Monday, December 29, 2014

How IoT big data will transform manufacturing automation - TechRepublic

How IoT big data will transform manufacturing automation - TechRepublic: Imagine a world where smart systems, Internet of Things (IoT) sensors, and robotics combine to automate large areas of manufacturing, linking wired and wireless networks throughout the world in the making of products, and relying on both structured and unstructured big data to get the job done.

Monday, December 22, 2014

Health care data is becoming big target for hackers | Marketplace.org

Health care data is becoming big target for hackers | Marketplace.org: Nelson said many healthcare providers still don’t encrypt patient data on laptops or USB sticks, which are often used to transfer files at a hospitals.

Medical Records Are a Gold Mine for Cybercrime | Motherboard

Medical Records Are a Gold Mine for Cybercrime | Motherboard: Last year, it suffered more cyberattacks than any other industry in the US, including, for the first time, the business sector—by a long shot.

Recent International Study Reports Delinquencies in App Privacy Disclosures | InfoLawGroup

Recent International Study Reports Delinquencies in App Privacy Disclosures | InfoLawGroup: In a recently reported study released by the the Global Privacy Enforcement Network (“GPEN”), the GPEN found that a testing sample of 1,211 mobile apps accessed during May of this year failed to provide users with adequate privacy protections under current regulatory provisions in the United States and in other countries.

Global Privacy Enforcement Network | An International Network to Foster Cross-Border Co-operation

Global Privacy Enforcement Network | An International Network to Foster Cross-Border Co-operation: The Privacy Enforcement Network was established to foster cross-border co-operation among privacy authorities.

IRS Needs to Do More to Reduce Risk of Improper Payments of EITC and ACTC

IRS Needs to Do More to Reduce Risk of Improper Payments of EITC and ACTC: The IRS estimated that it paid $63 billion in refundable EITCs and $26.6 billion in refundable ACTCs for Tax Year 2012. The IRS also estimated that 24 percent of all EITC payments made in Fiscal Year 2013, or $14.5 billion, were paid in error.

Chief information security officers hard to find — and harder to keep

Chief information security officers hard to find — and harder to keep: "It's extremely hard to find good people right now," says Tim Eades, CEO of vArmour, a security firm.

Identity theft victims face months of hassle - The Washington Post

Identity theft victims face months of hassle - The Washington Post: The first monitoring report showed crooks opened accounts in his name at Macy’s and Kohl’s department stores, where they racked up more than $7,000 in charges.

'Citizenfour' Producers Sued Over Edward Snowden Leaks (Exclusive) - The Hollywood Reporter

'Citizenfour' Producers Sued Over Edward Snowden Leaks (Exclusive) - The Hollywood Reporter: The lawsuit seeks a constructive trust to redress the alleged unjust enrichment by the film.

Sony to lay off 216 employees in Culver City this summer | 89.3 KPCC

Sony to lay off 216 employees in Culver City this summer | 89.3 KPCC: several media outlets reported layoffs had begun at Sony Pictures Entertainment, especially targeting Sony Pictures Interactive, its digital marketing agency, but the company offered no details at that time. The Interactive group promotes Sony’s movies and TV shows using websites, games and social media.

Norse – Consequences of Overstating the Cyber Terrorism Threat

Norse – Consequences of Overstating the Cyber Terrorism Threat: In other words, simply being convicted of unauthorized access to a computer system allowed a federal judge (who most likely was not familiar with the nuances of cyber threats and threat actors) to assume the worst and lock someone up for a very long time. Outside of the United States, others have made similar decisions regarding cyber threats and the law.

Sony fights back against hackers, stolen file sharers – by firing a DDoS back at them | ExtremeTech

Sony fights back against hackers, stolen file sharers – by firing a DDoS back at them | ExtremeTech: "Sony is now using “hundreds of computers” to perform a DDoS on websites where you can download the leaked data. Better yet, Sony is apparently using Amazon’s cloud servers — Amazon Web Services — to perform the DDoS. While I’m all for proactive security measures, Sony might be taking it a little bit too far here."



'via Blog this'

Sony hack: Studio Tries to Disrupt Downloads of its Stolen Files | Re/code

Sony hack: Studio Tries to Disrupt Downloads of its Stolen Files | Re/code: The company is using hundreds of computers in Asia to execute what’s known as a denial of service attack on sites where its pilfered data is available, according to two people with direct knowledge of the matter.

The Sony hack: how it happened, who is responsible, and what we've learned - Vox

Not bad

http://www.vox.com/2014/12/14/7387945/sony-hack-explained


From My iPhone

Tuesday, December 2, 2014

ISACA survey shows security disconnect for breaches, wearables | CSO Online

ISACA survey shows security disconnect for breaches, wearables | CSO Online: ISACA, a global association of risk and cybersecurity professionals, released its global IT Risk/Reward Barometer today, a survey of over 1,600 IT professionals and 4,000 consumers, in which 94 percent of Americans said they were aware of a major data breach at a retailer.

Big Data: Cyber Security's Silver Bullet? Intel Makes the Case - Forbes

Big Data: Cyber Security's Silver Bullet? Intel Makes the Case - Forbes: Cyber security has been a losing game of whac-a-mole for years as the malefactors manage to pop out of new security holes faster than IT and their software suppliers can plug the last batch.

Target Missed Warnings in Epic Hack of Credit Card Data - Businessweek

Target Missed Warnings in Epic Hack of Credit Card Data - Businessweek: Six months earlier the company began installing a $1.6 million malware detection tool made by the computer security firm FireEye (FEYE), whose customers also include the CIA and the Pentagon. Target had a team of security specialists in Bangalore to monitor its computers around the clock. If Bangalore noticed anything suspicious, Target’s security operations center in Minneapolis would be notified.

Cybersecurity hiring crisis: Rockstars, anger and the billion dollar problem | ZDNet

Cybersecurity hiring crisis: Rockstars, anger and the billion dollar problem | ZDNet: At no time in history has there been a greater need to hire security professionals to protect and defend infrastructures from an inexhaustible onslaught of organized crime, industrial espionage, and nation-state attacks.

Violent U.S. crime drops again, reaches 1970s level: FBI | Reuters

Violent U.S. crime drops again, reaches 1970s level: FBI | Reuters: U.S. violent crimes including murders fell 4.4 percent in 2013 to their lowest number since the 1970s, continuing a decades-long downturn, the FBI said on Monday.

Plumbing the Depths of NSA’s Spying | Consortiumnews

Plumbing the Depths of NSA’s Spying | Consortiumnews: The complexity of the National Security Agency’s spying programs has made some of its ex-technical experts the most dangerous critics

Firms at serious risk of data loss through file sharing, study shows

Ponemon

http://www.computerweekly.com/news/2240233730/Firms-at-serious-risk-of-data-loss-through-file-sharing-study-shows


From My iPhone

Monday, December 1, 2014

UNPACKING THE FAKE | On Publishing

UNPACKING THE FAKE | On Publishing: Overall, UNODC discussed the mechanics of trafficking in a list of 12 illicit flows are organized under four headings: human trafficking and smuggling of migrants; illicit drugs; resources and pollution crime; products (counterfeit goods, fraudulent medicines). An extract from the report looks at the nature of the counterfeit goods market.