Just a basic blog—snagging random stuff that catches our eye—nothing else, really...
Saturday, February 28, 2015
MITRE Malicious Insiders
Malicious insiders, who have legitimate access to an organization's network, pose a serious threat to an organization.
HIMSS Security Survey | Privacy & Security | HIMSS
... the greatest "security threat motivator" they encounter is that of healthcare workers potentially snooping into the electronic health information of friends, neighbors, spouses or co-workers.
http://www.himss.org/ResourceLibrary/genResourceDetailPDF.aspx?ItemNumber=28270
SecureScan: Free Cloud-based Vulnerability Scanner | Tripwire
More connected devices mean more opportunity for compromise. Tripwire® SecureScan makes it easy for smaller organizations to know exactly which devices are on their networks.
Schneier on Security: Regin Malware
https://www.schneier.com/blog/archives/2014/12/corporate_abuse.html
"...We want, and need, our antivirus companies to tell us everything they can about these threats as soon as they know them, and not wait until the release of a political story makes it impossible for them to remain silent."
Friday, February 27, 2015
Links Found between NSA, Regin Spy tool and QWERTY Keylogger in NSA
From My iPhone
check-and-secure | powered by cyscon GmbH!
Thursday, February 26, 2015
Spam Uses Default Passwords to Hack Routers — Krebs on Security
If successful, the attacker's script would modify the domain name system (DNS) settings on the victim's router, adding the attacker's own DNS server as the primary server while leaving the secondary setting as-is.
http://krebsonsecurity.com/2015/02/spam-uses-default-passwords-to-hack-routers/
Wednesday, February 25, 2015
Transpacific Airline Settlement > mainpage > Claim Form
if you bought a ticket for air travel from one of the Defendants or Co-Conspirators; the ticket included at least one flight segment between the U.S. and Asia or the U.S. and Oceania (Australia, New Zealand or the Pacific Islands); your purchase was made between January 1, 2000 and the Effective Date*, and you were not reimbursed for your purchase by someone else.
Everyday Risk Assessment
USATODAY.com - Schwarzenegger took sexual harassment course
Tuesday, February 24, 2015
Calif. woman sues Lenovo and Superfish - SC Magazine
'via Blog this'
Internet of things starter kit unveiled by ARM and IBM - BBC News
These two components fit together and can be attached to the net via an ethernet cable and to other computer equipment via a USB link.
Bing Ads Revenue and Conversion Tracking? : Magento
'via Blog this'
Monday, February 23, 2015
“SSL hijacker” behind Superfish debacle imperils large number of users | Ars Technica
'via Blog this'
Sunday, February 22, 2015
Our passports don’t define us: Taiye Selasi live at TEDGlobal 2014 | TED Blog
"History is real, and cultures are real, but countries are invented."
Taiye Selasi
http://blog.ted.com/2014/10/07/our-passports-dont-define-us-taiye-selasi-live-at-tedglobal-2014/From My iPhone
Saturday, February 21, 2015
Businesses Need Rapid Incident Detection & Response- Why Obama’s Cybersecurity Proposal Misses the Mark | InfoSec Insights
'via Blog this'
A Hacker Personality Quadrant - The Security Skeptic
'via Blog this'
Anthem Hackers Tried To Breach System As Early As December
'via Blog this'
Superfish Uninstall Instructions - Lenovo Support (US)
'via Blog this'
Friday, February 20, 2015
LastPass - LastPass Superfish Checker
Check if you trust the Superfish CA
you have a problem. Do the test with all browsers installed.
Un experto afirma que los ataques de los hackers precisan de control
Hacker Says He Was Hit With 44 Felonies After He Declined to Work With FBI
http://www.slate.com/blogs/future_tense/2015/02/19/hacker_says_he_was_hit_with_44_felonies_after_he_declined_to_work_with_fbi.html
From My iPhone
Thursday, February 19, 2015
U.S. Terrorism Agency to Tap a Vast Database of Citizens - WSJ
December 13, 2012:
"Now, NCTC can copy entire government databases—flight records, casino-employee lists, the names of Americans hosting foreign-exchange students and many others. The agency has new authority to keep data about innocent U.S. citizens for up to five years, and to analyze it for suspicious patterns of behavior. Previously, both were prohibited. Data about Americans "reasonably believed to constitute terrorism information" may be permanently retained."
Tuesday, February 17, 2015
Ringleader in $5 million ATM "skimming" scheme pleads guilty | NJ.com
http://www.nj.com/news/index.ssf/2015/01/ringleader_in_5_million_atm_skimming_scheme_pleads.html#incart_related_stories
From My iPhone
contagio: Equation samples - from the Kaspersky Report and additional
'via Blog this'
Monday, February 16, 2015
Cybersecurity Sharing: The Latest Fad or a Real Security Breakthrough?
"Unless the stated goal is to identify bad actors more swiftly, and sanction them with greater precision and immediacy, we’re not going to deter the kind of attacks that provoked this new initiative."
'via Blog this'
Report Connects Elite Hacking Group to NSA-Linked Cyberweapons | SecurityWeek.Com
'via Blog this'
9 Confessions From A Former Enterprise Rental Salesman – Consumerist
Cyber-security experts judge '$1bn bank hack' report - BBC News
http://m.bbc.com/news/technology-31487258
From My iPhone
Maikel Zweerink / WhatsSpy-Public | GitLab
'via Blog this'
WhatDaHell, WhatsApp? Student claims 'stalker' tool shows security flaws • The Register
'via Blog this'
How to Protect Your Business Against Fraud | Inc.com
Sunday, February 15, 2015
Security services capable of bypassing encryption, draft code reveals | UK news | The Guardian
'via Blog this'
Forbes, Jason Hope Point to Big Data Mistake in Industrial IoT
'via Blog this'
LexisNexis, Retail Workers Get Nod For $2.38M Settlement - Law360
Under the settlement, LexisNexis has suspended its Esteem database"
'via Blog this'
Jamie Bartlett: The coming online privacy revolution - Index on Censorship | Index on Censorship
'via Blog this'
How the NSA is improving security for everyone | Network World
http://www.networkworld.com/article/2880477/security0/how-the-nsa-is-improving-security-for-everyone.html
From My iPhone
Saturday, February 14, 2015
Groove Armada - Wikipedia, the free encyclopedia
Groove Armada are an electronic music duo from London, England
Edge Hill
Jeremy Dean's Dare Not Walk Alone at the Dikeou Collection
Five years in the making, DNWA offers an insight into the artist's engagement with the various socioeconomic and political challenges that have been at the crux of his visual art practice over the last decade.
David B. Smith Gallery | Contemporary Art Gallery in Denver | Constructed Histories
Press Release
Opening reception on Friday, February 13, 7-9pm
Friday, February 13, 2015
Common Sense Guide to Mitigating Insider Threats, 4th Edition
Personal weather stations can expose your Wi-Fi network | ITworld
In the latest Internet of Things security blunder, personal weather station devices made by Netatmo were found sending users’ Wi-Fi passwords back to the company over unencrypted connections.
Executive Order -- Promoting Private Sector Cybersecurity Information Sharing | The White House
"The purpose of this order is to encourage the voluntary formation of such organizations, to establish mechanisms to continually improve the capabilities and functions of these organizations, and to better allow these organizations to partner with the Federal Government on a voluntary basis.
Such information sharing must be conducted in a manner that protects the privacy and civil liberties of individuals, that preserves business confidentiality, that safeguards the information being shared, and that protects the ability of the Government to detect, investigate, prevent, and respond to cyber threats to the public health and safety, national security, and economic security of the United States."
'via Blog this'
Critical Fixes for the Computer Fraud and Abuse Act | Electronic Frontier Foundation
ESET Security Day London | ESET Security Days 2015 | Live the Experience
Thursday, February 12, 2015
Facebook launches collaborative threat-detection framework — Tech News and Analysis
'via Blog this'
5 Cybersecurity Resolutions for 2015 – CSC Blogs
'via Blog this'
Tuesday, February 10, 2015
Work Starts on National Breach Notification Law - HDM Top Stories Article | Health Data Management
Health Data Experts Praise Nod to Cybersecurity in SOTU Speech - iHealthBeat
Dear Lawmakers, Your New Breach Notice Laws Should Address These Issues | Data Privacy Monitor
The Challenge of Health Care Fraud - The NHCAA
The National Health Care Anti-Fraud Association (NHCAA) estimates that the financial losses due to health care fraud are in the tens of billions of dollars each year.
Proving Your Identity At The Doctor’s Office
What's behind the dramatic rise in medical identity theft? - Fortune
Most Organizations Don't Properly Secure Sensitive Data, Report Finds
Protected Trust | How HIPAA may be affected by Obama's cybersecurity proposal - Protected Trust
43% of companies had a data breach in the past year
JISSec — Journal of Information System Security
The Rising Cost Of Medical Identity Theft And Data Breaches | ID Experts
JAMA Network | JAMA Internal Medicine | Medical Cannabis Laws and Opioid Analgesic Overdose Mortality in the United States, 1999-2010Medical Cannabis Laws and Opioid MortalityMedical Cannabis Laws and Opioid Mortality
http://archinte.jamanetwork.com/Mobile/article.aspx?articleid=1898878
From My iPhone
New Retail Fraud Survey reports shrink up by 22.2% - Retail Knowledge | Retail Knowledge
'via Blog this'
LexisNexis, Retail Workers Get Nod For $2.38M Settlement - Law360
Under the settlement, LexisNexis has suspended its Esteem database"
'via Blog this'
LexisNexis Settles Esteem Retail Theft Database Class Action Lawsuit
'via Blog this'
Obama’s proposed changes to the computer hacking statute: A deep dive - The Washington Post
Orin Kerr: My views are somewhat mixed, but on the whole I’m skeptical of the Administration’s proposal. On the downside, the proposal would make some punishments too severe, and it could expand liability in some undesirable ways. On the upside, there are some notable compromises in the Administration’s position.
Sunday, February 8, 2015
The government's cyberterrorism 'concerns' are a pretext for their own hacking operations | Jeremy Hammond | Comment is free | The Guardian
http://www.theguardian.com/commentisfree/2015/feb/04/government-cyberterrorism-concerns-pretext-their-own-hacking
From My iPhone
Saturday, February 7, 2015
Common Sense for Drug Policy: Excerpts from Cato Institute Analysis:
"The government is waging an aggressive, intemperate, unjustified war on pain doctors."
U.S. retail workers lead the world in theft from employers - Fortune
Friday, February 6, 2015
New Smartphone Accessory Detects HIV in 15 Minutes : Tech : Chinatopix
http://www.chinatopix.com/articles/35909/20150206/smartphone-accessory-detects-hiv-in-15-minutes.htm
From My iPhone
Wednesday, February 4, 2015
SC Congress Call for Speakers 2015 - SC Magazine
'via Blog this'
eCrime 2015 | APWG
Cost of retail crime skyrockets nearly 30 percent | CSO Online
'via Blog this'
BBC News - Cybersecurity: Defending 'unpreventable' cyber attacks
This is where I would find fault with Sony - not in the breach itself, but in not detecting it quickly, and failing to prevent the exfiltration of large amounts of data," says Rick Holland, a security and risk management analyst at Forrester Research.
TEN TANGERINE DREAM ALBUMS TO BLOW YOUR MIND | The Echoes Blog
"These are the signature Dream albums, the blueprint for every retro-space artist out there, the sound that influenced ambient, techno, and more."
https://echoesblog.wordpress.com/2010/02/17/ten-tangerine-dream-albums-to-blow-your-mind/
Tuesday, February 3, 2015
Sunday, February 1, 2015
FBI Busts Russian Spies — War Is Boring — Medium
https://medium.com/war-is-boring/fbi-busts-russian-spies-31051ac3f7b5
From My iPhone
What time is the 2015 Super Bowl kickoff? | Sports | Charlotte Observer
Read more here: http://www.charlotteobserver.com/2015/02/01/5486845/what-time-is-the-2015-super-bowl.html#storylink=cpy
From My iPhone