Thursday, April 30, 2015

The 8 Creepiest Cases of Identity Theft of All Time | Cracked.com

The 8 Creepiest Cases of Identity Theft of All Time | Cracked.com: "Even after this was discovered, Social Services was still unwilling to accept that Sachs wasn't the mother, though to their credit, they finally did a DNA test to prove once and for all that she wasn't. "



'via Blog this'



http://www.cracked.com/article_19973_the-8-creepiest-cases-identity-theft-all-time.html

Center for Problem-Oriented Policing | Tool Guides | Analyzing Repeat Victimization

Center for Problem-Oriented Policing | Tool Guides | Analyzing Repeat Victimization: Previous victimization is the single best predictor of victimization. It is a better predictor of future victimization than any other characteristic of crime.

How to Root Your Android Device & Why You Might Want To

Some manufacturers assert that rooting voids your device's warranty. However, rooting will not actually damage your hardware. You can "unroot" your device and manufacturers won't be able to tell if it's been rooted.

http://www.howtogeek.com/115297/how-to-root-your-android-why-you-might-want-to/

Tuesday, April 28, 2015

Pitfalls of “don’t know/no opinion” answer options in surveys | CheckMarket

Pitfalls of “don’t know/no opinion” answer options in surveys | CheckMarket: "In recent years, scientific consensus has shifted towards omitting the “DK/NO”."



'via Blog this'

Export Violations - eCustoms Visual Compliance

Export Violations - eCustoms Visual Compliance: "Epsilon Electronics Inc. was assessed a penalty of $4,073,000 for allegedly violating the Iranian Transactions and Sanctions Regulations (ITSR) after shipping audio and video equipment to a company that it knew, or ought to have known, would re-export it to Iran. Epsilon's lack of a compliance program was mentioned as one factor that helped determine the severity of the fine."



'via Blog this'

Cyber Risk: A Multidimensional Approach

Cyber Risk: A Multidimensional Approach: "High-profile cyber incidents in 2014 reflected the expanding spectrum of cyber threats"



'via Blog this'

Call for Speakers: 2015 ISSA International Conference - Information Systems Security Association

Call for Speakers: 2015 ISSA International Conference - Information Systems Security Association: " We are seeking solution-oriented, proactive, and innovative speakers who will drive the future of security as a vital part of the business landscape."



'via Blog this'

Friday, April 24, 2015

Despite Increased Use of Electronic Medical Records, Fewer U.S. Doctors Believe It Improves Health Outcomes, Accenture Survey Shows | Business Wire

Despite Increased Use of Electronic Medical Records, Fewer U.S. Doctors Believe It Improves Health Outcomes, Accenture Survey Shows | Business Wire: 600 docs, 2012 and 2015 > despite doctors increasing their use of technology over that time, fewer physicians believe that EMR has improved treatment decisions (46 percent in 2015 vs. 62 percent in 2012), reduced medical errors (64 vs. 72 percent) and improved health outcomes for patients (46 vs. 58 percent).

Code of Best Practices in Fair Use for Scholarly Research in Communication | Center for Media & Social Impact

Code of Best Practices in Fair Use for Scholarly Research in Communication | Center for Media & Social Impact: Increasingly, scholars find their research goals stymied because of confusion over their rights to quote copyrighted material, particularly in newer digital formats. Graduate students are being asked by advisors to pick other topics; librarians doubt whether they can archive electronic theses that include illustrative material that is copyrighted; publishers discourage inclusion of evidence that involves copyrighted material.

MSc Degrees in Cyber Security in The United Kingdom

http://www.findamasters.com/search/courses.aspx?CID=GB&Type=2&Keywords=cyber+security

Hacker David Pokora of Canada sentenced by U.S. District Judge Gregory M. Sleet

http://www.delawareonline.com/story/news/crime/2015/04/23/judge-sentences-foreign-hacker-first-time-ever-us/26248359/

Follow up!

Sunday, April 19, 2015

Legal Week - Fear of cyber crime rise as nearly 80% believe their firm could be hit by web hack

Legal Week - Fear of cyber crime rise as nearly 80% believe their firm could be hit by web hack: "Law firm managers are becoming increasingly concerned about the likelihood of their firm being subject to a cyber attack, according to new research from Legal Week. A Legal Week Benchmarker survey"



'via Blog this'

Saturday, April 18, 2015

Digital Dao: AEI - Norse: Subverting Cyber Security Research For Political Fear-Mongering

Digital Dao: AEI - Norse: Subverting Cyber Security Research For Political Fear-Mongering: ""We assert, therefore, that the typical standards of proof for attributing malicious traffic to a specific source are unnecessarily high when we examine traffic from Iranian IP addresses." (p. 12)"



'via Blog this'

Internet Security Threat Report 2015 | Symantec

Internet Security Threat Report 2015 | Symantec: "The Internet Security Threat Report provides an overview and analysis of the year in global threat activity."



'via Blog this'

Friday, April 17, 2015

▶ What if Your Hotel Bill Was Like a Hospital Bill? - YouTube

▶ What if Your Hotel Bill Was Like a Hospital Bill? - YouTube: Health care costs are notoriously opaque, often leaving patients saddled with unexpectedly high bills and making it challenging for them to understand their expenses.

▶ IF AIR TRAVEL WORKED LIKE HEALTH CARE - YouTube

▶ IF AIR TRAVEL WORKED LIKE HEALTH CARE - YouTube



Do not watch if you have high blood pressure.

united nations cyber crime - Google Search

united nations cyber crime - Google Search:



Throws up some interesting stuff...print out the big report?



'via Blog this'

Fighting the Industrialization of Cyber Crime | UN Chronicle

http://unchronicle.un.org/article/fighting-industrialization-cyber-crime/

The sophistication of this criminal business model is such that members of these networks are able to focus on specific tasks including producing malicious code or delivery mechanisms for attacks.

Cybersecurity: A global issue demanding a global approach | UN DESA | United Nations Department of Economic and Social Affairs

http://www.un.org/en/development/desa/news/ecosoc/cybersecurity-demands-global-approach.html

Cybercrime has now become a business which exceeds a trillion dollars a year in online fraud, identity theft, and lost intellectual property, affecting millions of people around the world, as well as countless businesses and the Governments of every nation.

Tuesday, April 14, 2015

productivity gains due to it - Google Search

Check out these results.

Stephen

https://www.google.com/search?q=productivity+gains+due+to+it&oq=productivity+gains+due+to+it&aqs=chrome..69i57.16229j0j4&client=ms-android-att-us&sourceid=chrome-mobile&espv=1&ie=UTF-8

7 Buzzwords to Watch at HIMSS 2015 - HIT Consultant

7 Buzzwords to Watch at HIMSS 2015 - HIT Consultant: "Health information organizations working seamlessly together seems to be a necessity, but forming truly interoperable systems has proven to be a challenge across much of the healthcare industry. That could be due to barriers uncovered in the Workgroup for Electronic Data Interchange survey, including lags in encryption of health data, difficulty in exchanging health data with non-affiliated groups, trouble blending structured and unstructured data, and the need for manual intervention to successfully match electronic patient records."



'via Blog this'

WEDI: Interoperability roadmap must 'better reflect' health IT realities - FierceHealthIT

WEDI: Interoperability roadmap must 'better reflect' health IT realities - FierceHealthIT: "The American Medical Association, meanwhile, criticized the roadmap, saying ONC must let punitive approaches to provider compliance with interoperability go by the wayside.

"This is simply a flawed and misguided means of removing the current barriers to interoperability," AMA said in its comments. "This approach will not work.""



'via Blog this'

Monday, April 13, 2015

Saturday, April 11, 2015

SD Card Formatter - SD Association

SD Card Formatter - SD Association: "The SD Formatter was created specifically for memory cards using the SD/SDHC/SDXC standards."



'via Blog this'

An Introduction to Tor on Chrome OS - OMG! Chrome!

An Introduction to Tor on Chrome OS - OMG! Chrome!: "In this walkthrough we will be installing and configuring the Android apps to work with each other, directing all traffic targeted at a specific port through the Orbot app (and thus into the Tor network), and finally updating our Chrome OS proxy settings"



'via Blog this'

4 Tools to Test and Detect Fake or Counterfeit USB Flash Drives • Raymond.CC

4 Tools to Test and Detect Fake or Counterfeit USB Flash Drives • Raymond.CC:



"it’s a good idea to check any flash device you purchase is the product you paid for."



'via Blog this'

Amazon.com: 64 GB micro Class 10 Card with SD card adapter: Computers & Accessories

Amazon.com: 64 GB micro Class 10 Card with SD card adapter: Computers & Accessories:



"If you do buy a low-priced card, the first thing you should do is test the capacity using a utility called h2testw."



'via Blog this'

2012: Fear of cyber crime stops EU citizens doing business on the web

Fear of cyber crime stops EU citizens doing business on the web: "Almost a third of European citizens lack confidence in using the internet for financial transactions."



'via Blog this'



Check for newer versions of this study by EU.



http://ec.europa.eu/public_opinion/archives/ebs/ebs_423_en.pdf


Singtel Pays $810M For US Cybersecurity Firm - Law360

Singapore Telecom announced Wednesday it will acquire Chicago-based Trustwave Holdings Inc. for $810 million, in a move aimed at bolstering its cybersecurity offerings.

http://www.law360.com/privacy/articles/640664?nl_pk=a5ef2636-e51d-4d2d-b9c7-51e0b83f98be&utm_source=newsletter&utm_medium=email&utm_campaign=privacy

Friday, April 10, 2015

Thursday, April 9, 2015

Hidden backdoor API to root privileges in Apple OS X |

The Admin framework in Apple OS X contains a hidden backdoor API to root privileges...

https://truesecdev.wordpress.com/2015/04/09/hidden-backdoor-api-to-root-privileges-in-apple-os-x/


From My iPhone

How to Protect Against the Dangers of Public WiFi Abuse | Security Architects, LLC

How to Protect Against the Dangers of Public WiFi Abuse | Security Architects, LLC: "ended to assume that HTTPS (use of SSL or TLS) had me covered from the public WiFi risk on login or other sensitive data transfer. "



'via Blog this'

Real costs of IRS budget cuts « Bankrate, Inc.

Real costs of IRS budget cuts « Bankrate, Inc.: "a Treasury Inspector General for Tax Administration examination that found that budget cuts from 2010 to 2012 resulted in a loss of $7.6 billion in federal revenue in 2012 alone."



'via Blog this'

2014 Global Retail Theft Barometer finds slight decrease in shrink worldwide, increase in costs of retail crime in the U.S.

2014 Global Retail Theft Barometer finds slight decrease in shrink worldwide, increase in costs of retail crime in the U.S.: "While shrink in the U.S. also declined from 1.5 percent to 1.48 percent, the cost of retail crime in the country as a percentage of revenue rose 27 percent to 1.74 percent last year from 1.37 percent in 2012. The results of the survey were based upon phone and written surveys conducted in 24 countries among 222 retailers representing more than $740 billion in sales in 2013."



'via Blog this'

Fear of cyber crime stops EU citizens doing business on the web

Fear of cyber crime stops EU citizens doing business on the web: "89% avoid disclosing personal information online and 74% agree that the risk of becoming a victim of cyber crime has increased in the past year."



'via Blog this'

Americans Fear Cybercrime More Than Being Killed | InSerbia News

Americans Fear Cybercrime More Than Being Killed | InSerbia News: Really? "Americans Fear Cybercrime More Than Being Killed"



'via Blog this'

BBC NEWS | UK | Queen opens new Heathrow terminal

BBC NEWS | UK | Queen opens new Heathrow terminal: "accused successive governments of going back on promises that there would not be a fifth terminal at the airport, saying: "The Queen will be unveiling another broken promise rather than a sparkling new terminal.

"The pall of deceit and collusion will hang over the entire proceedings.""



'via Blog this'

e-Commerce Fraud: The Rapidly Growing Challenge for Retail Investigations | LP Magazine

e-Commerce Fraud: The Rapidly Growing Challenge for Retail Investigations | LP Magazine: ""Awareness of risk has always been a core part of any great LP program, and historically, digital space was outside that sphere of awareness; the focus was on people touching a POS or physical merchandise. Now, awareness of the digital space and its crossovers into physical space is equally if not more important." "



'via Blog this'

Cyber Security Survey: Fear of cybercrime up 66 percent in US

Cyber Security Survey: Fear of cybercrime up 66 percent in US: "According to the survey, 46 percent of respondents have been victimized by at least one cybercrime in the last year alone."



'via Blog this'

US Cyber Security Survey: Fear of Cyber Crime Up 66 Percent -- DURHAM, N.C., Feb. 26, 2015 /PRNewswire/ --

US Cyber Security Survey: Fear of Cyber Crime Up 66 Percent -- DURHAM, N.C., Feb. 26, 2015 /PRNewswire/ --: "concerns over the increasing personal and business risks posed by cyber crime and the growing likelihood that cyber crime acts will escalate to physical retaliation"



'via Blog this'

How To Create a Full Android Phone or Tablet Backup Without Rooting or Unlocking Your Device

Android includes a built-in way to back up and restore the contents of your phone or tablet. All you need is a computer and a device running Android 4.0 (Ice Cream Sandwich) or newer.

http://www.howtogeek.com/125375/how-to-create-a-full-android-phone-or-tablet-backup-without-rooting-or-unlocking-your-device/

Destructive hacking attempts target critical infrastructure in Americas: survey | Reuters

Destructive hacking attempts target critical infrastructure in Americas: survey | Reuters: "“I don’t think the public has any appreciation for the scale of attacks against industrial systems,” Blask said. “This happens all the time.”"



'via Blog this'

Destructive hacking attempts target critical infrastructure in Americas: survey | Reuters

Destructive hacking attempts target critical infrastructure in Americas: survey | Reuters: "This is going to be the year we suffer a catastrophe in the hemisphere, and when you will see kinetic response to a threat actor.”"



'via Blog this'

" Examples of research using using thematic coding analysis (chapter 17 URL)

" Examples of research using using thematic coding analysis (chapter 17 URL): "Examples of research using thematic coding analysis (p.489)"



http://www.sagepub.com/upm-data/24614_01_Saldana_Ch_01.pdf



'via Blog this'

QDA Miner Lite - Free Qualitative Data Analysis Software

QDA Miner Lite - Free Qualitative Data Analysis Software: "QDA Miner Lite is a free and easy-to-use version of our popular computer assisted qualitative analysis software.  It can be used for the analysis of textual data such as interview and news transcripts,"



'via Blog this'

Thematic Coding | Better Evaluation

Thematic Coding | Better Evaluation: "Thematic coding is a form of qualitative analysis which involves recording or identifying passages of text or images that are linked by a common theme or idea "



'via Blog this'

Destructive hacking attempts target critical infrastructure in Americas: survey | Reuters

Destructive hacking attempts target critical infrastructure in Americas: survey | Reuters: "Those figures are all the more remarkable because only 60 percent of the 575 respondents said they had detected any attempts to steal data, long considered the predominant hacking goal."



'via Blog this'

Wednesday, April 8, 2015

CompTIA IT Fundamentals Jumpstarts Careers in High School – and Beyond

CompTIA IT Fundamentals Jumpstarts Careers in High School – and Beyond: "When a teacher’s computer goes down in a Doss High School classroom, it isn’t the school’s tech support person who shows up to fix it. Rather, it’s one of the students in technology coordinator J.R. Drummond’s help desk class, putting into practice in the field everything they’re learning in the classroom."



'via Blog this'

Chicago High School Offers Firsthand IT Training

Chicago High School Offers Firsthand IT Training: "Administrators wanted students at Chicago’s West Leyden High School to understand the IT skills needed in the business world, so they set up a technical support internship (TSI) to provide a live IT help desk for the school."



'via Blog this'

▶ How to install Kali Linux on Android - No computer needed! - YouTube

▶ How to install Kali Linux on Android - No computer needed! - YouTube: Installation of Kali on Android is really simple. You just need two apps and you're halfway done!

Android hijacking bug may allow attackers to install password-stealers | Ars Technica

Android hijacking bug may allow attackers to install password-stealers | Ars Technica: "Roughly half of all Android handsets are vulnerable to a newly discovered hack that in some cases allows attackers to surreptitiously modify or replace seemingly benign apps with malicious ones that steal passwords and other sensitive data."



'via Blog this'

Android Installer Hijacking Bug Used as Lure for Malware

Android Installer Hijacking Bug Used as Lure for Malware: "....an Android bug that was dubbed as the “Android Installer Hijacking vulnerability.” This flaw can allow cybercriminals to replace or modify legitimate apps with malicious versions that can steal information"



'via Blog this'

Tuesday, April 7, 2015

Sunday, April 5, 2015

Right-to-carry gun laws linked to increase in violent crime, Stanford research shows

He said that many scholars struggle with the issue of methodology in researching the effects of right-to-carry laws. But overall, his study benefits from the recent data.

http://news.stanford.edu/news/2014/november/donohue-guns-study-111414.html


From My iPhone

Wanted: Problem Solvers with Creativity | EdTech Magazine

"What we find is that candidates with technical skills get hired but don't advance," says Tacy Trowbridge, education programs lead for Adobe. "We need to engage both students and educators to be creators."

http://www.edtechmagazine.com/higher/article/2015/02/wanted-problem-solvers-creativity


From My iPhone

Friday, April 3, 2015

Stolen: Data on Thousands of Williamsport Area Dental Patients | WNEP.com

Stolen: Data on Thousands of Williamsport Area Dental Patients | WNEP.com: Shafer says he’s a computer tech worker who came across the breach while researching a medical office management computer program called “Dentrix” last year.

Advantage Dental reports data breach; Information on over 150,000 patients accessed; provider offers credit monitoring

Advantage Dental reports data breach; Information on over 150,000 patients accessed; provider offers credit monitoring: "All Advantage computers are equipped with anti-virus software, but sometimes software does not detect new variations of a virus,"



And sometimes, not all computers equipped with antivirus are actually running it with the latest updates.