Just a basic blog—snagging random stuff that catches our eye—nothing else, really...
Wednesday, July 31, 2013
Agenda – Suits and Spooks NYC 2013 � Suits and Spooks
Agenda – Suits and Spooks NYC 2013 � Suits and Spooks: Agenda – Suits and Spooks NYC 2013
Tuesday, July 30, 2013
Guidance Documents (Medical Devices and Radiation-Emitting Products) > Draft Guidance for Industry and Food and Drug Administration Staff - Mobile Medical Applications
Guidance Documents (Medical Devices and Radiation-Emitting Products) > Draft Guidance for Industry and Food and Drug Administration Staff - Mobile Medical Applications: Draft Guidance for Industry and Food and Drug Administration Staff - Mobile Medical Applications
PDF Printer VersionDRAFT GUIDANCE
Document Issued on: July 21, 2011
PDF Printer VersionDRAFT GUIDANCE
Document Issued on: July 21, 2011
Guidance Documents (Medical Devices and Radiation-Emitting Products) > Content of Premarket Submissions for Management of Cybersecurity in Medical Devices - Draft Guidance for Industry and Food and Drug Administration Staff
Guidance Documents (Medical Devices and Radiation-Emitting Products) > Content of Premarket Submissions for Management of Cybersecurity in Medical Devices - Draft Guidance for Industry and Food and Drug Administration Staff: Content of Premarket Submissions for Management of Cybersecurity in Medical Devices - Draft Guidance for Industry and Food and Drug Administration Staff
MAUDE - Manufacturer and User Facility Device Experience
MAUDE - Manufacturer and User Facility Device Experience: MAUDE - Manufacturer and User Facility Device Experience
Pacemaker Hack Can Be Used To Kill People With Electric Shock | WebProNews
Pacemaker Hack Can Be Used To Kill People With Electric Shock | WebProNews: The pacemaker is a small electrical device that attaches to one’s heart. It controls heart beats through timed low-voltage electric shocks.
Monday, July 29, 2013
Infosecurity - Businesses lack awareness of poor security consequences
Infosecurity - Businesses lack awareness of poor security consequences: “Security needs to be an integrated part of everything we do – not an afterthought – and everybody must understand risk and change their behavior accordingly.”
The Best Credit Cards for Rebuilding Your Credit Score - US News and World Report
The Best Credit Cards for Rebuilding Your Credit Score - US News and World Report: If you use the card responsibly, you'll be considered for an unsecured credit card. "That's helpful because that's why people are doing this—they want to get an unsecured card," Harzog says.
7-day trial membership in Experian Credit Tracker
PAYMENT INFORMATION: When you order your $1 Credit Report and Score here, you will begin your 7-day trial membership in Experian Credit TrackerCredit Monitoring. You may cancel your trial membership at any time within 7 days without charge.
If you decide not to cancel, your membership will continue and you will
be billed for just $19.95/month for each month that you continue your
membership. You may cancel your membership and stop the monthly billing
by contacting us at any time; however, you will not be eligible for a pro-rated refund of your current month's paid membership fee.
https://experian.experiandirect.com/Member/Login.aspx
https://experian.experiandirect.com/Member/Login.aspx
4th Cybersecurity Framework Workshop
4th Cybersecurity Framework Workshop: The fourth Cybersecurity Framework workshop will be hosted September 11-13, 2013 in Richardson, TX by the University of Texas at Dallas.
Sunday, July 28, 2013
HIPAA-compliant, Antivirus-protected Computers Can Still Get Infected | Physicians Practice
HIPAA-compliant, Antivirus-protected Computers Can Still Get Infected | Physicians Practice: "the HIPAA Security Rule is a good thing. It requires medical practices and clinics to adopt many processes that are considered IT and business best practices. One of those practices is contained in Standard 164.308(a)(5)(ii)(B): PROTECTION FROM MALICIOUS SOFTWARE: (The Covered Entity must implement) "Procedures for guarding against, detecting, and reporting malicious software.""
'via Blog this'
'via Blog this'
These fake investigations by data protection regulators have to stop � The Privacy Surgeon
These fake investigations by data protection regulators have to stop � The Privacy Surgeon: So, in view of the failure of many external investigations of the private sector, why not turn the tables by demanding that the companies themselves come up with the facts and the solutions independently?
Saturday, July 27, 2013
Scientist banned from revealing codes used to start luxury cars
The scientists wanted to publish their paper at the well-respected Usenix Security Symposium in Washington DC in August, but the court has imposed an interim injunction.
From My iPhone
Friday, July 26, 2013
AIMBE
AIMBE: "AIMBE is a non-profit advocacy organization headquartered in Washington, DC, representing nearly 50,000 individuals and made up of the top 2% of medical and biological engineers."
'via Blog this'
'via Blog this'
Email injection exploit through a PHP contact form
Email injection exploit through a PHP contact form: If they find a ‘contact us’ page that is vulnerable they manipulate the form fields to add/change email headers. T
Thursday, July 25, 2013
Computer Viruses Are "Rampant" on Medical Devices in Hospitals | MIT Technology Review
Computer Viruses Are "Rampant" on Medical Devices in Hospitals | MIT Technology Review: “We also worry about situations where blood gas analyzers, compounders, radiology equipment, nuclear-medical delivery systems, could become compromised to where they can’t be used, or they become compromised to the point where their values are adjusted without the software knowing,”
Wednesday, July 24, 2013
Computer Viruses Are "Rampant" on Medical Devices in Hospitals | MIT Technology Review
Computer Viruses Are "Rampant" on Medical Devices in Hospitals | MIT Technology Review: Often the malware is associated with botnets, Olson said, and once it lodges inside a computer, it attempts to contact command-and-control servers for instructions. Botnets
Tuesday, July 23, 2013
Monday, July 22, 2013
INTERVIEW: Barnaby Jack on hacking implantable medical devices | Risky Business
INTERVIEW: Barnaby Jack on hacking implantable medical devices | Risky Business: Jack says these techniques could be used for targeted assassinations, or perhaps even more worryingly, a maliciously motivated person could actually create an auto-propagating worm designed to kill people!
Sunday, July 21, 2013
Saturday, July 20, 2013
Friday, July 19, 2013
Confirmed: Fracking Triggers Quakes and Seismic Chaos | Mother Jones
Confirmed: Fracking Triggers Quakes and Seismic Chaos | Mother Jones: "Major earthquakes thousands of miles away can trigger reflex quakes in areas where fluids have been injected into the ground from fracking and other industrial operations, according to a study published in the journal Science on Thursday."
'via Blog this'
'via Blog this'
Light, Bright and Polite Social Media Training for Schools, Parents & Teens - - Media Leaders
Light, Bright and Polite Social Media Training for Schools, Parents & Teens - - Media Leaders: Josh Ochs is the author of the bestselling book “Light, Bright And Polite” and he helps schools, parents and teens be safe on social media
You Can’t Hit Reload on Your Pacemaker - Innovation Insights
You Can’t Hit Reload on Your Pacemaker - Innovation Insights: After all, in today’s multi-cloud world, service providers and enterprises can only deliver their services and ensure network reliability and availability if they know what’s going on in the entire ecosystem.
Understanding Man-In-The-Middle Attacks - Part 3: Session Hijacking
Understanding Man-In-The-Middle Attacks - Part 3: Session Hijacking :: Authentication, Access Control & Encryption :: Articles & Tutorials :: WindowSecurity.com: There are many different forms of session hijacking so the defenses for them can vary. J
Thursday, July 18, 2013
DNS Redirection Puts LinkedIn Users At Risk | DNS Made Easy
DNS Redirection Puts LinkedIn Users At Risk | DNS Made Easy: The popular business-focused social network LinkedIn was unavailable for several hours over the 19th and 20th of June because of a DNS redirection incident
Sum values based on multiple conditions - Excel - Office.com
Sum values based on multiple conditions - Excel - Office.com:
Introduced in Excel 2007, great function for summarizing tables to fuel charts: You want to sum values with more than one condition, such as the sum of sales of a certain product in a certain region. This is when you’d use the SUMIFS function in a formula.
Introduced in Excel 2007, great function for summarizing tables to fuel charts: You want to sum values with more than one condition, such as the sum of sales of a certain product in a certain region. This is when you’d use the SUMIFS function in a formula.
Monday, July 15, 2013
St. Johns judge with reputation for tough sentences moving to new job | jacksonville.com
St. Johns judge with reputation for tough sentences moving to new job | jacksonville.com: "Anyone who’s been through or worked in the justice system in St. Johns County has an opinion of Judge Wendy Berger."
'via Blog this'
'via Blog this'
House Subcommittee Hears Testimony on Developing Mobile Medical Applications | Mintz Levin - Health Law - JDSupra
House Subcommittee Hears Testimony on Developing Mobile Medical Applications | Mintz Levin - Health Law - JDSupra: Approximately 19% of smartphone owners have downloaded a mobile medical application (Medical App).
Researchers hack Verizon device, turn it into mobile spy station | Reuters
Researchers hack Verizon device, turn it into mobile spy station | Reuters: motivated hackers can still find other ways to hack the femtocells of Verizon, as well as those offered by some 30 carriers worldwide to their customers.
Robotic Assisted Surgery
Robotic Assisted Surgery: Robotic assisted surgery involves use of a computerized system operated by a surgeon at a computer console connected with robotic arms.
Saturday, July 13, 2013
Friday, July 12, 2013
Nextnine - Media Center | Nextnine Remote Monitoring System
NextNine (http:// www.nextnine.com ) provides Remote Product Service platform that enable manufacturers of business-critical systems to remotely service their products at the customer site
From My iPhone
Thursday, July 11, 2013
Formula 1® - The Official F1® Website
Honda have announced that they will base their European racing operation in Milton Keynes, UK as they continue preparations for their return to Formula One racing.
From My iPhone
Wednesday, July 10, 2013
TSec Solutions, LLC
An interesting company. Norwich U related.
http://tsecsols.com/site/f61b4f710e914567b94eca047093c21a/home?url=http%3A%2F%2Ftsecsols.com%2F#2764
From My iPhone
http://tsecsols.com/site/f61b4f710e914567b94eca047093c21a/home?url=http%3A%2F%2Ftsecsols.com%2F#2764
From My iPhone
Washington Post
the harsh glare of public scrutiny will motivate NSA officials to keep strong checks in place?
http://m.washingtonpost.com/blogs/wonkblog/wp/2013/07/08/heres-what-can-go-wrong-when-the-government-builds-a-huge-database-about-americans/
From My iPhone
http://m.washingtonpost.com/blogs/wonkblog/wp/2013/07/08/heres-what-can-go-wrong-when-the-government-builds-a-huge-database-about-americans/
From My iPhone
Tuesday, July 9, 2013
Virus Bulletin : VB100 comparative review on Windows Server 2012
Virus Bulletin : VB100 comparative review on Windows Server 2012: Detection was splendid, with good scores everywhere, and no problems in the WildList or clean sets. That performance earns ESET yet another VB100 award, putting it on a total of 80 passes overall since 1998, and with no fails, or even missed tests, in the decade since June 2003.
Ireland: Bankers joke about their €7 billion bailout scam - World Socialist Web Site
Ireland: Bankers joke about their €7 billion bailout scam - World Socialist Web Site: "In one conversation, the retail banking director Peter Fitzgerald asked the head of capital markets, John Bowe, how he had arrived at a sum of €7 billion to bail out the bank. Bowe responded, “as Drummer [David Drumm, Anglo-Irish CEO] would say, I picked it out of my arse.”"
'via Blog this'
'via Blog this'
A Brief History of the Movie Trailer Money Shot -- Vulture
A Brief History of the Movie Trailer Money Shot -- Vulture: "Today, every teaser or trailer has one … or two, or three, or eighteen money shots. "
'via Blog this'
'via Blog this'
IOActive Labs Research: "Broken Hearts": How plausible was the Homeland pacemaker hack?
IOActive Labs Research: "Broken Hearts": How plausible was the Homeland pacemaker hack?: The attacker types in a command to remotely induce defibrillation on the victim’s ICD. It is possible to remotely deliver shocks to ICDs. The functionality exists for testing purposes. Depending on the device model and manufacturer, it is possible to deliver a jolt in excess of 800 volts.
Chip Sullivan of Virginia wins 40th PGA Professional National Championship | World Golf News
Chip Sullivan of Virginia wins 40th PGA Professional National Championship | World Golf News: "When I was diagnosed with diabetes and hemochromatosis (a disease in which the body absorbs too much iron), I made that my No. 1 priority," said Sullivan.
William O. Douglas - Wikiquote
William O. Douglas - Wikiquote: As nightfall does not come all at once, neither does oppression. In both instances, there is a twilight when everything remains seemingly unchanged. And it is in such twilight that we all must be most aware of change in the air — however slight — lest we become unwitting victims of the darkness.
World's Largest Debt Collection Operation Settles FTC Charges, Will Pay $3.2 Million Penalty
World's Largest Debt Collection Operation Settles FTC Charges, Will Pay $3.2 Million Penalty: The world’s largest debt collection operation, Expert Global Solutions and its subsidiaries, has agreed to stop harassing consumers with allegedly illegal debt collection calls and to pay a $3.2 million civil penalty – the largest ever obtained by the Federal Trade Commission against a third-party debt collector.
Monday, July 8, 2013
Former CIA, NSA director sounds off on PRISM, spying tools
Former CIA, NSA director sounds off on PRISM, spying tools: "It's time to call the NSA's mass surveillance programs what they are: criminal.""
'via Blog this'
'via Blog this'
NIST Seeks Private-Sector Input at Cybersecurity Framework Workshop
NIST Seeks Private-Sector Input at Cybersecurity Framework Workshop: More than 700 people attended NIST's first two workshops, in Washington, D.C., and Pittsburgh, with more than 2,500 people participating online.
3rd Cybersecurity Framework Workshop - July 10-12 2013 San Diego CA
3rd Cybersecurity Framework Workshop - July 10-12 2013 San Diego CA: Executive Order 13636, Improving Critical Infrastructure Cybersecurity, has directed NIST to work with stakeholders to develop a voluntary framework for reducing cyber risks to critical infrastructure.
NIST meeting poses major test for Obama cybersecurity push
NIST meeting poses major test for Obama cybersecurity push: “This is breaking all new ground,” says one industry source of the NIST process, “and the next meeting may determine whether you can write standards through such a broad collaborative process.”
iptables or host.deny for VPS & fail2ban? - Web Hosting Talk
iptables or host.deny for VPS & fail2ban? - Web Hosting Talk: Hello, I recently got myself into an unmanaged VPS package and I noticed in my log files, countless attempts to ssh into the system. After a bit of searching, fail2ban looked like a good way to ban the brute force attacks automatically.
BYOD to Drive Data to the Cloud | Innovation Insights | Wired.com
BYOD to Drive Data to the Cloud | Innovation Insights | Wired.com: The BYOD trend will push organizations into adopting cloud-based services for mobile device management (MDM), particularly in the SMB market where they lack the IT staff and budget to adequately deal with it.
Malware hits businesses 20 to 60 times an hour, say researchers
Malware hits businesses 20 to 60 times an hour, say researchers: Advanced cyber attacks hit businesses 20 times an hour on average, according to researchers at security firm FireEye.
Number of Companies Buying Cyber Insurance up by One-Third in 2012: Marsh
Number of Companies Buying Cyber Insurance up by One-Third in 2012: Marsh: “As a result, companies are now looking to manage their day-to-day cyber risks in the same way they do more traditional risks—through the purchase of insurance.”
Ann Arbor Research Center for Medical Device Security: FDA Publishes Draft Guidance on Medical Device Cybersecurity
Ann Arbor Research Center for Medical Device Security: FDA Publishes Draft Guidance on Medical Device Cybersecurity: Unlike previous guidance on cybersecurity for specific types of COTS software, this guidance spells out more detail on cybersecurity responsibilities for a medical device manufacturer
Saturday, July 6, 2013
Friday, July 5, 2013
Wednesday, July 3, 2013
Lost thumb drive leads to compromised patient data - SC Magazine
Lost thumb drive leads to compromised patient data - SC Magazine: "A lost thumb drive containing thousands of patient records went missing from a Nebraska doctor's office"
'via Blog this'
'via Blog this'
Women in Security mentoring scheme launched - SC Magazine UK
Women in Security mentoring scheme launched - SC Magazine UK: The Women in Security mentoring scheme will have three objectives: to enhance technical skills; to help expand professional networks; and ensure newcomers are not put off by jargon and can feel part of a group
3rd Cybersecurity Framework Workshop - July 10-12 2013 San Diego CA
3rd Cybersecurity Framework Workshop - July 10-12 2013 San Diego CA: The third Cybersecurity Framework workshop will be hosted July 10-12, 2013 in San Diego by the University of California, San Diego (UCSD) and the National Health Information Sharing and Analysis Center (NH-ISAC).
Threat matrix: Malware and hacking pose dangers to medical devices | Healthcare IT News
Threat matrix: Malware and hacking pose dangers to medical devices | Healthcare IT News: "We’re starting to attach [medical devices] to electronic health records, and they’re not secure," said Zoph. "We’re not doing it with security in mind."
Tuesday, July 2, 2013
Mobile EHR Application - Greenway Medical
Mobile EHR Application - Greenway Medical: "Greenway’s PrimeMOBILE™ delivers complete remote access of ambulatory data housed in our flagship EHR solution, PrimeSUITE®, all for an extremely low monthly cost."
'via Blog this'
'via Blog this'
HFE Gene Variants Affect Iron in the Brain
HFE Gene Variants Affect Iron in the Brain: Alizadeh et al. (102) reported no association of HFE alleles with AD, although they did suggest that H63D homozygotes tended to have earlier age at onset compared with noncarriers.
Increase Seen in Use Of Robotically-Assisted Hysterectomy For Benign Gynecologic Disorders | Digital News Release
Increase Seen in Use Of Robotically-Assisted Hysterectomy For Benign Gynecologic Disorders | Digital News Release: Total costs associated with robotically assisted hysterectomy were $2,189 more per case than for laparoscopic hysterectomy, the researchers write.
Applied Dexterity | Driving Innovation in Surgical Robotics
Applied Dexterity | Driving Innovation in Surgical Robotics: The RAVEN surgical robot is a research instrument designed to support research in advanced techniques in robotic assisted surgery.
Robotic Surgery: Growing Sales, but Growing Concerns
Robotic Surgery: Growing Sales, but Growing Concerns: Since then, da Vinci hospital robot placements and procedures have skyrocketed. Last year alone, installations rose by 21 percent to 2,585 units worldwide at a cost of more than $1.5 million each. And robotic surgical procedures leaped by 25 percent to 450,000.
UCSC | Bionics Lab > Surgical Robotics > Raven
UCSC | Bionics Lab > Surgical Robotics > Raven: Initial teleoperation experiments conducted within the continental US from several remote locations allowed two surgeons, each one controlling a set of two arms, to complete fundamental laparoscopic surgery (FLS) tasks collaboratively while using sampling rate of 1 kHz.
Surgical robots: The kindness of strangers | The Economist
Surgical robots: The kindness of strangers | The Economist: More importantly for academics, it is also the first surgical robot to use open-source software. Its Linux-based operating system allows anyone to modify and improve the original code, creating a way for researchers to experiment and collaborate.
Cyberoam launches Web manager for NetGenie appliances - Security - News & Features - ITP.net
Cyberoam launches Web manager for NetGenie appliances - Security - News & Features - ITP.net: Cyberoam has launched a new NetGenie On-Cloud Management Service (NCMS), which will allow remote administration of its NetGenie SO/HO network security app
Netgenie SOHO
Netgenie SOHO: Netgenie SOHO creates a Wi-Fi zone for you along with the benefits of Stateful Inspection Firewall, VPN, in-built Anti-Virus, Intrusion Prevention System, 3G Ready and Internet Controls over websites and applications – all this in your Wireless Router!
Facebook in more hot water, now over 'shadow dossiers' - Network World
Facebook in more hot water, now over 'shadow dossiers' - Network World
...during the course of an investigation of the flaw by a security company, it was discovered that Facebook keeps "shadow dossiers" on its members. Those dossiers contain information about people not volunteered by them but scraped from third-party sources.
...during the course of an investigation of the flaw by a security company, it was discovered that Facebook keeps "shadow dossiers" on its members. Those dossiers contain information about people not volunteered by them but scraped from third-party sources.
ZeuS Malware Returns, Targets SMBs - Smb - Security - Informationweek
ZeuS Malware Returns, Targets SMBs - Smb - Security - Informationweek: Like phishing and other "old" scams, ZeuS is back because it works -- very well, in some cases. In 2009, for example, hackers lifted $588,000 from a Maine construction company's bank account before the theft was detected.
The Network And The Malware -- Dark Reading
The Network And The Malware -- Dark Reading: The story goes that these devices can detect bad stuff on the perimeter. The sales reps will tell you they've figured out how to stop the APT, make your CIO respect you, and allow you to actually spend a holiday like Memorial Day drinking beer, eating BBQ, and remembering the heroes who defend your homeland -- instead of how you usually spend the holiday, which is trying to figure out how your customer database ended up on Pastebin.
Ebook Best-Sellers | Digital Book World
Ebook Best-Sellers $0.00 to $2.99 Week Ending 5-12-13 | Digital Book World: Rank on main list after forward slash; previous week’s list rank in parentheses.
Think Again: Big Data - By Kate Crawford | Foreign Policy
Think Again: Big Data - By Kate Crawford | Foreign Policy: The promoters of big data would like us to believe that behind the lines of code and vast databases lie objective and universal insights into patterns of human behavior, be it consumer spending, criminal or terrorist acts, healthy habits, or employee productivity.
Virtual Brain Online Knowledge Base - Linux iptables
Virtual Brain Online Knowledge Base - Search Page: While researching the best way to implement the custom rules created by my script I came across the recent option of the match module.
We will always be fighting cyber crime, says Mikko Hypponen- The Inquirer
We will always be fighting cyber crime, says Mikko Hypponen- The Inquirer: INFOSEC@ NO MATTER HOW MUCH we improve internet security we'll always be fighting cyber criminals, F-Secure senior security researcher Mikko Hypponen has declared.
Monday, July 1, 2013
Surgical robots: The kindness of strangers | The Economist
Surgical robots: The kindness of strangers | The Economist: More importantly for academics, it is also the first surgical robot to use open-source software. Its Linux-based operating system allows anyone to modify and improve the original code, creating a way for researchers to experiment and collaborate.
MAUDE Adverse Event Report: INTUITIVE SURGICAL,INC.DA VINCI SI SURGICAL SYSTEMENDOSCOPIC INSTRUMENT CONTROL SYSTEM
MAUDE Adverse Event Report: INTUITIVE SURGICAL,INC.DA VINCI SI SURGICAL SYSTEMENDOSCOPIC INSTRUMENT CONTROL SYSTEM: it was reported that during a da vinci si adrenalectomy, distal pancreatectomy, and splenectomy procedure performed on (b)(6) 2009, the surgeon allegedly injured the patient's aorta. The legal complaint indicated that the injury occurred during dissection and the surgeon made the decision to convert the robotic surgery to open surgical techniques. The legal complaint alleged that during transition, the robot's arm was inappropriately moved, causing a tear in the patient's aorta. The surgeon reportedly repaired the aorta. The legal complaint indicated that post-operatively, the patient experienced renal failure and the family withdrew life support shortly after surgery. No further clinical information was provided.
Subscribe to:
Posts (Atom)