Just a basic blog—snagging random stuff that catches our eye—nothing else, really...
Wednesday, December 31, 2014
[EAS] Internet annus mirabilis?
2011 report by industry and government on the cost of cybercrime - Publications - GOV.UK
A 2011 report by information intelligence experts Detica, in partnership with the Office of Cyber Security & Information Assurance, on the estimated cost of cybercrime.
Monday, December 29, 2014
How IoT big data will transform manufacturing automation - TechRepublic
Sunday, December 28, 2014
Thursday, December 25, 2014
Can Smart Cards Reduce the Risk of Medical Identity Theft? | HealthITSecurity.com
"subscriber identity tokens" such as smart cards. The smart patient health cards would contain secure microprocessors that can encrypt and securely store and protect a patient's personal health information, according to a statement.
http://healthitsecurity.com/2014/12/19/can-smart-cards-reduce-the-risk-of-medical-identity-theft/
Tuesday, December 23, 2014
Monday, December 22, 2014
Health care data is becoming big target for hackers | Marketplace.org
Medical Records Are a Gold Mine for Cybercrime | Motherboard
Recent International Study Reports Delinquencies in App Privacy Disclosures | InfoLawGroup
Global Privacy Enforcement Network | An International Network to Foster Cross-Border Co-operation
IRS Needs to Do More to Reduce Risk of Improper Payments of EITC and ACTC
Chief information security officers hard to find — and harder to keep
Identity theft victims face months of hassle - The Washington Post
'Citizenfour' Producers Sued Over Edward Snowden Leaks (Exclusive) - The Hollywood Reporter
Sony to lay off 216 employees in Culver City this summer | 89.3 KPCC
Norse – Consequences of Overstating the Cyber Terrorism Threat
Sony fights back against hackers, stolen file sharers – by firing a DDoS back at them | ExtremeTech
'via Blog this'
Sony hack: Studio Tries to Disrupt Downloads of its Stolen Files | Re/code
Sunday, December 21, 2014
Elon Musk's 'Hyperloop' Idea One Step Closer To Reality : Tech : News Every Day
http://www.newseveryday.com/articles/4560/20141221/elon-musks-hyperloop-idea-one-step-closer-reality.htm
From My iPhone
Sunday, December 14, 2014
Saturday, December 13, 2014
Thursday, December 11, 2014
Debugging and reverse engineering: Stuxnet - User/Kernel-Mode analysis
Cutting IRS budget = political stupidity. We can add way more auditors before cost exceeds the lost tax revenue each new hire brings in.
http://bsodanalysis.blogspot.com/2014/11/stuxnet-kernel-analysis.html?m=1
Wednesday, December 10, 2014
Health industry top target of cybercriminal group - FierceHealthIT
Health industry top target of cybercriminal group - FierceHealthIT
http://www.fiercehealthit.com/story/health-industry-top-target-cybercriminal-group/2014-12-04?utm_campaign=AddThis&utm_medium=AddThis&utm_source=linkedin#%2EVIC3aM9wCrE%2Elinkedin
Sent from LinkedIn for iPhone
From My iPhone
Tuesday, December 9, 2014
Sunday, December 7, 2014
Your Company is a Target for Hackers | Hawaii Business Magazine
The restaurant was a victim of carding, a complex scheme that can scorch businesses in multiple ways, from back-office security data breaches to front-store fraudulent purchases.
http://www.hawaiibusiness.com/your-company-is-a-target-for-hackers/
Thursday, December 4, 2014
Wednesday, December 3, 2014
National Archive of Criminal Justice Data
Tuesday, December 2, 2014
ISACA survey shows security disconnect for breaches, wearables | CSO Online
Big Data: Cyber Security's Silver Bullet? Intel Makes the Case - Forbes
Target Missed Warnings in Epic Hack of Credit Card Data - Businessweek
Cybersecurity hiring crisis: Rockstars, anger and the billion dollar problem | ZDNet
Violent U.S. crime drops again, reaches 1970s level: FBI | Reuters
Plumbing the Depths of NSA’s Spying | Consortiumnews
Monday, December 1, 2014
UNPACKING THE FAKE | On Publishing
Friday, November 28, 2014
Behold The Entrenched — And Reviled — Annual Review : NPR
'via Blog this'
Hacker-hunters finger 'Keyser Soze' of Russian underground card sales • The Register
'via Blog this'
Thursday, November 27, 2014
Identity Crisis: Organizations are Implementing Medical Identity Theft Teams to Combat Rising Incidents
FBI denies it used Seattle Times Web link, confirms fake story | Union-Bulletin
http://m.union-bulletin.com/news/2014/oct/29/fbi-denies-it-used-seattle-times-web-link-confirms/?
From My iPhone
Wednesday, November 26, 2014
The Tech Worker Shortage Doesn't Really Exist - Businessweek
http://mobile.businessweek.com/articles/2014-11-24/the-tech-worker-shortage-doesnt-really-exist
From My iPhone
Monday, November 24, 2014
San Diego Blood Bank holds Chargers Drive, looks to future with new ventures | Del Mar Times Mobile
On the health and wellness side, he said, the blood bank's donor centers and bloodmobiles could also be used to deliver basic services, such as flu shots, or conduct health screenings, he said.
From My iPhone
Fwd: Displacement refs
>
> Felson, Marcus and Ronald V. Clarke. 1998. Opportunity Makes the Thief: Practical Theory for Crime Prevention, vol. Paper 98. London: Home Office, Research Development and Statistics Directorate.
>
VIZIO Ultra HD TV Commercial - Turkey Dinner
There is a dog just like Kahn in this amusing advert on YouTube:
http://youtu.be/_XpbiH0L5ps
We think the dogs in the ad really enjoyed making it.
Love...Stephen
From My iPhone
Sunday, November 23, 2014
Saturday, November 22, 2014
Universal Plug and Play Check by Rapid7
From Russia with love: Sofacy/Sednit/APT28 is in town | AlienVault
FireEye did a pretty good job on attribution and giving some technical indicators; however, they neglected to reference previous work on this threat actor from companies like PWC, TrendMicro, ESET and others. - See more at: https://www.alienvault.com/open-threat-exchange/blog/from-russia-with-love-sofacy-sednit-apt28-is-in-town#sthash.lcSCU80F.dpuf
Friday, November 21, 2014
Banner Engineering - DX80G2M6-QC - Sensor Accessories - Connectors / Adapters - Allied Electronics
New Citadel Trojan Targets Your Password Managers
CSD Projects | Homeland Security
Review of NETGEAR WNDR3400v2 N600 Wireless Router (With DD-WRT Availability): MyOpenRouter
SSDP reflection DDoS attacks on the rise, Akamai warns - SC Magazine
"When you're pushing hardware that could be deployed to millions, security should take as much consideration as functionality," Seaman said. "If this single manufacturer had simply implemented a properly configured UPnP/SSDP client and/or firewall/routing rules, hundreds of thousands of devices wouldn't be vulnerable."
http://www.scmagazine.com/ssdp-reflection-ddos-attacks-on-the-rise-akamai-warns/article/377754/
Thursday, November 20, 2014
Wednesday, November 19, 2014
Tuesday, November 18, 2014
Monday, November 17, 2014
Gas prices to drop below $3 for the first time in, like, forever
'via Blog this'
Sunday, November 16, 2014
FBI — Going Dark: Are Technology, Privacy, and Public Safety on a Collision Course?
'via Blog this'
Beyond the hype: The big issues in the European Court’s 'right to be forgotten' ruling | Privacy International
'via Blog this'
Upping the ante: PCI Security Standard - SC Magazine
'via Blog this'
WHERE (OR WEAR) NEXT FOR WEARABLE TECH? | Loyalty360.org
'via Blog this'
Google's VirusTotal puts Linux malware under the spotlight | ZDNet
'via Blog this'
Saturday, November 15, 2014
The Best Apps and Gadgets to Make Holiday Travel Easier | Digital Trends
'via Blog this'
Friday, November 14, 2014
ISACA survey shows security disconnect for breaches, wearables | CSO Online
'via Blog this'
Thursday, November 13, 2014
Wednesday, November 12, 2014
The Arab Spring of Privacy Is Upon Us | WIRED
Tuesday, November 11, 2014
Virus Bulletin : Blog - Stuxnet infected Natanz plant via carefully selected targets rather than escape from it
'via Blog this'
Evidence-Based Programs and Practices - What Works in Criminal Justice - CrimeSolutions.gov
Monday, November 10, 2014
Does Cybercrime Really Cost $1 Trillion? - ProPublica
Big Data: Cyber Security's Silver Bullet? Intel Makes the Case - Forbes
Wired article refutes this and pushes for cybercrime. This yet more mojey for ubersec firms, and besides most of this exists already.
http://www.forbes.com/sites/kurtmarko/2014/11/09/big-data-cyber-security/
Access : The spatial dependency of crime increase dispersion : Security Journal
The process is demonstrated with an example of robbery rates in police sectors of Philadelphia, PA. Security Journal (2010) 23, 18–36. doi:10.1057/sj.2009.16
http://www.palgrave-journals.com/sj/journal/v23/n1/full/sj200916a.html
Saturday, November 8, 2014
Monday, November 3, 2014
warisaracket.org/natemerg.html
The IEEPA authorizes the president to regulate commerce after declaring a national emergency in response to any unusual and extraordinary threat to the United States that stems from a foreign source.
ICREACH and EO 12333 | emptywheel
Because I need a hobby, I'm knee deep in tracking how EO 12333 got changed in 2008.
Facebook Privacy & Security Guide: Everything You Need to Know - Heimdal Security Blog
American Healthcare: The Startups are Coming | The Network
'via Blog this'
Sunday, November 2, 2014
Currency hack
@SCMagazine: Hackers grab email addresses of CurrentC pilot participants | http://t.co/VR9XGPACgF
Shared via TweetCaster
Saturday, November 1, 2014
Friday, October 31, 2014
Center for Problem-Oriented Policing | Tool Guides | Analyzing Crime Displacement and Diffusion
http://www.popcenter.org/tools/displacement/references
From My iPhone
Wednesday, October 29, 2014
‘Replay’ Attacks Spoof Chip Card Charges — Krebs on Security
“The [Canadian] bank in this case would take any old cryptogram and they weren’t checking that one-time code because they didn’t have it implemented correctly,” Litan said. “If they saw an EMV transaction and didn’t see the code, they would just authorize the transaction.”
Litan said the fraudsters likely knew that the Canadian bank wasn’t checking the cryptogram and that it wasn’t looking for the dynamic counter code.
Monday, October 27, 2014
‘Replay’ Attacks Spoof Chip Card Charges — Krebs on Security
From My iPhone
White Hat Hackers Fight For Legal Reform - Dark Reading
http://www.darkreading.com/white-hat-hackers-fight-for-legal-reform/d/d-id/1316838?_mc=sm_dr_editor_kellyjacksonhiggins
From My iPhone
Sunday, October 26, 2014
Inverse Path - USB armory
The USB armory from Inverse Path is an open source hardware design, implementing a flash drive sized computer.
http://inversepath.com/usbarmoryFrom My iPhone
The Invention Secrecy Act of 1951
'via Blog this'
Government secrecy orders on patents keep lid on inventions | The Center for Investigative Reporting
Then it disappeared like a dropped call."
'via Blog this'
Tuesday, October 21, 2014
The Fiscal Times
http://m.thefiscaltimes.com/all/2014-10-20-5-billion-phone-hacking-scam-too-small-nail-fcc#2
From My iPhone
Monday, October 20, 2014
How to Stop Apple From Snooping on Your OS X Yosemite Searches | WIRED
'via Blog this'
How to Stop Apple From Snooping on Your OS X Yosemite Searches | WIRED
'via Blog this'
Sunday, October 19, 2014
Saturday, October 18, 2014
Friday, October 10, 2014
Thursday, October 9, 2014
MTA grappling with massive data breach | New York Post
The information included the names, social security numbers, and the date of birth of workers with different titles throughout the New York City Transit Authority, including those retired and deceased.
http://nypost.com/2014/03/13/mta-grappling-with-massive-data-breach/
Wednesday, October 8, 2014
The Ebola Outbreak: Good Medicine Against Public Panic
http://m.huffpost.com/us/entry/5942446
From My iPhone
Monday, October 6, 2014
Sunday, October 5, 2014
The Security Skills Shortage No One Talks About - InformationWeek
information security's rise in prominence within companies is amplifying the need for soft skills alongside technical security depth.
Friday, October 3, 2014
Hi, how to use touch pad (thinkPad T61) to scroll ... - Lenovo Community
'via Blog this'
How to Make a $19 Police Radio Scanner
Please use the normal download link if possible to receive the latest software packages
http://m.instructables.com/id/How-to-Make-a-19-Police-Radio-Scanner/?ALLSTEPS
Wednesday, October 1, 2014
How IoT big data will transform manufacturing automation - TechRepublic
Realizing the potential of a total manufacturing transformation with use of IoT big data, Germany initiated its Industry 4.0 government initiative to spur its industrial sector.
http://www.techrepublic.com/article/how-iot-big-data-will-transform-manufacturing-automation/
Tuesday, September 30, 2014
10.9.5 update stalled at 'Completing Installati... | Apple Support Communities
'via Blog this'
Power Your Wireless Sensors For 40 Years | Power content from Electronic Design
Short-range wireless sensors are experiencing rapid growth in wide range of applications: RFID to GPS tracking, traditional automatic meter reading (AMR) plus advanced metering infrastructure (AMI), mesh networks, system control and data acquisition (SCADA), data loggers, measurement while drilling, oceanography, environmental systems, emergency/safety systems, military/aerospace systems, and more.
http://m.electronicdesign.com/power/power-your-wireless-sensors-40-years
Energy Harvesting And Wireless Sensor Networks Drive Industrial Applications | Power content from Electronic Design
The industrial sector is keen on using electronics for greater capabilities and higher efficiencies and productivity. Smaller and smarter sensors, ultra-low-power IC devices, energy harvesting performance advances, and better wireless sensor network protocols are spurring this trend.
Monday, September 29, 2014
Software Defined Radio: A Hacker’s Dream
'via Blog this'
Great Scott Gadgets - HackRF One
'via Blog this'
NooElec - HackRF One Software Defined Radio: Bundle
'via Blog this'
How to Make a $19 Police Radio Scanner
'via Blog this'
How to Make a $19 Police Radio Scanner
'via Blog this'
Sunday, September 28, 2014
Apple Store Favorite IZON Cameras Riddled With Security Holes | The Security Ledger
... administrative credentials for Amazon's S3 cloud service hard coded into the IZON mobile application, which suggests that Stem is using the same credentials for every customer account.
DEFCON 22: Hack All the Things
"Secure" baby monitoring device according to their marketing. There is a hard coded username and password for uploading firmware.
http://hackaday.com/2014/08/09/defcon-22-hack-all-the-things/
Saturday, September 27, 2014
Thursday, September 25, 2014
Industrial Wireless Sensor Networks | Mouser
Friday, September 19, 2014
Tinba Trojan targets major US banks
Thursday, September 18, 2014
October 2015: The End of the Swipe-and-Sign Credit Card - Corporate Intelligence - WSJ
'via Blog this'
FBI — Two Men Plead Guilty in International Stolen Car and Identity Theft Internet Scam
'via Blog this'
An Up-To-Date Layman's Guide To Accessing The Deep Web ⚙ Co.Labs ⚙ code + community
'via Blog this'
JOTS v32n1 - Technology-enabled Crime, Policing and Security
Wednesday, September 17, 2014
Tuesday, September 16, 2014
FloCon 2015 (Portland, Oregon, January 12-15, 2015)
"FloCon is an open network security conference that takes place in Portland, Oregon on January 12-15, 2015 at the Hilton Portland & Executive Tower."
'via Blog this'
Monday, September 15, 2014
Wednesday, September 10, 2014
Keeping Oracle Java updated continues to be high security ROI - Microsoft Security Blog - Site Home - TechNet Blogs
'via Blog this'
Monday, September 8, 2014
Wednesday, September 3, 2014
Why hackers may be stealing your credit card numbers for years | Network World
http://www.networkworld.com/article/2600921/why-hackers-may-be-stealing-your-credit-card-numbers-for-years.html?source=NWWNLE_nlt_security_2014-09-02#tk.rss_security
From My iPhone
Tuesday, September 2, 2014
Genetics in Medicine - HFE-associated hereditary hemochromatosis
New! Supply Chain Risk Management Standard
...a practitioner's guide to SCRM and associated processes for the management of risks within the organization and its end-to-end supply chain.
Monday, September 1, 2014
More Workers Are Claiming ‘Wage Theft’ - NYTimes.com
'via Blog this'
Evidence Grows That Online Social Networks Have Insidious Negative Effects | MIT Technology Review
'via Blog this'
Sunday, August 31, 2014
Jihadists Buy 'Islam for Dummies' on Amazon | New Republic
http://www.newrepublic.com/article/119182/jihadists-buy-islam-dummies-amazon
From My iPhone
LizardSquad DDoS Hacker Group Reportedly Busted And Exposed - HotHardware
The FBI has been hunting down the person, or persons, responsible not only for the DDoS attack but the grounding of a plane when the group tweeted a false bomb threat as well.
PayAppSec - PayAppSec - a blog covering payment security and technology by Slava Gomzin
The short answer is yes; in the foreseeable future we will continue to see more breaches. Here’s why:"
PayAppSec - PayAppSec - a blog covering payment security and technology by Slava Gomzin:
'via Blog this'
Friday, August 29, 2014
Prevalent Iron Metabolism Gene Variants Associated with Increased Brain Ferritin Iron in Healthy Older Men
'via Blog this'
Neuropsychopharmacology - Gender and Iron Genes May Modify Associations Between Brain Iron and Memory in Healthy Aging
'via Blog this'
CompTIA | The Target Data Breach: Anatomy of an Attack - Powered by CompTIA IT Security Community
'via Blog this'
NIST Computer Security Publications - Drafts
FBI — Table 1 Crime in the United States by Volume and Rate
by Volume and Rate per 100,000 Inhabitants, 1993–2012"
'via Blog this'
Thursday, August 28, 2014
HIPAA and the BYOD Challenge
Healthcare Security: CSOs Needed - InformationWeek
HIT vendors rely on security standards that don't meet HIPAA requirements - FierceEMR
3 Do’s and Don’ts of Effective HIPAA Compliance for BYOD & mHealth
MiHIN Director reviews HIE security protocols, agreements | HealthITSecurity.com
Risk Analysis Is NOT A Graduation Exercise!
The Hackers Inside Your Supply Chain - Talking Logistics with Adrian GonzalezTalking Logistics with Adrian Gonzalez
'via Blog this'
Windows XP Hacked, Supply Chain Poisoned | Malware | TechNewsWorld
'via Blog this'
Supply chain cyber security - Wikipedia, the free encyclopedia
'via Blog this'
The Global Supply Chain: Our Economy, Security and Health Depends on It | Stanley M. Bergman
'via Blog this'
IMB: Guard against threat of cyber attacks
'via Blog this'
Tuesday, August 26, 2014
States with Legal Marijuana See 25 Percent Fewer Prescription Painkiller Deaths
http://www.healthline.com/health-news/states-with-legal-marijuana-have-fewer-overdose-deaths-082614
From My iPhone
Air rage over knee defender causes US flight to divert - BBC News
http://m.bbc.com/news/28942485
From My iPhone
Sunday, August 24, 2014
This is why you can't trust the NSA. Ever.
But there's a lot Clapper's office isn't saying. First, his office is hiding almost all the dates on these documents (it took matching these with many other public documents to come up with the estimates in this article).
http://m.theweek.com/article/index/266785/this-is-why-you-cant-trust-the-nsa-ever
Thursday, August 21, 2014
Department of Surgery - Hemochromatosis
Bogus:
Hemochromatosis is considered rare
True:
and doctors may not think to test for it.
http://www.surgery.ucsf.edu/conditions--procedures/hemochromatosis.aspx
23andMe’s Plan to Overcome FDA Concerns Over DNA Tests | MIT Technology Review
http://www.technologyreview.com/news/529006/23andme-tries-to-woo-the-fda/
From My iPhone
Wednesday, August 20, 2014
Tuesday, August 19, 2014
DEFCON 19: Introduction to Tamper Evident Devices (w speaker) - YouTube
'via Blog this'
Monday, August 18, 2014
Cisco: Blackhole arrest cuts exploit-kit traffic, but don't let your guard down | Network World
From My iPhone
Sunday, August 17, 2014
Cyber-Security Expert Warns Of 'False Flag' Digital Attacks - Forbes
http://www.forbes.com/sites/jasperhamill/2014/07/31/cyber-security-expert-warns-of-false-flag-digital-attacks/
From My iPhone
Odds ratio - Wikipedia, the free encyclopedia
From My iPhone
Saturday, August 16, 2014
Cisco on Blackhole
From My iPhone
Secure Passport and Travel Visa Order Form
Once completed, a visa specialist will personally contact you to walk you through the visa application documents you'll need to gather and send to us to begin processing.
Friday, August 15, 2014
Top Rated Electronic Health Record Software Is Free - Forbes
'via Blog this'
Thursday, August 14, 2014
PIAAC - OECD - STEM
How the 'Digital Skills Gap' Bleeds $1.3 Trillion a Year From US Businesses | Entrepreneur.com
Why Educators Should Take the Digital Skills Gap Seriously - Hootsuite Social Media Management
Wednesday, August 13, 2014
The fall of the FBI’s most-wanted cybercriminal The Kernel
"I mean, were there 100 FBI agents sitting around brainstorming?" he asked me.
- See more at: http://kernelmag.dailydot.com/issue-sections/headline-story/9895/jeremy-hammond-fbi-surveillance-bust/#sthash.7dCnSgxd.dpufFrom My iPhone
Tuesday, August 12, 2014
Government Action, Insurance, Software Product Liability Urged for Cyber Security
"It's a great time to be in the security industry," Stamos said. "Now is the time."
http://www.insurancejournal.com/news/national/2014/08/11/337207.htm
Sunday, August 10, 2014
Thursday, August 7, 2014
Google To Reward Sites With HTTPS Security In Search Rankings - Forbes
http://www.forbes.com/sites/larrymagid/2014/08/07/google-to-reward-sites-with-http-security-in-search-rankings/
From My iPhone
A New, Evidence-based Estimate of Patient Harms Associated
Wednesday, August 6, 2014
Friday, August 1, 2014
New Cyberthreat Report By SANS Institute Delivers Chilling Warning To Healthcare Industry - Forbes
Cyber-security: The internet of things (to be hacked) | The Economist
http://www.economist.com/news/leaders/21606829-hooking-up-gadgets-web-promises-huge-benefits-security-must-not-be
From My iPhone
Wednesday, July 30, 2014
Privacy & Security Forum Boston
'via Blog this'
Sunday, July 27, 2014
Friday, July 25, 2014
Phishing gang stole money from Apple users to fund UK criminal network | CSO Online
Thursday, July 24, 2014
Rí Rá - Mandalay Bay - Top Vegas Irish Pubs
"the most authentic version of Fish & Chips that you can get outside of Dublin"
'via Blog this'
Wednesday, July 23, 2014
Haemochromatosis | Health | Patient.co.uk
What about diet?
The increased levels of iron in the body cannot be treated by diet alone. Removing blood has a much bigger effect on reducing the levels of iron in the body. However, there are some recommendations:
Learning About Hereditary Hemochromatosis
A child who inherits two copies of a mutated gene (one from each parent) is highly likely to develop the disease. However, not all people who have two mutated copies develop signs and symptoms of HH.
Executive Order 12333- United States Intelligence Activities « CIPP Guide
Executive Order 12333"
'via Blog this'
Cookie laws
'via Blog this'
Cookie Laws Across Europe | Cookiepedia
The law is in force. Consent may be obtained from browser settings."
'via Blog this'
Evangelical Group Sets Sights on Secular Portland - NYTimes.com
Tuesday, July 22, 2014
ATF stings spark claims of racial profiling: San Diego case cited as one example of bias - 10News.com KGTV ABC10 San Diego
http://www.10news.com/news/investigations/atf-stings-spark-claims-of-racial-profiling-san-diego-case-cited-as-one-example-of-bias-07212014?autoplay=true
From My iPhone
Monday, July 21, 2014
Meet the Online Tracking Device That is Virtually Impossible to Block - ProPublica
'via Blog this'
William Blake’s cottage for sale - Property - The Independent
The Blake Society is launching a crowd-funding campaign in September to raise money to buy the former country home of William Blake.
http://www.independent.co.uk/property/william-blakes-cottage-for-sale-9614092.html
Sunday, July 20, 2014
i think, therefore i (instagr)am. cyberpunk novelist j.g. ballard, predicted social media in i-D 27 years ago | i-D Magazine
http://i-d.vice.com/en_gb/read/think-pieces/3017/i-think-therefore-i-instagram-how-jg-ballard-predicted-social-media-in-i-d-27-years-ago?utm_source=idtwitter
From My iPhone
5 Reasons the War on Drugs Is a Costly Economic Disaster | Alternet
From My iPhone
Friday, July 18, 2014
A New Age in Cyber Security: Public Cyberhealth
The evolution of cyber public health requires coordinated defenses across our community. But just as importantly, these efforts must continue to improve and evolve as our understanding of cyberthreats grows.
http://www.darkreading.com/vulnerabilities---threats/a-new-age-in-cyber-security-public-cyberhealth-/a/d-id/1297360?From My iPhone
Financial services firms are worried they are losing the cyber security war
http://www.out-law.com/en/articles/2014/july/financial-services-firms-are-worried-they-are-losing-the-cyber-security-war/
From My iPhone
Thursday, July 10, 2014
Managing Cyber-Security Risk: Who Cares, and Who Doesn't - Compliance Week
I'm glad that SEC Commissioner Luis Aguilar raised the alarm about cyber-security risks last week. The question is whether anyone will hear it, and I fear the answer is no.
http://mobile.complianceweek.com/managing-cyber-security-risk-who-cares-and-who-doesnt/marticle/355991/From My iPhone