Monday, December 29, 2014

How IoT big data will transform manufacturing automation - TechRepublic

How IoT big data will transform manufacturing automation - TechRepublic: Imagine a world where smart systems, Internet of Things (IoT) sensors, and robotics combine to automate large areas of manufacturing, linking wired and wireless networks throughout the world in the making of products, and relying on both structured and unstructured big data to get the job done.

Monday, December 22, 2014

Health care data is becoming big target for hackers | Marketplace.org

Health care data is becoming big target for hackers | Marketplace.org: Nelson said many healthcare providers still don’t encrypt patient data on laptops or USB sticks, which are often used to transfer files at a hospitals.

Medical Records Are a Gold Mine for Cybercrime | Motherboard

Medical Records Are a Gold Mine for Cybercrime | Motherboard: Last year, it suffered more cyberattacks than any other industry in the US, including, for the first time, the business sector—by a long shot.

Recent International Study Reports Delinquencies in App Privacy Disclosures | InfoLawGroup

Recent International Study Reports Delinquencies in App Privacy Disclosures | InfoLawGroup: In a recently reported study released by the the Global Privacy Enforcement Network (“GPEN”), the GPEN found that a testing sample of 1,211 mobile apps accessed during May of this year failed to provide users with adequate privacy protections under current regulatory provisions in the United States and in other countries.

Global Privacy Enforcement Network | An International Network to Foster Cross-Border Co-operation

Global Privacy Enforcement Network | An International Network to Foster Cross-Border Co-operation: The Privacy Enforcement Network was established to foster cross-border co-operation among privacy authorities.

IRS Needs to Do More to Reduce Risk of Improper Payments of EITC and ACTC

IRS Needs to Do More to Reduce Risk of Improper Payments of EITC and ACTC: The IRS estimated that it paid $63 billion in refundable EITCs and $26.6 billion in refundable ACTCs for Tax Year 2012. The IRS also estimated that 24 percent of all EITC payments made in Fiscal Year 2013, or $14.5 billion, were paid in error.

Chief information security officers hard to find — and harder to keep

Chief information security officers hard to find — and harder to keep: "It's extremely hard to find good people right now," says Tim Eades, CEO of vArmour, a security firm.

Identity theft victims face months of hassle - The Washington Post

Identity theft victims face months of hassle - The Washington Post: The first monitoring report showed crooks opened accounts in his name at Macy’s and Kohl’s department stores, where they racked up more than $7,000 in charges.

'Citizenfour' Producers Sued Over Edward Snowden Leaks (Exclusive) - The Hollywood Reporter

'Citizenfour' Producers Sued Over Edward Snowden Leaks (Exclusive) - The Hollywood Reporter: The lawsuit seeks a constructive trust to redress the alleged unjust enrichment by the film.

Sony to lay off 216 employees in Culver City this summer | 89.3 KPCC

Sony to lay off 216 employees in Culver City this summer | 89.3 KPCC: several media outlets reported layoffs had begun at Sony Pictures Entertainment, especially targeting Sony Pictures Interactive, its digital marketing agency, but the company offered no details at that time. The Interactive group promotes Sony’s movies and TV shows using websites, games and social media.

Norse – Consequences of Overstating the Cyber Terrorism Threat

Norse – Consequences of Overstating the Cyber Terrorism Threat: In other words, simply being convicted of unauthorized access to a computer system allowed a federal judge (who most likely was not familiar with the nuances of cyber threats and threat actors) to assume the worst and lock someone up for a very long time. Outside of the United States, others have made similar decisions regarding cyber threats and the law.

Sony fights back against hackers, stolen file sharers – by firing a DDoS back at them | ExtremeTech

Sony fights back against hackers, stolen file sharers – by firing a DDoS back at them | ExtremeTech: "Sony is now using “hundreds of computers” to perform a DDoS on websites where you can download the leaked data. Better yet, Sony is apparently using Amazon’s cloud servers — Amazon Web Services — to perform the DDoS. While I’m all for proactive security measures, Sony might be taking it a little bit too far here."



'via Blog this'

Sony hack: Studio Tries to Disrupt Downloads of its Stolen Files | Re/code

Sony hack: Studio Tries to Disrupt Downloads of its Stolen Files | Re/code: The company is using hundreds of computers in Asia to execute what’s known as a denial of service attack on sites where its pilfered data is available, according to two people with direct knowledge of the matter.

The Sony hack: how it happened, who is responsible, and what we've learned - Vox

Not bad

http://www.vox.com/2014/12/14/7387945/sony-hack-explained


From My iPhone

Tuesday, December 2, 2014

ISACA survey shows security disconnect for breaches, wearables | CSO Online

ISACA survey shows security disconnect for breaches, wearables | CSO Online: ISACA, a global association of risk and cybersecurity professionals, released its global IT Risk/Reward Barometer today, a survey of over 1,600 IT professionals and 4,000 consumers, in which 94 percent of Americans said they were aware of a major data breach at a retailer.

Big Data: Cyber Security's Silver Bullet? Intel Makes the Case - Forbes

Big Data: Cyber Security's Silver Bullet? Intel Makes the Case - Forbes: Cyber security has been a losing game of whac-a-mole for years as the malefactors manage to pop out of new security holes faster than IT and their software suppliers can plug the last batch.

Target Missed Warnings in Epic Hack of Credit Card Data - Businessweek

Target Missed Warnings in Epic Hack of Credit Card Data - Businessweek: Six months earlier the company began installing a $1.6 million malware detection tool made by the computer security firm FireEye (FEYE), whose customers also include the CIA and the Pentagon. Target had a team of security specialists in Bangalore to monitor its computers around the clock. If Bangalore noticed anything suspicious, Target’s security operations center in Minneapolis would be notified.

Cybersecurity hiring crisis: Rockstars, anger and the billion dollar problem | ZDNet

Cybersecurity hiring crisis: Rockstars, anger and the billion dollar problem | ZDNet: At no time in history has there been a greater need to hire security professionals to protect and defend infrastructures from an inexhaustible onslaught of organized crime, industrial espionage, and nation-state attacks.

Violent U.S. crime drops again, reaches 1970s level: FBI | Reuters

Violent U.S. crime drops again, reaches 1970s level: FBI | Reuters: U.S. violent crimes including murders fell 4.4 percent in 2013 to their lowest number since the 1970s, continuing a decades-long downturn, the FBI said on Monday.

Plumbing the Depths of NSA’s Spying | Consortiumnews

Plumbing the Depths of NSA’s Spying | Consortiumnews: The complexity of the National Security Agency’s spying programs has made some of its ex-technical experts the most dangerous critics

Firms at serious risk of data loss through file sharing, study shows

Ponemon

http://www.computerweekly.com/news/2240233730/Firms-at-serious-risk-of-data-loss-through-file-sharing-study-shows


From My iPhone

Monday, December 1, 2014

UNPACKING THE FAKE | On Publishing

UNPACKING THE FAKE | On Publishing: Overall, UNODC discussed the mechanics of trafficking in a list of 12 illicit flows are organized under four headings: human trafficking and smuggling of migrants; illicit drugs; resources and pollution crime; products (counterfeit goods, fraudulent medicines). An extract from the report looks at the nature of the counterfeit goods market.

Friday, November 28, 2014

Behold The Entrenched — And Reviled — Annual Review : NPR

Behold The Entrenched — And Reviled — Annual Review : NPR: ""Companies are finally facing the fact that this is not the way that we drive optimum performance and engage our workforce," says Kim Ruyle, a talent management consultant."



'via Blog this'

Hacker-hunters finger 'Keyser Soze' of Russian underground card sales • The Register

Hacker-hunters finger 'Keyser Soze' of Russian underground card sales • The Register: "A hacker based in Odessa, Ukraine has become the main provider of data stolen from compromised credit cards, a new study claims."



'via Blog this'

Thursday, November 27, 2014

Identity Crisis: Organizations are Implementing Medical Identity Theft Teams to Combat Rising Incidents

Identity Crisis: Organizations are Implementing Medical Identity Theft Teams to Combat Rising Incidents: Medical identity theft is a growing concern for healthcare providers and healthcare consumers.

FBI denies it used Seattle Times Web link, confirms fake story | Union-Bulletin

The FBI in Seattle has acknowledged it created a fake Associated Press news article to lure a suspect in a series of high-school bomb threats in 2007 into downloading secret software onto his computer, but says it did not use a bogus Seattle Times Web link to do it.

http://m.union-bulletin.com/news/2014/oct/29/fbi-denies-it-used-seattle-times-web-link-confirms/?


From My iPhone

Monday, November 24, 2014

San Diego Blood Bank holds Chargers Drive, looks to future with new ventures | Del Mar Times Mobile


On the health and wellness side, he said, the blood bank's donor centers and bloodmobiles could also be used to deliver basic services, such as flu shots, or conduct health screenings, he said.



From My iPhone

Fwd: Displacement refs

> Guerette, R.T. and K.J. Bowers (2009). "Assessing the Extent of Crime Displacement and Diffusion of Benefits
>
> Felson, Marcus and Ronald V. Clarke. 1998. Opportunity Makes the Thief: Practical Theory for Crime Prevention, vol. Paper 98. London: Home Office, Research Development and Statistics Directorate.
>

VIZIO Ultra HD TV Commercial - Turkey Dinner

Dorothy,

There is a dog just like Kahn in this amusing advert on YouTube:

http://youtu.be/_XpbiH0L5ps

We think the dogs in the ad really enjoyed making it.

Love...Stephen
From My iPhone

Saturday, November 22, 2014

Universal Plug and Play Check by Rapid7

This service can test your router and determine whether it is vulnerable to attack. Clicking the Scan My Router button below will start the test. To learn more about UPnP vulnerabilities, please seethis blog post.

http://upnp-check.rapid7.com/

From Russia with love: Sofacy/Sednit/APT28 is in town | AlienVault

FireEye did a pretty good job on attribution and giving some technical indicators; however, they neglected to reference previous work on this threat actor from companies like PWC, TrendMicro, ESET and others. - See more at: https://www.alienvault.com/open-threat-exchange/blog/from-russia-with-love-sofacy-sednit-apt28-is-in-town#sthash.lcSCU80F.dpuf

https://www.alienvault.com/open-threat-exchange/blog/from-russia-with-love-sofacy-sednit-apt28-is-in-town

Friday, November 21, 2014

Banner Engineering - DX80G2M6-QC - Sensor Accessories - Connectors / Adapters - Allied Electronics

Banner Engineering - DX80G2M6-QC - Sensor Accessories - Connectors / Adapters - Allied Electronics: Frequency Hopping Spread Spectrum (FHSS) technology and Time Division Multiple Access (TDMA) control architecture ensure reliable data delivery within the unlicensed Industrial, Scientific, and Medical (ISM) band

New Citadel Trojan Targets Your Password Managers

New Citadel Trojan Targets Your Password Managers: the configuration file of the notorious malware had been modified to activate a keylogger when users opened either Password Safe or KeePass, two open-source password managers

CSD Projects | Homeland Security

CSD Projects | Homeland Security: CSD leads the federal government’s efforts in funding cybersecurity research and development projects that result in transforming an idea to a deployable solution.

Review of NETGEAR WNDR3400v2 N600 Wireless Router (With DD-WRT Availability): MyOpenRouter

Review of NETGEAR WNDR3400v2 N600 Wireless Router (With DD-WRT Availability): MyOpenRouter: If you are connected to the router via wired Ethernet, then going to http://www.routerlogin.net/ in your web browser (or for advanced users, 192.168.1.1) still works as well.

SSDP reflection DDoS attacks on the rise, Akamai warns - SC Magazine

"When you're pushing hardware that could be deployed to millions, security should take as much consideration as functionality," Seaman said. "If this single manufacturer had simply implemented a properly configured UPnP/SSDP client and/or firewall/routing rules, hundreds of thousands of devices wouldn't be vulnerable."

http://www.scmagazine.com/ssdp-reflection-ddos-attacks-on-the-rise-akamai-warns/article/377754/

Website Security - Analyzing a DDoS Attack via SSDP Protocol | Sucuri Blog

good pcaps ...

http://blog.sucuri.net/2014/09/quick-analysis-of-a-ddos-attack-using-ssdp.html

Monday, November 17, 2014

Gas prices to drop below $3 for the first time in, like, forever

Gas prices to drop below $3 for the first time in, like, forever: "“Consumers are experiencing ‘sticker delight’ as gas prices unexpectedly drop below $3.00 in much of the country,” said Bob Darbelnet, CEO of AAA. “Lower gas prices are a boon to the economy just in time for holiday travel and shopping.”"



'via Blog this'

Holiday Gift Ideas and Gift Guide 2014 - CNET

Holiday Gift Ideas and Gift Guide 2014 - CNET:



'via Blog this'

Sunday, November 16, 2014

FBI — Going Dark: Are Technology, Privacy, and Public Safety on a Collision Course?

FBI — Going Dark: Are Technology, Privacy, and Public Safety on a Collision Course?: "We aren’t seeking a back-door approach. We want to use the front door, with clarity and transparency, and with clear guidance provided by law. We are completely comfortable with court orders and legal process—front doors that provide the evidence and information we need to investigate crime and prevent terrorist attacks."



'via Blog this'

Beyond the hype: The big issues in the European Court’s 'right to be forgotten' ruling | Privacy International

Beyond the hype: The big issues in the European Court’s 'right to be forgotten' ruling | Privacy International: "Europeans, with their ridiculous over-regulation and hypersensitivity to data protection, have now legitimised censorship by ordering Google to remove search results to protect individual’s privacy. "



'via Blog this'

Upping the ante: PCI Security Standard - SC Magazine

Upping the ante: PCI Security Standard - SC Magazine: "PCI Security Standards Council is creating some change this year by updating within its Data Security Standard with PCI DSS version 3.0."



'via Blog this'

WHERE (OR WEAR) NEXT FOR WEARABLE TECH? | Loyalty360.org

WHERE (OR WEAR) NEXT FOR WEARABLE TECH? | Loyalty360.org: " according to our latest research, sales of wearables remain a long way from becoming mass market. "



'via Blog this'

Google's VirusTotal puts Linux malware under the spotlight | ZDNet

Google's VirusTotal puts Linux malware under the spotlight | ZDNet: "Linux malware samples, often submitted as ELF files — the standard binary file format for executables, object code, shared libraries, and core dumps for Unix and Unix-like systems. As such, detection rates by AV vendors remained low. Now the number of ELF files submitted is rising: in the last week alone, there were over 35,000 suspicious ELF files submitted to VirusTotal, slightly less than the 44,000 suspicious Microsoft Word files uploaded."



'via Blog this'

▶ The Jerk - all i need - YouTube

▶ The Jerk - all i need - YouTube



https://www.youtube.com/watch?v=w2X3vVMdh-s

Saturday, November 15, 2014

The Best Apps and Gadgets to Make Holiday Travel Easier | Digital Trends

The Best Apps and Gadgets to Make Holiday Travel Easier | Digital Trends: "The holiday-travel spectacular will test jetsetters’ nerves, for sure, but you can minimize the headaches – hell, maybe even make it enjoyable – with our holiday-travel survival guide. From hardware to software and services, we have compiled a list of recommendations to help you make the most of non-festive travel. "



'via Blog this'

Friday, November 14, 2014

ISACA survey shows security disconnect for breaches, wearables | CSO Online

ISACA survey shows security disconnect for breaches, wearables | CSO Online: ""That means we're going to see wearables coming into the enterprise," he said.  "Next year, wearable devices will become the face of the Internet of Things and become much more significant in terms of acceptance.""



'via Blog this'

Wednesday, November 12, 2014

The Arab Spring of Privacy Is Upon Us | WIRED

The Arab Spring of Privacy Is Upon Us | WIRED: If companies protect the data itself in a zero knowledge environment, it is free to be used by authorized users and useless to non-authorized users.

Monday, November 10, 2014

Does Cybercrime Really Cost $1 Trillion? - ProPublica

Does Cybercrime Really Cost $1 Trillion? - ProPublica: his year, Microsoft Research’s Florencio and Herley wrote an opinion piece in The New York Times that described widely circulated cybercrime estimates as "generated using absurdly bad statistical methods, making them wholly unreliable."

Big Data: Cyber Security's Silver Bullet? Intel Makes the Case - Forbes

Wired article refutes this and pushes for cybercrime. This yet more mojey for ubersec firms, and besides most of this exists already.

http://www.forbes.com/sites/kurtmarko/2014/11/09/big-data-cyber-security/

crime analysis lessons: Topics by Science.gov

Could be useful.

http://www.science.gov/topicpages/c/crime+analysis+lessons.html

Access : The spatial dependency of crime increase dispersion : Security Journal

The process is demonstrated with an example of robbery rates in police sectors of Philadelphia, PA. Security Journal (2010) 23, 18–36. doi:10.1057/sj.2009.16

http://www.palgrave-journals.com/sj/journal/v23/n1/full/sj200916a.html

Monday, November 3, 2014

warisaracket.org/natemerg.html

The IEEPA authorizes the president to regulate commerce after declaring a national emergency in response to any unusual and extraordinary threat to the United States that stems from a foreign source.

http://warisaracket.org/natemerg.html

ICREACH and EO 12333 | emptywheel

Because I need a hobby, I'm knee deep in tracking how EO 12333 got changed in 2008.

https://www.emptywheel.net/2014/11/01/icreach-and-eo-12333/

Facebook Privacy & Security Guide: Everything You Need to Know - Heimdal Security Blog

Facebook Privacy & Security Guide: Everything You Need to Know - Heimdal Security Blog: Set your Security and Privacy Settings in your Facebook Account

American Healthcare: The Startups are Coming | The Network

American Healthcare: The Startups are Coming | The Network: "One sub-sector of the healthcare investment space is “healthcare IT”, which includes only  those companies that leverage mobile, web, IoE, and other technologies to improve healthcare services. Venture funding in healthcare IT companies for 2014 reached $2.4 billion in the first six months of 2014, surpassing the $1.9 billion invested in that sector in all of 2013."



'via Blog this'

Friday, October 31, 2014

Basic criminology reading list

Check refs...

http://cech.uc.edu/content/dam/cech/programs/criminaljustice/docs/Crime%20Prevention%20Comps%20Reading%20List%2015%20May%202013.docx


From My iPhone

Issues with crime displacement studies

Fudged boundaries.

http://www.jratcliffe.net/wp-content/uploads/Sorg-et-al-2014-Boundary-noncompliance-during-place-based-policing-evaluations.pdf

Campbell Crime and Justice Group Title Registration Form

Multiple types of displacement ...

http://www.campbellcollaboration.org/lib/download/725/Displacement_benefits_policing_initiatives_T.pdf

Health care data breaches have hit 30M patients and counting - The Washington Post

Typical ...

http://www.washingtonpost.com/blogs/wonkblog/wp/2014/08/19/health-care-data-breaches-have-hit-30m-patients-and-counting/


From My iPhone

Crime displacement

PDF of big study;

http://extra.shu.ac.uk/ndc/downloads/general/NDC_Crime_Displacement.pdf

Center for Problem-Oriented Policing | Tool Guides | Analyzing Crime Displacement and Diffusion

Great list of sources on crime displacement, for essay.

http://www.popcenter.org/tools/displacement/references


From My iPhone

“You Should Learn to Code” Is The New “You Should Go To Law School” Talk Dads Love To Have — Matter — Medium

Share...

https://medium.com/matter/you-should-learn-to-code-is-the-new-you-should-go-to-law-school-talk-dads-love-to-have-b03bd22b3c99


From My iPhone

Wednesday, October 29, 2014

‘Replay’ Attacks Spoof Chip Card Charges — Krebs on Security

‘Replay’ Attacks Spoof Chip Card Charges — Krebs on Security:



“The [Canadian] bank in this case would take any old cryptogram and they weren’t checking that one-time code because they didn’t have it implemented correctly,” Litan said. “If they saw an EMV transaction and didn’t see the code, they would just authorize the transaction.”

Litan said the fraudsters likely knew that the Canadian bank wasn’t checking the cryptogram and that it wasn’t looking for the dynamic counter code.

Big Brother’s Liberal Friends | The National Interest

NSA and liberals...

http://nationalinterest.org/feature/big-brother%E2%80%99s-liberal-friends-11515?page=show


From My iPhone

Monday, October 27, 2014

‘Replay’ Attacks Spoof Chip Card Charges — Krebs on Security

...fraud transactions coming from Brazil and hitting card accounts stolen in recent retail heists, principally cards compromised as part of the breach at Home Depot.


From My iPhone

White Hat Hackers Fight For Legal Reform - Dark Reading

"Legal is always on the table… This stuff happens all the time, more than people realize, behind the scenes," says Rios, who is director of threat intelligence at Qualys. "A lot of times researchers put themselves at risk as an individual" when they disclose their findings, he says.

http://www.darkreading.com/white-hat-hackers-fight-for-legal-reform/d/d-id/1316838?_mc=sm_dr_editor_kellyjacksonhiggins


From My iPhone

Genetic Testing Report-Appendix 6

Good essay...

http://www.genome.gov/10002401

Sunday, October 26, 2014

Inverse Path - USB armory

The USB armory from Inverse Path is an open source hardware design, implementing a flash drive sized computer.

http://inversepath.com/usbarmory


From My iPhone

Synthetic Identity Fraud Risk Skyrockets - Infosecurity Magazine

Look deeper...

http://www.infosecurity-magazine.com/news/synthetic-identity-fraud-risk?utm_source=twitterfeed&utm_medium=twitter


From My iPhone

The Invention Secrecy Act of 1951

The Invention Secrecy Act of 1951: "Whenever the publication or disclosure of an invention by the granting of a patent, in which the Government does not have a property interest, might, in the opinion of the Commissioner, be detrimental to the national security, he shall make the application for patent in which such invention is disclosed available for inspection to the Atomic Energy Commission, the Secretary of Defense, and the chief officer of any other department or agency of the Government designated by the President as a defense agency of the United States. Each individual to whom the application is disclosed shall sign a dated acknowledgment thereof, which acknowledgment shall be entered in the file of the application."



'via Blog this'

Government secrecy orders on patents keep lid on inventions | The Center for Investigative Reporting

Government secrecy orders on patents keep lid on inventions | The Center for Investigative Reporting: "Gold developed a breakthrough in wireless communications that would help people speak to one another with less interference and greater security.

Then it disappeared like a dropped call."



'via Blog this'

Monday, October 20, 2014

How to Stop Apple From Snooping on Your OS X Yosemite Searches | WIRED

How to Stop Apple From Snooping on Your OS X Yosemite Searches | WIRED: "S X Yosemite pushes the limits of data collection tolerance one step further: its desktop search tool Spotlight uploads your search terms in real time to Apple’s remote servers, by default."



'via Blog this'

How to Stop Apple From Snooping on Your OS X Yosemite Searches | WIRED

How to Stop Apple From Snooping on Your OS X Yosemite Searches | WIRED: "S X Yosemite pushes the limits of data collection tolerance one step further: its desktop search tool Spotlight uploads your search terms in real time to Apple’s remote servers, by default."



'via Blog this'

Thursday, October 9, 2014

MTA grappling with massive data breach | New York Post

The information included the names, social security numbers, and the date of birth of workers with different titles throughout the New York City Transit Authority, including those retired and deceased.

http://nypost.com/2014/03/13/mta-grappling-with-massive-data-breach/

Wednesday, October 8, 2014

The Ebola Outbreak: Good Medicine Against Public Panic

we have so much trust in our 21st century health system that we are confident we can combat Ebola.

http://m.huffpost.com/us/entry/5942446


From My iPhone

Wednesday, October 1, 2014

How IoT big data will transform manufacturing automation - TechRepublic

Realizing the potential of a total manufacturing transformation with use of IoT big data, Germany initiated its Industry 4.0 government initiative to spur its industrial sector.

http://www.techrepublic.com/article/how-iot-big-data-will-transform-manufacturing-automation/

Tuesday, September 30, 2014

10.9.5 update stalled at 'Completing Installati... | Apple Support Communities

10.9.5 update stalled at 'Completing Installati... | Apple Support Communities: "10.9.5 update stalled at 'Completing Installation' in iMac with current software. How to resume or restart?"



'via Blog this'

Power Your Wireless Sensors For 40 Years | Power content from Electronic Design

Short-range wireless sensors are experiencing rapid growth in wide range of applications: RFID to GPS tracking, traditional automatic meter reading (AMR) plus advanced metering infrastructure (AMI), mesh networks, system control and data acquisition (SCADA), data loggers, measurement while drilling, oceanography, environmental systems, emergency/safety systems, military/aerospace systems, and more.

http://m.electronicdesign.com/power/power-your-wireless-sensors-40-years

Energy Harvesting And Wireless Sensor Networks Drive Industrial Applications | Power content from Electronic Design

The industrial sector is keen on using electronics for greater capabilities and higher efficiencies and productivity. Smaller and smarter sensors, ultra-low-power IC devices, energy harvesting performance advances, and better wireless sensor network protocols are spurring this trend.

http://m.electronicdesign.com/power/energy-harvesting-and-wireless-sensor-networks-drive-industrial-applications

Monday, September 29, 2014

Software Defined Radio: A Hacker’s Dream

Software Defined Radio: A Hacker’s Dream: "Like much firmware, many radio devices were not built with security in mind. This makes them vulnerable to attackers on cellular communication systems, Bluetooth™ keyboards, RFID/NFC devices (contactless communications), WiFi, Radio Data Systems (RDS) and other devices."



'via Blog this'

Great Scott Gadgets - HackRF One

Great Scott Gadgets - HackRF One: "HackRF One is test equipment for RF systems. It has not been tested for compliance with regulations governing transmission of radio signals. You are responsible for using your HackRF One legally."



'via Blog this'

NooElec - HackRF One Software Defined Radio: Bundle

NooElec - HackRF One Software Defined Radio: Bundle: "HackRF One from Great Scott Gadgets is a 20MSPS, USB 2.0 Software Defined Radio peripheral capable of transmission or reception of radio signals from 10MHz to 6 GHz."



'via Blog this'

How to Make a $19 Police Radio Scanner

How to Make a $19 Police Radio Scanner: "At this point we can launch the Digital Speech Decoder executable and check the Enable box under Trunking in SDRSharp."



'via Blog this'

How to Make a $19 Police Radio Scanner

How to Make a $19 Police Radio Scanner: " I will be using a Newsky TV28T v2 with a RTL2832U & R820T tuner."



'via Blog this'

Sunday, September 28, 2014

Apple Store Favorite IZON Cameras Riddled With Security Holes | The Security Ledger

... administrative credentials for Amazon's S3 cloud service hard coded into the IZON mobile application, which suggests that Stem is using the same credentials for every customer account. 

https://securityledger.com/2013/10/apple-store-favorite-izon-cameras-riddled-with-security-holes/#.VChH0ifn8tA

DEFCON 22: Hack All the Things

 "Secure" baby monitoring device according to their marketing. There is a hard coded username and password for uploading firmware.

http://hackaday.com/2014/08/09/defcon-22-hack-all-the-things/

Thursday, September 25, 2014

Industrial Wireless Sensor Networks | Mouser

Industrial Wireless Sensor Networks | Mouser: Network security is also of grave concern in industrial control systems. The anonymity of a wireless network is not enough to keep it safe from hackers, and this is a growing concern.

Thursday, September 18, 2014

October 2015: The End of the Swipe-and-Sign Credit Card - Corporate Intelligence - WSJ

October 2015: The End of the Swipe-and-Sign Credit Card - Corporate Intelligence - WSJ: "The U.S. is the last major market to still use the old-fashioned swipe-and-sign system, and it’s a big reason why almost half the world’s credit card fraud happens in America, despite the country being home to about a quarter of all credit card transactions."



'via Blog this'

FBI — Two Men Plead Guilty in International Stolen Car and Identity Theft Internet Scam

FBI — Two Men Plead Guilty in International Stolen Car and Identity Theft Internet Scam: "admitted purchasing stolen credit cards and corresponding counterfeit driver’s licenses in bulk from a Singapore-based “carder” website. "



'via Blog this'

An Up-To-Date Layman's Guide To Accessing The Deep Web ⚙ Co.Labs ⚙ code + community

An Up-To-Date Layman's Guide To Accessing The Deep Web ⚙ Co.Labs ⚙ code + community: "To get into the Deep Web these days, you first have to download the Tor add-on for Firefox"



'via Blog this'

JOTS v32n1 - Technology-enabled Crime, Policing and Security

JOTS v32n1 - Technology-enabled Crime, Policing and Security: Crime, policing and security are enabled by and co-evolve with technologies that make them possible.

Tuesday, September 2, 2014

Genetics in Medicine - HFE-associated hereditary hemochromatosis

Genetics in Medicine - HFE-associated hereditary hemochromatosis: In populations of northern European descent, the p.C282Y mutation in the HFE gene is highly prevalent, and HFE-associated hereditary hemochromatosis is the most common type of inherited iron overload disorder.

New! Supply Chain Risk Management Standard

...a practitioner's guide to SCRM and associated processes for the management of risks within the organization and its end-to-end supply chain.

https://www.asisonline.org/About-ASIS/Who-We-Are/Whats-New/Pages/New-Supply-Chain-Risk-Management-Standard.aspx

Monday, September 1, 2014

Sunday, August 31, 2014

Jihadists Buy 'Islam for Dummies' on Amazon | New Republic

"... what inspires the most lethal terrorists in the world today is not so much the Quran or religious teachings as a thrilling cause and call to action that promises glory and esteem in the eyes of friends,"

http://www.newrepublic.com/article/119182/jihadists-buy-islam-dummies-amazon


From My iPhone

LizardSquad DDoS Hacker Group Reportedly Busted And Exposed - HotHardware

The FBI has been hunting down the person, or persons, responsible not only for the DDoS attack but the grounding of a plane when the group tweeted a false bomb threat as well.

http://hothardware.com/m/News/LizardSquad-DDoS-Hacker-Group-Reportedly-Busted-And-Exposed/default.aspx

PayAppSec - PayAppSec - a blog covering payment security and technology by Slava Gomzin

"incidents hitting large retailers such as Target, Neiman-Marcus, Michael’s, Sally Beauty, and P.F. Chang’s. These breaches are raising a lot of questions, one of the most important of which is: Are we going to see more of these?

The short answer is yes; in the foreseeable future we will continue to see more breaches. Here’s why:"



PayAppSec - PayAppSec - a blog covering payment security and technology by Slava Gomzin:



'via Blog this'

Friday, August 29, 2014

Prevalent Iron Metabolism Gene Variants Associated with Increased Brain Ferritin Iron in Healthy Older Men

Prevalent Iron Metabolism Gene Variants Associated with Increased Brain Ferritin Iron in Healthy Older Men: "Prevalent gene variants involved in iron metabolism [hemochromatosis (HFE) H63D and transferrin C2 (TfC2)] have been associated with higher risk and earlier age at onset of Alzheimer’s disease (AD), especially in men. "



'via Blog this'

Neuropsychopharmacology - Gender and Iron Genes May Modify Associations Between Brain Iron and Memory in Healthy Aging

Neuropsychopharmacology - Gender and Iron Genes May Modify Associations Between Brain Iron and Memory in Healthy Aging: "We also observed that gene variants involved in iron metabolism (hemochromatosis H63D (HFE H63D) and transferrin C2 (TfC2) variants) are associated with higher brain iron levels in healthy older men (Bartzokis et al, 2010). "



'via Blog this'

CompTIA | The Target Data Breach: Anatomy of an Attack - Powered by CompTIA IT Security Community

CompTIA | The Target Data Breach: Anatomy of an Attack - Powered by CompTIA IT Security Community: "Over 110 million customers were affected by the breach of TARGET and eight (8) other retailers by the Kaptoxa-Rescator malware in November of 2013. "



'via Blog this'

NIST Computer Security Publications - Drafts

NIST Computer Security Publications - Drafts: DRAFT Technical Considerations for Vetting 3rd Party Mobile Applications

FBI — Table 1 Crime in the United States by Volume and Rate

FBI — Table 1: "Crime in the United States
by Volume and Rate per 100,000 Inhabitants, 1993–2012"



'via Blog this'

Genetic Testing Report-Appendix 6

Interesting stuff...

http://www.genome.gov/10002401

Thursday, August 28, 2014

HIPAA and the BYOD Challenge

HIPAA and the BYOD Challenge: If administrators, medical personnel, and others have access to electronic protected health information (ePHI) via their mobile devices, how can hospitals, physician groups, labs, and other covered entities meet HIPAA’s steep data security requirements?

Healthcare Security: CSOs Needed - InformationWeek

Healthcare Security: CSOs Needed - InformationWeek: Until healthcare providers recognize and address their security weaknesses, they risk data loss, vulnerability to hacking, and HIPAA non-compliance.

HIT vendors rely on security standards that don't meet HIPAA requirements - FierceEMR

HIT vendors rely on security standards that don't meet HIPAA requirements - FierceEMR: Health IT vendors don't often protect electronic patient information in accordance with HIPAA, even when they and their provider clients think that they're in compliance with the law

3 Do’s and Don’ts of Effective HIPAA Compliance for BYOD & mHealth

3 Do’s and Don’ts of Effective HIPAA Compliance for BYOD & mHealth: Clinicians use 6.4 different mobile devices in a day on average

MiHIN Director reviews HIE security protocols, agreements | HealthITSecurity.com

MiHIN Director reviews HIE security protocols, agreements | HealthITSecurity.com: Pletcher explains in this one-on-one how MiHIN views secure data exchange in the context of having multiple levels of connectivity.

Risk Analysis Is NOT A Graduation Exercise!

Risk Analysis Is NOT A Graduation Exercise!: A single risk analysis performed correctly can support multiple business requirements.

Historical Tables | The White House

http://m.whitehouse.gov/omb/budget/historicals

The Hackers Inside Your Supply Chain - Talking Logistics with Adrian GonzalezTalking Logistics with Adrian Gonzalez

The Hackers Inside Your Supply Chain - Talking Logistics with Adrian GonzalezTalking Logistics with Adrian Gonzalez: "Two recent reports highlight the growing threat of cyber-terrorism on supply chains."



'via Blog this'

Windows XP Hacked, Supply Chain Poisoned | Malware | TechNewsWorld

Windows XP Hacked, Supply Chain Poisoned | Malware | TechNewsWorld: "Supply chain compromise is a security pro's worst nightmare. The thought of malware being planted on computer devices before they leave the factory sends shivers down a cyberdefender's spine. "



'via Blog this'

Supply chain cyber security - Wikipedia, the free encyclopedia

Supply chain cyber security - Wikipedia, the free encyclopedia: "The acting deputy undersecretary for the National Protection and Programs Directorate for the United States Department of Homeland Security, Greg Schaffer, said at a hearing that he is aware that there are instances where malware has been found on imported electronic and computer devices sold within the United States. [1]"



'via Blog this'

The Global Supply Chain: Our Economy, Security and Health Depends on It | Stanley M. Bergman

The Global Supply Chain: Our Economy, Security and Health Depends on It | Stanley M. Bergman: "At the World Economic Forum in Davos this year, a group of business, academic and government leaders discussed potential scenarios like these and what we can do to prepare for them in a session titled "Global Supply Chain Resilience." "



'via Blog this'

IMB: Guard against threat of cyber attacks

IMB: Guard against threat of cyber attacks: "The International Maritime Bureau (IMB) is calling for vigilance in the maritime sector as it emerges that shipping and the supply chain is the ‘next playground for hackers’."



'via Blog this'

Sunday, August 24, 2014

This is why you can't trust the NSA. Ever.

But there's a lot Clapper's office isn't saying. First, his office is hiding almost all the dates on these documents (it took matching these with many other public documents to come up with the estimates in this article).

http://m.theweek.com/article/index/266785/this-is-why-you-cant-trust-the-nsa-ever

Tuesday, August 19, 2014

DEFCON 19: Introduction to Tamper Evident Devices (w speaker) - YouTube

DEFCON 19: Introduction to Tamper Evident Devices (w speaker) - YouTube: "Tamper evident technologies are quickly becoming an interesting topic for hackers around the world. DEF CON 18 (2010) held the first ever "Tamper Evident" contest"



'via Blog this'

Monday, August 18, 2014

Cisco: Blackhole arrest cuts exploit-kit traffic, but don't let your guard down | Network World

Exploit kits of cybercrime tools fell into a big slump in the first half of this year after Russian authorities nabbed the alleged creator of the popular Blackhole kit, but users aren't necessarily safer.


From My iPhone

Sunday, August 17, 2014

Cyber-Security Expert Warns Of 'False Flag' Digital Attacks - Forbes

"the ability to disrupt electronic trade, divert funds, or overload IT systems so that transactions cannot be completed, can have an effect that goes far beyond the geographies where disputes are raging."

http://www.forbes.com/sites/jasperhamill/2014/07/31/cyber-security-expert-warns-of-false-flag-digital-attacks/


From My iPhone

Odds ratio - Wikipedia, the free encyclopedia

In statistics, the odds ratio[1][2][3](usually abbreviated "OR") is one of three main ways to quantify how strongly the presence or absence of property A is associated with the presence or absence of property B in a given population.


From My iPhone

369 selected items - PubMed - NCBI

Powell on HH

http://www.ncbi.nlm.nih.gov/pubmed?term=Powell%20LW%5BAuthor%5D&cauthor=true&cauthor_uid=16476869

Saturday, August 16, 2014

Cisco on Blackhole

Exploit kits of cybercrime tools fell into a big slump in the first half of this year after Russian authorities nabbed the alleged creator of the popular Blackhole kit, but users aren't necessarily safer.


From My iPhone

Secure Passport and Travel Visa Order Form

Once completed, a visa specialist will personally contact you to walk you through the visa application documents you'll need to gather and send to us to begin processing.  

https://www.passportsandvisas.com/singleorder/step2visa.asp?id=2807&producttype=Tourist%20Rush&countryvisit=Brazil&countryorigin=United%20States&jurisdictional=N

Thursday, August 7, 2014

Google To Reward Sites With HTTPS Security In Search Rankings - Forbes

For now, it's just a "lightweight signal that will affect "fewer than 1% of global queries and carrying less weight than other signals such as high-quality content." But that could change over time as Google strives to "encourage all website owners to switch from HTTP to HTTPS to keep everyone safe on the web."

http://www.forbes.com/sites/larrymagid/2014/08/07/google-to-reward-sites-with-http-security-in-search-rankings/


From My iPhone

A New, Evidence-based Estimate of Patient Harms Associated

A New, Evidence-based Estimate of Patient Harms Associated: Journal of Patient Safety: number of premature deaths associated with preventable harm to patients was estimated at more than 400,000 per year.

Friday, August 1, 2014

New Cyberthreat Report By SANS Institute Delivers Chilling Warning To Healthcare Industry - Forbes

New Cyberthreat Report By SANS Institute Delivers Chilling Warning To Healthcare Industry - Forbes: A SANS examination of cyberthreat intelligence provided by Norse supports these statistics and conclusions, revealing exploited medical devices, conferencing systems, web servers, printers and edge security technologies all sending out malicious traffic from medical organizations. Some of these devices and applications were openly exploitable (such as default admin passwords) for many months before the breached organization recognized or repaired the breach. Barbara Filkins – SANS Analyst and Healthcare Specialist

Cyber-security: The internet of things (to be hacked) | The Economist

The wireless heart monitor of Dick Cheney, America's former vice-president, was modified to stop remote assassination attempts.

http://www.economist.com/news/leaders/21606829-hooking-up-gadgets-web-promises-huge-benefits-security-must-not-be


From My iPhone

Wednesday, July 30, 2014

Friday, July 25, 2014

Phishing gang stole money from Apple users to fund UK criminal network | CSO Online

Phishing gang stole money from Apple users to fund UK criminal network | CSO Online: A man and a woman have been handed a total of 14 years in jail for a phishing scam the proceeds of which were used to buy air tickets for Romanian criminals wanting to travel to the UK.

Wednesday, July 23, 2014

Haemochromatosis | Health | Patient.co.uk

What about diet?

The increased levels of iron in the body cannot be treated by diet alone. Removing blood has a much bigger effect on reducing the levels of iron in the body. However, there are some recommendations:

http://www.patient.co.uk/health/haemochromatosis

Learning About Hereditary Hemochromatosis

A child who inherits two copies of a mutated gene (one from each parent) is highly likely to develop the disease. However, not all people who have two mutated copies develop signs and symptoms of HH.

http://www.genome.gov/10001214

Executive Order 12333- United States Intelligence Activities « CIPP Guide

Executive Order 12333- United States Intelligence Activities « CIPP Guide: "In preparation for the Certified Information Privacy Professional Government exam, a privacy professional should be comfortable with topics related to this post including:

Executive Order 12333"



'via Blog this'

Cookie laws

Cookie laws: "Both the ICO and the Government have not ruled out the use of browser settings to achieve compliance in the future.  "



'via Blog this'

Cookie Laws Across Europe | Cookiepedia

Cookie Laws Across Europe | Cookiepedia: "Slovakia
The law is in force. Consent may be obtained from browser settings."



'via Blog this'

Evangelical Group Sets Sights on Secular Portland - NYTimes.com

Evangelical Group Sets Sights on Secular Portland - NYTimes.com: "We do teach that children are sinners, but we're not nasty about it,"

Monday, July 21, 2014

Friday, July 18, 2014

A New Age in Cyber Security: Public Cyberhealth

The evolution of cyber public health requires coordinated defenses across our community. But just as importantly, these efforts must continue to improve and evolve as our understanding of cyberthreats grows.

http://www.darkreading.com/vulnerabilities---threats/a-new-age-in-cyber-security-public-cyberhealth-/a/d-id/1297360?


From My iPhone

Financial services firms are worried they are losing the cyber security war

Three legal and regulatory issues stood out. These were the changing cyber breach reporting regimes; data protection law and its impact on monitoring and profiling for security purposes, and the security of the supply chain.
http://www.out-law.com/en/articles/2014/july/financial-services-firms-are-worried-they-are-losing-the-cyber-security-war/


From My iPhone

Monday, July 7, 2014

True or false: NSA snooping disclosures hurt cloud adoption — Tech News and Analysis

True or false: NSA snooping disclosures hurt cloud adoption — Tech News and Analysis: t’s complicated. Edward Snowden’s disclosures at the very least raised questions that all IT pros need to think about regardless of their deployment choices.