Scripps reporters accused of hacking and threatened with lawsuit | Scripps News Online: The Scripps National Investigative team turned up 170,000 records containing personal data -- Social Security numbers, financial account information -- widely available online from two companies participating in the program.
When Scripps asked the companies for interviews, TerraCom and YourTel accused the journalists of hacking and violating the Computer Fraud and Abuse Act.
Just a basic blog—snagging random stuff that catches our eye—nothing else, really...
Wednesday, May 29, 2013
Saturday, May 25, 2013
Trust relations in health care—the new agenda
Trust relations in health care—the new agenda: Traditionally, patients have placed high levels of trust in health care professionals.
Friday, May 24, 2013
Scott Charney: Toward a Global Approach to Cybersecurity
Scott Charney: Toward a Global Approach to Cybersecurity: Around the globe, cybersecurity is prompting serious dialogue. The challenges are immediate and well-known, but the ingredients for more effective cybersecurity are within our grasp.
Thursday, May 23, 2013
Transborder Dataflows and Jurisdictional Issues in the Cloud - Australia
Transborder Dataflows and Jurisdictional Issues in the Cloud - Australia: Transborder data flows are a significant concern for those interested and involved in cyber-security and information privacy.
Wednesday, May 22, 2013
Superbug - Official Website | The Fatal Menace of MRSA, by Maryn McKenna
Superbug - Official Website | The Fatal Menace of MRSA, by Maryn McKenna: Every year, it kills thousands of people, sickens millions and costs billions of dollars. It affects hospitals and families, schools and prisons, children and seniors, and now, most troublingly, farms, livestock and food.
The Effects of Vitamin D Deficiency ... [Clin Appl Thromb Hemost. 2012] - PubMed - NCBI
The Effects of Vitamin D Deficiency ... [Clin Appl Thromb Hemost. 2012] - PubMed - NCBI: As a result, our study revealed a relationship between vitamin D deficiency and nonvalvular AF.
Harvard School of Public Health � The Nutrition Source � Vitamin D and Health
Harvard School of Public Health � The Nutrition Source � Vitamin D and Health:
They found that men who were deficient in vitamin D were twice as likely to have a heart attack as men who had adequate levels of vitamin D. Other studies have found that low vitamin D levels were associated with higher risk of heart failure, sudden cardiac death, stroke, overall cardiovascular disease, and cardiovascular death. (21-24)
They found that men who were deficient in vitamin D were twice as likely to have a heart attack as men who had adequate levels of vitamin D. Other studies have found that low vitamin D levels were associated with higher risk of heart failure, sudden cardiac death, stroke, overall cardiovascular disease, and cardiovascular death. (21-24)
Compare the Size of Antarctica to the Continental United States
http://archive.org/details/SVS-3540. NASA/Goddard Space Flight Center Scientific Visualization Studio. LIMA Data provided by: Patricia Vornberger (SAIC). LIMA data produced by U.S. Geological Survey (USGS), the British Antarctic Survey (BAS) and NASA. : Free Download & Streaming : Internet Archive
Monday, May 20, 2013
Validated 140-1 and 140-2 Cryptographic Modules
Validated 140-1 and 140-2 Cryptographic Modules: It is important to note that the items on this list are cryptographic modules.
Mocana: Security Evolves. Unlock Your Mobile Enterprise — Simply, Securely.
Mocana: Security Evolves. Unlock Your Mobile Enterprise — Simply, Securely.
- Support Enterprise and Government Applications
- NSA Suite B Cryptography included
- FIPS 140-2 Level 1 certifiable cryptography module
NSA Mobility Program
NSA Mobility Program: The NSA Mobility Program was established in response to the substantial and justified urgency for delivering Mobility solutions that securely provide the rich user experience of commercial technology.
NSA Suite B Cryptography - NSA/CSS
NSA Suite B Cryptography - NSA/CSS: Because of the highly complex nature of modern communications technology, it is extremely important that the federal government, industry, foreign partners, and international organizations cooperate to achieve secure interoperability. NSA has been and continues to be dedicated to providing widespread cryptographic interoperability capabilities to protect classified national security systems.
Cybersecurity Framework
Cybersecurity Framework: NIST has issued a Request for Information (RFI) in the Federal Register to gather initial information on the many interrelated considerations, challenges, and efforts needed to develop the Framework.
Saturday, May 18, 2013
Secrets in Primary Care: A Qualitative Exploration and Conceptual Model
Secrets in Primary Care: A Qualitative Exploration and Conceptual Model: Secrets and issues of confidentiality are critical concerns in doctor–patient communication and fundamental aspects of every medical encounter. Nevertheless, the nature, content, prevalence, impact, and consequences of secrets in medicine have largely been unexplored.
Wednesday, May 15, 2013
View currently open network connections - Mac OS X Hints
View currently open network connections - Mac OS X Hints: Do you *know* what ports you have open on your machine or your server? Do you know what processes are communicating with what machines on the net, and as which user? If you are curious about these things, this script might be for you!
Tuesday, May 14, 2013
Global Telemedicine Market Headed For $27 Billion - Healthcare -
Global Telemedicine Market Headed For $27 Billion - Healthcare -: A closer look at U.S. trends suggests that telemedicine market growth has been driven by the implementation of the Obama administration's Patient Protection and Affordable Care Act (PPACA)
Monday, May 13, 2013
Telehealth Resource Center
Telehealth Resource Center: Telehealth Resource Centers (TRCs) are funded by the U.S. Department of Health and Human Services’ Health Resources and Services Administration (HRSA) Office for the Advancement of Telehealth, which is part of the Office of Rural Health Policy.
Telemedicine rising in popularity along with security risks | HealthITSecurity.com
Telemedicine rising in popularity along with security risks | HealthITSecurity.com: Even though telemedicine has much to offer healthcare providers, they must think carefully when making the decision whether to incorporate it into their practices because there are security risks.
Assessments | ICS-CERT
Assessments | ICS-CERT: The Cyber Security Evaluation Tool (CSET�) is a Department of Homeland Security (DHS) product that assists organizations in protecting their key national cyber assets.
Saturday, May 11, 2013
Collection of basic Linux Firewall iptables rules
Collection of basic Linux Firewall iptables rules: "rules should serve as a template for creating more customized iptables rules to fit desired network environment."
'via Blog this'
'via Blog this'
Allow A Normal User To Run Commands As root Under Linux / UNIX Operating Systems
Allow A Normal User To Run Commands As root Under Linux / UNIX Operating Systems: "The sudo command allows users to do tasks on a Linux system as another user."
'via Blog this'
'via Blog this'
Linux Iptables Firewall Shell Script For Standalone Server
Linux Iptables Firewall Shell Script For Standalone Server: "A shell script on iptables rules for a webserver (no need to use APF or CSF) just run this script from /etc/rc.local and you are done."
'via Blog this'
'via Blog this'
Linux log files location and how do I view logs files?
Linux log files location and how do I view logs files?:
# cd /var/logs
View common log file /var/log/messages using any one of the following command:
# tail -f /var/log/messages
# less /var/log/messages
# more -f /var/log/messages
# vi /var/log/messages"
'via Blog this'
# cd /var/logs
View common log file /var/log/messages using any one of the following command:
# tail -f /var/log/messages
# less /var/log/messages
# more -f /var/log/messages
# vi /var/log/messages"
'via Blog this'
Friday, May 10, 2013
Raspberrypi Wireless Attack Toolkit / Wiki / Home
Raspberrypi Wireless Attack Toolkit / Wiki / Home: "A collection of pre-configured or automatically-configured tools that automate and ease the process of creating robust Man-in-the-middle attacks"
'via Blog this'
'via Blog this'
Thursday, May 9, 2013
NIST Updates Commonly Used I.T. Security Guidelines - HDM Latest News Article
NIST Updates Commonly Used I.T. Security Guidelines - HDM Latest News Article: "The federal government’s foundational computer security guide, also applicable to and used in the private sector, has been revised and now is available."
'via Blog this'
'via Blog this'
Monday, May 6, 2013
The takeaway from Verizon's cyber security report: Cybercrime is way too easy | Killer Apps
The takeaway from Verizon's cyber security report: Cybercrime is way too easy | Killer Apps: "Of the 621 confirmed "data breaches" (successful cyber-attacks) that Verizon's security team investigated around the world in 2012 -- in collaboration with 19 other organizations -- 99 percent were relatively unsophisticated. In fact, 78 percent of all attacks used methods requiring low or "very low" computer skills to gain entry to a target's networks. This means that "the average [computer] user could have done it" or that attackers downloaded hacking tools from the web."
'via Blog this'
'via Blog this'
IRS money lost to fraudulent returns likely gone for good | Tampa Bay Times
IRS money lost to fraudulent returns likely gone for good | Tampa Bay Times: "The Treasury Inspector General for Tax Administration puts the national loss to the IRS and Treasury at $5 billion a year, with much of the action in Tampa."
'via Blog this'
'via Blog this'
Sunday, May 5, 2013
Saturday, May 4, 2013
Friday, May 3, 2013
Unix - The vi Editor Tutorial
Unix - The vi Editor Tutorial: Hint: If you are not sure which mode you are in, press the Esc key twice, and then you'll be in command mode. You open a file using vi editor and start type some characters and then come in command mode to understand the difference.
Wednesday, May 1, 2013
DDoS attacks on Banks ongoing
DDoS Attacks on Banks: No Break In Sight - BankInfoSecurity:
Hacktivists' attacks on U.S. banking institutions are now in the eighth
week of their third phase, making this phase, which launched March 5,
the longest since Izz ad-Din al-Qassam Cyber Fighters waged its first
campaign last year.
Subscribe to:
Posts (Atom)