From My iPhone
Just a basic blog—snagging random stuff that catches our eye—nothing else, really...
Monday, March 31, 2014
Coder Behind Notorious Bank-Hacking Tool Pleads Guilty | Threat Level | WIRED
From My iPhone
Will Target's Lawsuit Finally Expose the Failings of Security Audits? | Threat Level | Wired.com
http://www.wired.com/threatlevel/2014/03/trustwave-target-audit/
From My iPhone
Sunday, March 30, 2014
Privacy Perils of Big Data Integration: A New Task for CDOs?
Protesters are organizing to stop Oakland and the Port of Oakland from building a surveillance hub called the Domain Awareness Center.
FTC Calls for National Data Security Standards as Proposed Legislation Stalls | Barger & Wolen - JDSupra
In congressional testimony, the Federal Trade Commission’s Chairwoman, Edith Ramirez, recently reiterated the FTC’s call for stronger data security laws, while federal legislation concerning data security and breach notification remains in limbo.
This Is How the NSA Is Trying to Win Over the Media
On a page titled "Operating as a responsible citizen," with a picture of U.S. Constitution in the background, the NSA writes that it carries out "missions in ways that are consistent with the Nation's values and laws."
SCADA StrangeLove: All your PLC are belong to us (2)
Group of security researchers focused on ICS/SCADA security to save Humanity from industrial disaster and to keep Purity Of Essence
'Arrogant' Snowden putting lives at risk, says NSA's deputy spyboss • The Register
the techie should have gone to his line manager if he had complaints. This ignores the fact that, as a contractor, he had no whistleblower protection under the law, not to mention was aware of what happened to other NSA staff who complained
How to Get Your Specialty Data Reports | Credit.com Blog
Data broker reports are not subject to Fair Credit Reporting Act requirements, which means you aren’t entitled to a free peek at their data every year, like you are with free annual credit reports at the three major credit reporting agencies.
Thursday, March 27, 2014
Internet voting already okayed in some American states
'via Blog this'
Wednesday, March 26, 2014
Senators Want Ukraine to Arrest Target Hackers in Exchange for Aid - Nextgov.com
http://m.nextgov.com/defense/2014/03/senators-want-ukraine-arrest-target-hackers-exchange-aid/81160/?oref=ng-dropdown&oref=ng-iphone-interstitial-continue
From My iPhone
Monday, March 24, 2014
Scott Wolter Makes More Claims about Holy Bloodline Templar Conspiracies and Jesus' Daughter - JasonColavito.com
Wolter needs these stones to be authentic in order to support his claims to a Templar conspiracy because the Spirit Pond stones’ inscriptions were modeled on those of the Kensington Rune Stone and therefore include another instance of the otherwise non-standard variant-A rune, which Scott Wolter has trademarked under the name the “Hooked X�.”
Saturday, March 22, 2014
A Conversation With Danah Boyd, Author of ‘It’s Complicated,’ About Teenagers Online - NYTimes.com
http://mobile.nytimes.com/blogs/bits/2014/03/22/a-conversation-with-danah-boyd-author-of-its-complicated-about-teens-online/?from=technology
From My iPhone
Friday, March 21, 2014
dns oarc - Google Search
DNS-OARC provides a trusted, shared platform to allow the DNS operations community to share information and data.
From My iPhone
Thursday, March 20, 2014
Wednesday, March 19, 2014
NSA surveillance program reaches ‘into the past’ to retrieve, replay phone calls - The Washington Post
http://m.washingtonpost.com/world/national-security/nsa-surveillance-program-reaches-into-the-past-to-retrieve-replay-phone-calls/2014/03/18/226d2646-ade9-11e3-a49e-76adc9210f19_story.html
From My iPhone
Monday, March 17, 2014
Barton Creek Resort | Omni Barton Creek Resort & Spa in Austin Texas
Surrounded by gently rolling hills and lush gardens, the Omni Barton Creek Resort & Spa welcomes visitors to experience our legendary tradition of Texas-sized hospitality.
Sunday, March 16, 2014
Business Standard and Ratting
To fish for slaves, many employ social engineering tricks. Lonely Fox messages random people on Facebook and infects them.
From My iPhone
Edward Snowden: U.S. obsession with surveillance hurts fight against terrorism - Daily News
Uncle Sam's fixation with mass surveillance has tied up resources that could have thwarted real terror plots, fugitive leaker Edward Snowden argued Monday.
From My iPhoneReport: The flawed processes behind government watchlists - Salon.com
“The government fought to avoid correcting the error for
years, even invoking the state secrets privilege in an unsuccessful effort to prevent judicial scrutiny. She was permitted to leave the country, but to this day, she has been barred from returning, even though the government admits that she should not have been placed on the No Fly List.”
Friday, March 14, 2014
How Belfast can tap into the future of safer software - BelfastTelegraph.co.uk
"If I had my way, we would start teaching kids how to code at five years old," he said.
"We in the USA don't have enough people and I know this is a problem for governments around the world.
Wednesday, March 12, 2014
Tuesday, March 11, 2014
Sunday, March 9, 2014
Perspective: Microsoft risks security reputation ruin by retiring XP - Computerworld
"Microsoft plans to ship the final public patches for Windows XP on April 8. After that, it will not deliver fixes for security vulnerabilities it and others find in the 13-year-old operating system.
"
'via Blog this'
Schneier: It's time to break up the NSA
an agency that prioritizes intelligence gathering over security, and that's increasingly putting us all at risk.
From My iPhone
Schmidt: Not even US gov't can get at Google user data - CNET Mobile
"We were attacked by the Chinese in 2010. We were attacked by the NSA in 2013," Schmidt said.
From My iPhone
Saturday, March 8, 2014
Substance use disorder - Wikipedia, the free encyclopedia
There is also a lesser known situation called pseudo-addiction.[9] A patient will exhibit drug-seeking behavior reminiscent of psychological addiction, but they tend to have genuine pain or other symptoms that have been under-treated. Unlike true psychological addiction, these behaviors tend to stop when the pain is adequately treated.
Friday, March 7, 2014
Elite security posse fostered founders of WhatsApp, Napster | SciTech | GMA News Online
One of several security/startup clusters.
From My iPhone
White House Seeks Public Comment on Implications of Big Data : Inside Privacy : Washington DC Lawyer and Attorney for Data Security, FCC, HIPAA, Electronic Communications Privacy Act
- For example, do the current U.S. policy framework and privacy proposals for protecting consumer privacy and government use of data adequately address issues raised by big data analytics,
Thursday, March 6, 2014
Reverse-engineering SSNs from publicly available data - Boing Boing
With fewer than 1,000 attempts, they could identify the entire nine digits for 8.5 percent of the group.
From My iPhone
How Covert Agents Infiltrate the Internet to Manipulate, Deceive, and Destroy Reputations - The Intercept
the overarching point revealed by all of these documents: namely, that these agencies are attempting to control, infiltrate, manipulate, and warp online discourse, and in doing so, are compromising the integrity of the internet itself.
From My iPhone
Wednesday, March 5, 2014
Will Providers Have Certified EHRs for Meaningful Use Stage 2? - iHealthBeat
a consultant based in Montgomery, Texas, noted that 15 of the 20 vendors that together have a 90% share of the ambulatory EHR market already boast certified products.
Want to Predict the Future of Surveillance? Ask Poor Communities.
Counterintuitive as it may seem, we are targeted for digital surveillance as groups and communities, not as individuals.
Doctors unhappy with EHRs | BenefitsPro
A survey of 1,000 physicians for Medical Economics shows widespread dissatisfaction related to the functionality and cost of these patient record systems, with nearly 70 percent saying the investment isn’t worth it
As Doctors Embrace Tablets, Management Headaches Grow - InformationWeek
Clinicians increasingly are taking tablets to their patient encounters, and that's translating into new opportunities and new headaches for IT professionals
Institute for Electric Grid Cybersecurity Girds Utilities
Monday, March 3, 2014
College Hacker Gets Jail For Changing His Grades to Straight As
Roy Sun, 25, was a $70,000-a-year electrical engineer straight out of college. And why not? He'd gone to one of the best engineering schools in the country. He even studied, um, computer security in his free time. Which he had a lot of, since he never went to class.
http://gawker.com/college-hacker-gets-jail-for-changing-his-grades-to-str-1535130942
New anti-virus software misses corners | smh.com.au
The problem with the PC turned out to be a faulty network switch.
From My iPhone
Sunday, March 2, 2014
19 Extensions to Turn Google Chrome into Penetration Testing tool - InfoSec Institute
CSTA - High School Surveys
Saturday, March 1, 2014
BBC News - World's longest aircraft is unveiled in UK
It is 70% greener than a cargo plane, he says. It doesn't need a runway, just two crew. And it can plonk 50 tonnes anywhere in the world you like, which is 50 times more than a helicopter.
From My iPhoneProtecting Identity Is Your Responsibility | Financial | Articles | ID Theft Blog
You should know that you already have a high degree of protection against fraudulent use of your existing credit cards, and even your debit card.
From My iPhone
DARPA wants to scrub scourge of counterfeit computer gear
Few things can mess up a highly technical system and threaten lives like a counterfeit electronic component, yet the use of such bogus gear is said to be widespread.
From My iPhone