Thursday, June 27, 2013

NSA spying could mean U.S. tech companies lose international business - CSO Online - Security and Risk

NSA spying could mean U.S. tech companies lose international business - CSO Online - Security and Risk: According to a number of security experts, the U.S. surveillance state —exposed more officially than ever before by former NSA consultant Edward Snowden — will likely undercut the U.S.'s role and influence in Internet governance.

New leak shows NSA harvests To, From, and BCC lines of e-mail data | Ars Technica

New leak shows NSA harvests To, From, and BCC lines of e-mail data | Ars Technica: The Guardian has reported on a new leaked document which reveals that from 2001 until 2011 the US government was collecting e-mail metadata en masse from Internet providers.

Facebook Virus: Hackers Exploiting Facebook API To Send Malware To NFL, NBA And Real Madrid FC Fans

Facebook Virus: Hackers Exploiting Facebook API To Send Malware To NFL, NBA And Real Madrid FC Fans: Cybercriminals are exploiting the Facebook API, the interface that allows developers to create apps for Facebook, to spread malicious links to groups all over the social network,

R v Oliver (2002) The Times 6 Dec 2002

R v Oliver (2002) The Times 6 Dec 2002: the two primary factors determinative of the seriousness of a particular offence were the nature of the indecent material and the extent of the offender's involvement in it.

Saturday, June 22, 2013

NSA Whistleblower: NSA Spying On – and Blackmailing – Top Government Officials and Military Officers | Washington's Blog

NSA Whistleblower: NSA Spying On – and Blackmailing – Top Government Officials and Military Officers | Washington's Blog: One of the judges is now sitting on the Supreme Court that I had his wiretap information in my hand.

KAYAK Search Results

KAYAK Search Results

http://www.kayak.com/flights/san,nearby-BCN,nearby/2013-09-26/BCN,nearby-TXL,nearby/2013-10-02/TXL,nearby-NYC,nearby/2013-10-04-evening/NYC,nearby-SAN,nearby/2013-10-07-morning

Hall of Shame/RipOffReport.com and Ed Magedson

The People's Credit Bureau™ - Hall of Shame/RipOffReport.com and Ed Magedson: RipOff Report appears to have been created for purely a money-making scam that has left numerous businesses and individuals tarnished with an unjustified damaged reputation that is completely without merit.

Friday, June 21, 2013

KB Parallels: How to migrate Windows PC to Parallels Desktop 8 Virtual Machine?

KB Parallels: How to migrate Windows PC to Parallels Desktop 8 Virtual Machine?: Download Parallels Transporter Agent for Windows from the Parallels website at http://www.parallels.com/download/desktop/ and double-click the installation file.

Thursday, June 20, 2013

MRT/MR-B - The 73129 - The Locomotive (Standard Five Fund)

MRT/MR-B - The 73129 - The Locomotive (Standard Five Fund): The former British Railway Standard Class 5MT 4-6-0 locomotive no. 73129, now based at the Midland Railway at Butterley, is the sole survivor of the last batch of 30 steam locomotives to be built at Derby Locomotive Works and is unique in being the only preserved Standard Class 5 fitted with Caprotti Valve Gear

Sunday, June 16, 2013

InfoSec Institute Resources – Cyber Kill Chain is a Great Idea, But is It Something Your Company Can Implement?

http://resources.infosecinstitute.com/cyber-kill-chain-is-a-great-idea-but-is-it-something-your-company-can-implement/


From My iPhone

Blame for medical data breaches often rests outside physician office - amednews.com

Blame for medical data breaches often rests outside physician office - amednews.com: Therefore, practices need to be more vigilant in assessing their contractors' ability to handle the data properly, experts say.

Breaches Affecting 500 or More Individuals

Breaches Affecting 500 or More Individuals: These breaches are now posted in a new, more accessible format that allows users to search and sort the posted breaches.

Former Fort Collins Resident Sentenced for Denial of Service Attack on Larimer County Government Computers

Former Fort Collins Resident Sentenced for Denial of Service Attack on Larimer County Government Computers: David Joseph Rezendes, aka Joseph David Rezendes, aka Joe Rezendes, age 27, was sentenced Tuesday by United States District Court Judge R Brooke Jackson to serve 18 months in federal prison for intentionally damaging a protected computer

SMB Security

SMB Security: Small businesses are an increasingly good target for hackers.

Private Retaliation in Cyberspace | Center for Strategic and International Studies

Private Retaliation in Cyberspace | Center for Strategic and International Studies: states are responsible for the actions of those resident on their territory and must take action against cybercrime.

Responding to IT Security Incidents

Responding to IT Security Incidents: Proper incident response should be an integral part of your overall security policy and risk mitigation strategy.

What US cybersecurity needs: a few more good guys - CSMonitor.com

What US cybersecurity needs: a few more good guys - CSMonitor.com: “There are about 1,000 security people in the US who have the specialized security skills to operate at world-class levels in cyberspace – we need 10,000 to 30,000,” Jim Gosler, director of the CIA’s Clandestine Information Technol–ogy Office, told CSIS in its report last year.

Thursday, June 13, 2013

Blue Coat Systems to acquire security analytics firm Solera Networks | PCWorld

Blue Coat Systems to acquire security analytics firm Solera Networks | PCWorld: According to Blue Coat Systems CEO Greg Clark, the ability to efficiently mine a large dataset of network history in order to react and resolve security issues in real time is an essential component of the modern security architecture.

4 Reviews for Dr. Julie L. Barone | Surgery in San Diego, CA

4 Reviews for Dr. Julie L. Barone | Surgery in San Diego, CA: I have the highest regard, admiration and respect for Dr. Julie. Such a positive attitude when you're going through a very rough time.

4 Reviews for Dr. Julie L. Barone | Surgery in San Diego, CA

4 Reviews for Dr. Julie L. Barone | Surgery in San Diego, CA: I have the highest regard, admiration and respect for Dr. Julie. Such a positive attitude when you're going through a very rough time.

12 Reviews for Dr. Allan Gamagami | Surgery in San Diego, CA

12 Reviews for Dr. Allan Gamagami | Surgery in San Diego, CA: He really needs to check his attitude and sense of entitlement at the door, and realize that he is here for the patient. I

PRISM: Here's how the NSA wiretapped the Internet | Page 2 | ZDNet

PRISM: Here's how the NSA wiretapped the Internet | Page 2 | ZDNet: But if the NSA were intercepting traffic and decrypting it somehow on the edge connection between the application service provider — such as Facebook, Gmail, Amazon, for example — and the Tier 1 network, the application service provider would be unaware that this was happening.

Over Half Of Big Data & Cloud Projects Stall Because Of Security

Over Half Of Big Data & Cloud Projects Stall Because Of Security: 76% of senior-level IT and security respondents said the inability to secure data across big data initiatives gave them cause for concern. The study[i] further showed that more than half (56%) admitted that these security concerns have kept them from starting or finishing cloud or big data projects.

Wednesday, June 12, 2013

Dell Quest Releases Big Data Security Solutions | SiliconANGLE

Dell Quest Releases Big Data Security Solutions | SiliconANGLE: "52 percent of organizations saw their unstructured data volumes increase by at least 25 percent in the past year, but only 45 are taking the appropriate measures to secure their sensitive information. "

'via Blog this'

Sunday, June 9, 2013

Wickr - Leave No Trace

Wickr - Leave No Trace: "Wickr has hundreds of thousands of downloads in over 113 countries. Celebrities, royalty, reporters, feds, lawyers, doctors, investors and teens are the early adopters."

'via Blog this'

Saturday, June 8, 2013

Former Fort Collins Resident Sentenced for Denial of Service Attack on Larimer County Government Computers

Former Fort Collins Resident Sentenced for Denial of Service Attack on Larimer County Government Computers: “Rezendes attacked the Larimer County computer system because he was angry about a traffic ticket,” said United States Attorney John Walsh. “His denial of service attack impacted thousands of people for several days.

Friday, June 7, 2013

Ponemon Institute Study Finds that Outdated Communication Technologies Cost U.S. Hospitals More than $8.3 Billion Annually | Imprivata

Ponemon Institute Study Finds that Outdated Communication Technologies Cost U.S. Hospitals More than $8.3 Billion Annually | Imprivata: A new study released today by the Ponemon Institute finds that the use of pagers and other outdated communication technologies decreases clinician productivity and increases patient discharge times, collectively costing U.S. hospitals more than $8.3 billion annually.

Breaches Affecting 500 or More Individuals

Breaches Affecting 500 or More Individuals: As required by section 13402(e)(4) of the HITECH Act, the Secretary must post a list of breaches of unsecured protected health information affecting 500 or more individuals.

Wednesday, June 5, 2013

Dolce Desk- Dark Walnut : Target

Dolce Desk- Dark Walnut : Target: The Dolce dark walnut desk is made of solid hardwood and wood veneer to offer sturdy performance.

National Small Business Week |

National Small Business Week |: Each state names a Small Business Person of the Year, who go on to compete for national title announced on June 21 in DC.

[SOLVED] Newbie - what to do about huge number attempted ssh logins

[SOLVED] Newbie - what to do about huge number attempted ssh logins: Good. Iptables is OK as long as you know what you're doing.

linux - SSH stops at "using username" with IPTables in effect - Server Fault

linux - SSH stops at "using username" with IPTables in effect - Server Fault: f the inbound chain is on DENY and SSH port open [judged from Webmin], PuTTY will say using username "root" and stops at that instead of asking for public key pw. Inbound chain on ACCEPT the pw is asked.

How to View and Delete Iptables Rules – List and Flush

How to View and Delete Iptables Rules – List and Flush: "How do I view all the current iptables rules? Once I view it, is there a way to delete all the current rules and start from scratch?"

'via Blog this'

HowTos/Network/IPTables - CentOS Wiki

HowTos/Network/IPTables - CentOS Wiki: "CentOS has an extremely powerful firewall built in, commonly referred to as iptables, "

'via Blog this'

How to view text files in Linux with cat and less

How to view text files in Linux with cat and less: "When you see a weird file on your Linux file system, you may want to know what the file contains. We'll take a look at the cat and less commands that you can use for viewing the contents of a text file."

'via Blog this'

25 Most Frequently Used Linux IPTables Rules Examples

25 Most Frequently Used Linux IPTables Rules Examples: "In this article, I’ve given 25 practical IPTables rules that you can copy/paste and use it for your needs."

'via Blog this'

RHEL / Centos Linux Disable Firewall

RHEL / Centos Linux Disable Firewall: "You need to disable the following services to disable firewall under Red Hat Enterprise Linux or CentOS Linux version 4 / 5 / 6."

'via Blog this'

Tuesday, June 4, 2013

Adrenal Diseases | Patient Experiences Blog: Endocrine Surgery UCLA, Reviews, Comments

Adrenal Diseases | Patient Experiences Blog: Endocrine Surgery UCLA, Reviews, Comments: "I had a tumor in my adrenal glad. I just had a adrenalectomy of my right adrenal gland and I must say, I am cured my gosh I literally went through hell for about a year."

'via Blog this'

Saturday, June 1, 2013

Privacy & Security in Healthcare

Privacy & Security: HIMSS Media and Healthcare IT News have partnered once again to bring you The Privacy & Security Forum. The 2nd annual Privacy & Security Forum helps CIOs, IT directors and other senior healthcare professionals answer a critical question: How do you create and sustain a culture of security in the workplace?

HITRUST : Get Started

HITRUST : Get Started: The foundation of all HITRUST programs and services is the HITRUST Common Security Framework (CSF), a certifiable framework that provides organizations with the needed structure, detail and clarity relating to information security tailored to the healthcare industry.

Health-care sector vulnerable to hackers, researchers say - The Washington Post

Health-care sector vulnerable to hackers, researchers say - The Washington Post:

Medical devices at Veterans Affairs facilities were infected by malicious viruses at least 181 times from 2009 to 2011, according to the DHS intelligence report that surfaced in May.

Medical Error | The Number Three Cause of Death in the United States

Medical Error | The Number Three Cause of Death in the United States: The complexity of the US health care system is a large part of the problem. Thousands of patients receive care in outpatient surgical centers, urgent care, and independent doctors’ offices every day.