight roles are (1) Double down, or triple down, on the basics; (2) establish a cybersecurity risk policy with clear risk appetite statements; (3) ask for an effective risk report with qualitative assessments and quantitative analytics; (4) provide credible challenge and oversight of the cybersecurity program; and (5) focus on people and culture. "



'via Blog this'

Facts Don't Win Fights: Here’s How to Cut Through Confirmation Bias | Big Think

Facts Don't Win Fights: Here’s How to Cut Through Confirmation Bias | Big Think: "brain imaging and psychological studies are showing that, society wide, we may be on the wrong path by holding evidence up as an Ace card"



'via Blog this'

TP-LINK Archer VR400 Wireless Modem Router - AC 1200, Dual-band | Free Delivery | Currys

Duramax Building Products Sidemate 4 ft. x 8 ft. Vinyl Shed

Duramax Building Products Sidemate 4 ft. x 8 ft. Vinyl Shed with Foundation-06625 - The Home Depot
https://www.homedepot.com/p/Duramax-Building-Products-Sidemate-4-ft-x-8-ft-Vinyl-Shed-with-Foundation-06625/203532803

Tali Sharot - Wikipedia

Tali Sharot: Principal Investigator | Affective Brain Lab

Tuesday, November 14, 2017

Research Shows ‘White Male Effect’ Can Impact Risk Communications - ISACA Now

Research Shows ‘White Male Effect’ Can Impact Risk Communications - ISACA Now: I encourage you to read Dan Kahan’s articles on this at CulturalCognition.net, and hope to see more people studying why the advice of information security experts is not universally embraced.

Amazon.com: CUJO Smart Internet Security Firewall

Amazon.com: CUJO Smart Internet Security Firewall with FREE SUBSCRIPTION (2nd Gen.) - Protects Your Network from Viruses and Hacking/ For Home & Business/ Plug Into Your Router: Computers & Accessories: CUJO Protects Your Network from Viruses and Hacking/ For Home & Business/ Plug Into Your Router

IEEE-SA - IEEE Anti-Malware Support Service (AMSS)

IEEE-SA - IEEE Anti-Malware Support Service (AMSS): CMX provides real-time access to information related to clean software files, even prior to the publication of the corresponding software. This can help reduce the number of false positives detected by anti-virus software when more aggressively searching for malware.

How to Opt Out of Equifax Revealing Your Salary History — Krebs on Security

Sunday, November 5, 2017

Why International Cybercrime Is Going To Keep Getting Worse

Why International Cybercrime Is Going To Keep Getting Worse: "The obsessive focus of the leading world governments on cyber offense has produced or inspired a rapidly growing number of highly sophisticated malware that can infect practically any system–from disabling nuclear centrifuges to turning people’s iPhones into all-room listening devices. The best such hacks exploit vulnerabilities unknown even to the makers of the software, known as “zero-day exploits,” are available on the black market."



'via Blog this'

Resources: Center for Risk Management

Resources: Center for Risk Management: "Much of the material presented in this document has been sourced from workshops presented by Dr. Vincent T. Covello, Director of the Center for Risk Communication, New York, N.Y"



'via Blog this'

Reports > Strategic Plan for Risk Communication

Reports > Strategic Plan for Risk Communication: "First, FDA has a long-standing commitment to being science-based and science-led, a commitment that also includes risk communication activities. FDA fully supports using scientific methods to design and assess communications that will ensure maximum effectiveness. The science of risk communication and previous work in this area demonstrate important ground rules.8 For example, it is crucial that the information in a document be both cognitively accessible9 and relevant to the target audience."



'via Blog this'