Friday, November 28, 2014

Behold The Entrenched — And Reviled — Annual Review : NPR

Behold The Entrenched — And Reviled — Annual Review : NPR: ""Companies are finally facing the fact that this is not the way that we drive optimum performance and engage our workforce," says Kim Ruyle, a talent management consultant."



'via Blog this'

Hacker-hunters finger 'Keyser Soze' of Russian underground card sales • The Register

Hacker-hunters finger 'Keyser Soze' of Russian underground card sales • The Register: "A hacker based in Odessa, Ukraine has become the main provider of data stolen from compromised credit cards, a new study claims."



'via Blog this'

Thursday, November 27, 2014

Identity Crisis: Organizations are Implementing Medical Identity Theft Teams to Combat Rising Incidents

Identity Crisis: Organizations are Implementing Medical Identity Theft Teams to Combat Rising Incidents: Medical identity theft is a growing concern for healthcare providers and healthcare consumers.

FBI denies it used Seattle Times Web link, confirms fake story | Union-Bulletin

The FBI in Seattle has acknowledged it created a fake Associated Press news article to lure a suspect in a series of high-school bomb threats in 2007 into downloading secret software onto his computer, but says it did not use a bogus Seattle Times Web link to do it.

http://m.union-bulletin.com/news/2014/oct/29/fbi-denies-it-used-seattle-times-web-link-confirms/?


From My iPhone

Monday, November 24, 2014

San Diego Blood Bank holds Chargers Drive, looks to future with new ventures | Del Mar Times Mobile


On the health and wellness side, he said, the blood bank's donor centers and bloodmobiles could also be used to deliver basic services, such as flu shots, or conduct health screenings, he said.



From My iPhone

Fwd: Displacement refs

> Guerette, R.T. and K.J. Bowers (2009). "Assessing the Extent of Crime Displacement and Diffusion of Benefits
>
> Felson, Marcus and Ronald V. Clarke. 1998. Opportunity Makes the Thief: Practical Theory for Crime Prevention, vol. Paper 98. London: Home Office, Research Development and Statistics Directorate.
>

VIZIO Ultra HD TV Commercial - Turkey Dinner

Dorothy,

There is a dog just like Kahn in this amusing advert on YouTube:

http://youtu.be/_XpbiH0L5ps

We think the dogs in the ad really enjoyed making it.

Love...Stephen
From My iPhone

Saturday, November 22, 2014

Universal Plug and Play Check by Rapid7

This service can test your router and determine whether it is vulnerable to attack. Clicking the Scan My Router button below will start the test. To learn more about UPnP vulnerabilities, please seethis blog post.

http://upnp-check.rapid7.com/

From Russia with love: Sofacy/Sednit/APT28 is in town | AlienVault

FireEye did a pretty good job on attribution and giving some technical indicators; however, they neglected to reference previous work on this threat actor from companies like PWC, TrendMicro, ESET and others. - See more at: https://www.alienvault.com/open-threat-exchange/blog/from-russia-with-love-sofacy-sednit-apt28-is-in-town#sthash.lcSCU80F.dpuf

https://www.alienvault.com/open-threat-exchange/blog/from-russia-with-love-sofacy-sednit-apt28-is-in-town

Friday, November 21, 2014

Banner Engineering - DX80G2M6-QC - Sensor Accessories - Connectors / Adapters - Allied Electronics

Banner Engineering - DX80G2M6-QC - Sensor Accessories - Connectors / Adapters - Allied Electronics: Frequency Hopping Spread Spectrum (FHSS) technology and Time Division Multiple Access (TDMA) control architecture ensure reliable data delivery within the unlicensed Industrial, Scientific, and Medical (ISM) band

New Citadel Trojan Targets Your Password Managers

New Citadel Trojan Targets Your Password Managers: the configuration file of the notorious malware had been modified to activate a keylogger when users opened either Password Safe or KeePass, two open-source password managers

CSD Projects | Homeland Security

CSD Projects | Homeland Security: CSD leads the federal government’s efforts in funding cybersecurity research and development projects that result in transforming an idea to a deployable solution.

Review of NETGEAR WNDR3400v2 N600 Wireless Router (With DD-WRT Availability): MyOpenRouter

Review of NETGEAR WNDR3400v2 N600 Wireless Router (With DD-WRT Availability): MyOpenRouter: If you are connected to the router via wired Ethernet, then going to http://www.routerlogin.net/ in your web browser (or for advanced users, 192.168.1.1) still works as well.

SSDP reflection DDoS attacks on the rise, Akamai warns - SC Magazine

"When you're pushing hardware that could be deployed to millions, security should take as much consideration as functionality," Seaman said. "If this single manufacturer had simply implemented a properly configured UPnP/SSDP client and/or firewall/routing rules, hundreds of thousands of devices wouldn't be vulnerable."

http://www.scmagazine.com/ssdp-reflection-ddos-attacks-on-the-rise-akamai-warns/article/377754/

Website Security - Analyzing a DDoS Attack via SSDP Protocol | Sucuri Blog

good pcaps ...

http://blog.sucuri.net/2014/09/quick-analysis-of-a-ddos-attack-using-ssdp.html

Monday, November 17, 2014

Gas prices to drop below $3 for the first time in, like, forever

Gas prices to drop below $3 for the first time in, like, forever: "“Consumers are experiencing ‘sticker delight’ as gas prices unexpectedly drop below $3.00 in much of the country,” said Bob Darbelnet, CEO of AAA. “Lower gas prices are a boon to the economy just in time for holiday travel and shopping.”"



'via Blog this'

Holiday Gift Ideas and Gift Guide 2014 - CNET

Holiday Gift Ideas and Gift Guide 2014 - CNET:



'via Blog this'

Sunday, November 16, 2014

FBI — Going Dark: Are Technology, Privacy, and Public Safety on a Collision Course?

FBI — Going Dark: Are Technology, Privacy, and Public Safety on a Collision Course?: "We aren’t seeking a back-door approach. We want to use the front door, with clarity and transparency, and with clear guidance provided by law. We are completely comfortable with court orders and legal process—front doors that provide the evidence and information we need to investigate crime and prevent terrorist attacks."



'via Blog this'

Beyond the hype: The big issues in the European Court’s 'right to be forgotten' ruling | Privacy International

Beyond the hype: The big issues in the European Court’s 'right to be forgotten' ruling | Privacy International: "Europeans, with their ridiculous over-regulation and hypersensitivity to data protection, have now legitimised censorship by ordering Google to remove search results to protect individual’s privacy. "



'via Blog this'

Upping the ante: PCI Security Standard - SC Magazine

Upping the ante: PCI Security Standard - SC Magazine: "PCI Security Standards Council is creating some change this year by updating within its Data Security Standard with PCI DSS version 3.0."



'via Blog this'

WHERE (OR WEAR) NEXT FOR WEARABLE TECH? | Loyalty360.org

WHERE (OR WEAR) NEXT FOR WEARABLE TECH? | Loyalty360.org: " according to our latest research, sales of wearables remain a long way from becoming mass market. "



'via Blog this'

Google's VirusTotal puts Linux malware under the spotlight | ZDNet

Google's VirusTotal puts Linux malware under the spotlight | ZDNet: "Linux malware samples, often submitted as ELF files — the standard binary file format for executables, object code, shared libraries, and core dumps for Unix and Unix-like systems. As such, detection rates by AV vendors remained low. Now the number of ELF files submitted is rising: in the last week alone, there were over 35,000 suspicious ELF files submitted to VirusTotal, slightly less than the 44,000 suspicious Microsoft Word files uploaded."



'via Blog this'

▶ The Jerk - all i need - YouTube

▶ The Jerk - all i need - YouTube



https://www.youtube.com/watch?v=w2X3vVMdh-s

Saturday, November 15, 2014

The Best Apps and Gadgets to Make Holiday Travel Easier | Digital Trends

The Best Apps and Gadgets to Make Holiday Travel Easier | Digital Trends: "The holiday-travel spectacular will test jetsetters’ nerves, for sure, but you can minimize the headaches – hell, maybe even make it enjoyable – with our holiday-travel survival guide. From hardware to software and services, we have compiled a list of recommendations to help you make the most of non-festive travel. "



'via Blog this'

Friday, November 14, 2014

ISACA survey shows security disconnect for breaches, wearables | CSO Online

ISACA survey shows security disconnect for breaches, wearables | CSO Online: ""That means we're going to see wearables coming into the enterprise," he said.  "Next year, wearable devices will become the face of the Internet of Things and become much more significant in terms of acceptance.""



'via Blog this'

Wednesday, November 12, 2014

The Arab Spring of Privacy Is Upon Us | WIRED

The Arab Spring of Privacy Is Upon Us | WIRED: If companies protect the data itself in a zero knowledge environment, it is free to be used by authorized users and useless to non-authorized users.

Monday, November 10, 2014

Does Cybercrime Really Cost $1 Trillion? - ProPublica

Does Cybercrime Really Cost $1 Trillion? - ProPublica: his year, Microsoft Research’s Florencio and Herley wrote an opinion piece in The New York Times that described widely circulated cybercrime estimates as "generated using absurdly bad statistical methods, making them wholly unreliable."

Big Data: Cyber Security's Silver Bullet? Intel Makes the Case - Forbes

Wired article refutes this and pushes for cybercrime. This yet more mojey for ubersec firms, and besides most of this exists already.

http://www.forbes.com/sites/kurtmarko/2014/11/09/big-data-cyber-security/

crime analysis lessons: Topics by Science.gov

Could be useful.

http://www.science.gov/topicpages/c/crime+analysis+lessons.html

Access : The spatial dependency of crime increase dispersion : Security Journal

The process is demonstrated with an example of robbery rates in police sectors of Philadelphia, PA. Security Journal (2010) 23, 18–36. doi:10.1057/sj.2009.16

http://www.palgrave-journals.com/sj/journal/v23/n1/full/sj200916a.html

Monday, November 3, 2014

warisaracket.org/natemerg.html

The IEEPA authorizes the president to regulate commerce after declaring a national emergency in response to any unusual and extraordinary threat to the United States that stems from a foreign source.

http://warisaracket.org/natemerg.html

ICREACH and EO 12333 | emptywheel

Because I need a hobby, I'm knee deep in tracking how EO 12333 got changed in 2008.

https://www.emptywheel.net/2014/11/01/icreach-and-eo-12333/

Facebook Privacy & Security Guide: Everything You Need to Know - Heimdal Security Blog

Facebook Privacy & Security Guide: Everything You Need to Know - Heimdal Security Blog: Set your Security and Privacy Settings in your Facebook Account

American Healthcare: The Startups are Coming | The Network

American Healthcare: The Startups are Coming | The Network: "One sub-sector of the healthcare investment space is “healthcare IT”, which includes only  those companies that leverage mobile, web, IoE, and other technologies to improve healthcare services. Venture funding in healthcare IT companies for 2014 reached $2.4 billion in the first six months of 2014, surpassing the $1.9 billion invested in that sector in all of 2013."



'via Blog this'