Just a basic blog—snagging random stuff that catches our eye—nothing else, really...
Thursday, December 31, 2015
slight paranoia: October 2006
slight paranoia: October 2006
Soghoian and the airline boarding passes
Soh goy an
http://paranoia.dubfire.net/2006_10_01_archive.html?m=1
Soghoian and the airline boarding passes
Soh goy an
http://paranoia.dubfire.net/2006_10_01_archive.html?m=1
5 Big Developments in Privacy Class Actions in 2015, and 3 to Look for in 2016 | Data Privacy MonitorData Privacy Monitor
5 Big Developments in Privacy Class Actions in 2015, and 3 to Look for
in 2016 | Data Privacy Monitor
http://www.dataprivacymonitor.com/data-breaches/significant-developments-in-privacy-class-actions-in-2015-and-what-to-watch-for-in-2016/
in 2016 | Data Privacy Monitor
http://www.dataprivacymonitor.com/data-breaches/significant-developments-in-privacy-class-actions-in-2015-and-what-to-watch-for-in-2016/
Street gangs migrate from drugs to white-collar crimes - The Dispatch
Street gangs migrate from drugs to white-collar crimes - The Dispatch
http://www.cdispatch.com/news/article.asp?aid=47242
http://www.cdispatch.com/news/article.asp?aid=47242
How does the Cybersecurity Act of 2015 change the Internet surveillance laws? - The Washington Post
How does the Cybersecurity Act of 2015 change the Internet
surveillance laws? - The Washington Post
https://www.washingtonpost.com/news/volokh-conspiracy/wp/2015/12/24/how-does-the-cybersecurity-act-of-2015-change-the-internet-surveillance-laws/
surveillance laws? - The Washington Post
https://www.washingtonpost.com/news/volokh-conspiracy/wp/2015/12/24/how-does-the-cybersecurity-act-of-2015-change-the-internet-surveillance-laws/
‘Donald Trump totally thinks I’m a Muslim’: Atheist hammers Trump on proposed Muslim ban
'Donald Trump totally thinks I'm a Muslim': Atheist hammers Trump on
proposed Muslim ban
http://www.rawstory.com/2015/12/donald-trump-totally-thinks-im-a-muslim-atheist-hammers-trump-on-proposed-muslim-ban/
proposed Muslim ban
http://www.rawstory.com/2015/12/donald-trump-totally-thinks-im-a-muslim-atheist-hammers-trump-on-proposed-muslim-ban/
Spying on Congress and Israel: NSA Cheerleaders Discover Value of Privacy Only When Their Own Is Violated
Spying on Congress and Israel: NSA Cheerleaders Discover Value of
Privacy Only When Their Own Is Violated
https://theintercept.com/2015/12/30/spying-on-congress-and-israel-nsa-cheerleaders-discover-value-of-privacy-only-when-their-own-is-violated/
Privacy Only When Their Own Is Violated
https://theintercept.com/2015/12/30/spying-on-congress-and-israel-nsa-cheerleaders-discover-value-of-privacy-only-when-their-own-is-violated/
Wednesday, December 30, 2015
LG's SmartThinQ hub looks like Amazon's Echo, but that's where it ends
LG's SmartThinQ hub looks like Amazon's Echo, but that's where it ends
http://www.techhive.com/article/3018696/internet-of-things/lgs-smartthinq-connected-home-hub-will-monitor-and-control-appliances-and-sensors.html
http://www.techhive.com/article/3018696/internet-of-things/lgs-smartthinq-connected-home-hub-will-monitor-and-control-appliances-and-sensors.html
Tweet from @torproject
It's the last day of #32C3-please consider making a donation to the Tor Project! https://t.co/twit7DghZT https://t.co/6oGFIkKldj
http://twitter.com/torproject/status/682248940109053952
http://twitter.com/torproject/status/682248940109053952
Cyber security award winner shares risk management strategies | PropertyCasualty360
Cyber security award winner shares risk management strategies |
PropertyCasualty360
http://www.propertycasualty360.com/2015/12/30/cyber-security-award-winner-shares-risk-management
PropertyCasualty360
http://www.propertycasualty360.com/2015/12/30/cyber-security-award-winner-shares-risk-management
Tuesday, December 29, 2015
House redraft limits initial opioid supply to seven days | WBJournal.com
House redraft limits initial opioid supply to seven days | WBJournal.com
http://m.wbjournal.com/article/20151229/NEWS01/151229963/1002
http://m.wbjournal.com/article/20151229/NEWS01/151229963/1002
Monday, December 28, 2015
191 Million US Voters' Personal Info Exposed by Misconfigured Database - The Hacker News
191 Million US Voters' Personal Info Exposed by Misconfigured Database
- The Hacker News
http://thehackernews.com/2015/12/us-voter-database-hacked.html?utm_source=dlvr.it&utm_medium=twitter&m=1
- The Hacker News
http://thehackernews.com/2015/12/us-voter-database-hacked.html?utm_source=dlvr.it&utm_medium=twitter&m=1
Sunday, December 27, 2015
Dragnet NSA Spying Survives: 2015 in Review | Electronic Frontier Foundation
Dragnet NSA Spying Survives: 2015 in Review | Electronic Frontier Foundation
Essay!
https://www.eff.org/deeplinks/2015/12/dragnet-nsa-spying-survives-2015-review
Essay!
https://www.eff.org/deeplinks/2015/12/dragnet-nsa-spying-survives-2015-review
Dragnet NSA Spying Survives: 2015 in Review | Electronic Frontier Foundation
Dragnet NSA Spying Survives: 2015 in Review | Electronic Frontier Foundation
https://www.eff.org/deeplinks/2015/12/dragnet-nsa-spying-survives-2015-review
https://www.eff.org/deeplinks/2015/12/dragnet-nsa-spying-survives-2015-review
Saturday, December 26, 2015
Privacy Act of 1974 | OPCL | Department of Justice
Privacy Act of 1974 | OPCL | Department of Justice: The Privacy Act of 1974, 5 U.S.C. � 552a, establishes a code of fair information practices that governs the collection, maintenance, use, and dissemination of information about individuals that is maintained in systems of records by federal agencies.
NSA, FBI ask judge to dismiss Utah Olympic spying lawsuit | Deseret News
NSA, FBI ask judge to dismiss Utah Olympic spying lawsuit | Deseret News
http://m.deseretnews.com/article/765682840/NSA-FBI-ask-judge-to-dismiss-Utah-Olympic-spying-lawsuit.html?ref=https%3A%2F%2Fnews.google.com%2F
http://m.deseretnews.com/article/765682840/NSA-FBI-ask-judge-to-dismiss-Utah-Olympic-spying-lawsuit.html?ref=https%3A%2F%2Fnews.google.com%2F
Friday, December 25, 2015
Thursday, December 24, 2015
Security Camera or Pet Monitor? Vimtag Has a Hybrid Solution! - TechAcute
Security Camera or Pet Monitor? Vimtag Has a Hybrid Solution! - TechAcute: "What’s maybe the most interesting thing about the Vimtag FI-361 HD is surely the remote viewing support. You just have to install the camera in one of the nearby locations that you want to monitor, and once that is done you can access a remote feed via your phone. "
'via Blog this'
'via Blog this'
Prevalence of 845G>A HFE mutation in Slavic populations: an east-west linear gradient in South Slavs
Prevalence of 845G>A HFE mutation in Slavic populations: an east-west
linear gradient in South Slavs.
http://www.ncbi.nlm.nih.gov/pmc/articles/PMC3118720/
linear gradient in South Slavs.
http://www.ncbi.nlm.nih.gov/pmc/articles/PMC3118720/
Wednesday, December 23, 2015
Juniper Networks security flaw may have exposed US government data | Technology | The Guardian
Juniper Networks security flaw may have exposed US government data | Technology | The Guardian: Two security flaws that lay undiscovered in Juniper Networks’ widely used corporate virtual private network (VPN) software for three years could have exposed sensitive informative to foreign governments or criminal groups, researchers have said.
Data Protection Act | Get Safe Online
Data Protection Act | Get Safe Online: The Data Protection Act (DPA) protects the privacy and integrity of data held on individuals by businesses and other organisations. The act ensures that individuals (customers and employees) have access to their data and can correct it, if necessary. It is enforced by the Information Commissioner’s Office (ICO), which has responsibility for overseeing the Freedom of Information Act and the regulation of interception of communications under the Regulation of Investigatory Powers Act 2000 (RIPA).
Federal Agency Data Protection Act (2008; 110th Congress H.R. 4791) - GovTrack.us
Federal Agency Data Protection Act (2008; 110th Congress H.R. 4791) - GovTrack.us: 6/3/2008--Passed House amended.Federal Agency Data Protection Act - Section3 - Defines "personally identifiable information" as any information about an individual maintained by a federal agency, including information about the individual's ... Read more >
Mod5: Data protection in Germany: overview
PLC - Data protection in Germany: overview: Apart from the general data protection laws there are sector-specific regulations at both state and federal level that provide data protection requirements.
Use as example 'relative' to the U.S.
Use as example 'relative' to the U.S.
Weak encryption won't defeat terrorists –�but it will enable hackers | Trevor Timm | Opinion | The Guardian
Weak encryption won't defeat terrorists –�but it will enable hackers | Trevor Timm | Opinion | The Guardian: Bizarrely, Comey told the Senate that whether or not tech companies decide to introduce backdoors in their encryption is “not a technical issue” but it’s a “business model question”. That’s a strange thing to say since a large group of the world’s leading computer scientists wrote a paper explaining that it is a technical issue, and that you can’t create a backdoor without making everyone’s communications more vulnerable to all sorts of hackers, whether they be private criminal elements or foreign governments.
China's Social Credit System: The most disturbing tech story of 2015
China's Social Credit System: The most disturbing tech story of 2015
"history has shown that such fears are prudent, whether we're talking
about China, the United States, or any other government or large
organization."
http://www.networkworld.com/article/3017417/security/china-scs-social-credit-system-most-disturbing-tech-story-of-2015.html
"history has shown that such fears are prudent, whether we're talking
about China, the United States, or any other government or large
organization."
http://www.networkworld.com/article/3017417/security/china-scs-social-credit-system-most-disturbing-tech-story-of-2015.html
Weak encryption won't defeat terrorists but it will enable hackers | Trevor Timm | Opinion | The Guardian
Weak encryption won't defeat terrorists but it will enable hackers | Trevor Timm | Opinion | The Guardian: Bizarrely, Comey told the Senate that whether or not tech companies decide to introduce backdoors in their encryption is “not a technical issue” but it’s a “business model question”. That’s a strange thing to say since a large group of the world’s leading computer scientists wrote a paper explaining that it is a technical issue, and that you can’t create a backdoor without making everyone’s communications more vulnerable to all sorts of hackers, whether they be private criminal elements or foreign governments.
Facebook Threatens Security Researcher With Legal Action Over Instagram Vulnerability: - News Independent
Facebook Threatens Security Researcher With Legal Action Over Instagram Vulnerability: - News Independent: “Despite all efforts to follow Facebook’s rules, I was now being threatened with legal and criminal charges, and it was all being done against my employer,” Wineberg wrote in his blog. Announced in 2011, Facebook Bug Bounty Program offers a minimum of $500 to anyone who reports security vulnerabilities on Facebook website.
A Few Thoughts on Cryptographic Engineering: On the Juniper backdoor
A Few Thoughts on Cryptographic Engineering: On the Juniper backdoor: Because what Ralf and Steve et al. found is beyond belief. Ralf's excellent post provides all of the technical details, and you should honest just stop reading now and go read that.
Tuesday, December 22, 2015
Long-Awaited Cyber Information Sharing Bill Enacted | Resources | Morrison Foerster
Long-Awaited Cyber Information Sharing Bill Enacted | Resources | Morrison Foerster: After more than four years of congressional consideration of cyber issues, legislation to authorize companies to share cyber threat information has finally been enacted.
Cyber security: Attack of the health hackers - FT.com
Cyber security: Attack of the health hackers - FT.com
http://www.ft.com/intl/cms/s/2/f3cbda3e-a027-11e5-8613-08e211ea5317.html#axzz3v456wQLO
http://www.ft.com/intl/cms/s/2/f3cbda3e-a027-11e5-8613-08e211ea5317.html#axzz3v456wQLO
Monday, December 21, 2015
Classified NSA Surveillance Programs Are Off-Limits for Debate - The Atlantic
Classified NSA Surveillance Programs Are Off-Limits for Debate - The Atlantic
http://www.theatlantic.com/politics/archive/2015/12/nsa-surveillance-debate/420852/
http://www.theatlantic.com/politics/archive/2015/12/nsa-surveillance-debate/420852/
Sunday, December 20, 2015
Business Email Compromise Attacks Rapidly Evolving
Business Email Compromise Attacks Rapidly Evolving: "Business email compromise attacks, also known as "masquerading" or invoice scams, are becoming more sophisticated and pervasive, and small businesses are the primary targets, says Joseph Opacki, vice president of threat research at security firm PhishLabs."
'via Blog this'
'via Blog this'
Evolving Microsoft SmartScreen to protect you from drive-by attacks | Microsoft Edge Dev Blog
Evolving Microsoft SmartScreen to protect you from drive-by attacks | Microsoft Edge Dev Blog: "Microsoft SmartScreen, integrated with Microsoft Edge, Internet Explorer, and the Windows operating system, has helped protect users from socially engineered attacks such as phishing and malware downloads since its initial release in Internet Explorer 7"
'via Blog this'
'via Blog this'
Pentagon weighs cybercampaign against Islamic State - LA Times
Pentagon weighs cybercampaign against Islamic State - LA Times
Righteous malware!
http://www.latimes.com/world/la-fg-cyber-isis-20151220-story.html
Righteous malware!
http://www.latimes.com/world/la-fg-cyber-isis-20151220-story.html
Saturday, December 19, 2015
Shorter Devin Nunes: There Are Privacy-Violating Covert Counter-Terrorism Programs We’re Hiding | emptywheel
Shorter Devin Nunes: There Are Privacy-Violating Covert
Counter-Terrorism Programs We're Hiding | emptywheel
https://www.emptywheel.net/2015/12/02/shorter-devin-nunes-there-are-privacy-violating-covert-counter-terrorism-programs-were-hiding/
Counter-Terrorism Programs We're Hiding | emptywheel
https://www.emptywheel.net/2015/12/02/shorter-devin-nunes-there-are-privacy-violating-covert-counter-terrorism-programs-were-hiding/
Under CISA, Would Wyndham Be Able To Pre-empt FTC Action? | emptywheel
Under CISA, Would Wyndham Be Able To Pre-empt FTC Action? | emptywheel
https://www.emptywheel.net/2015/08/24/under-cisa-would-wyndham-be-able-to-pre-empt-ftc-action/
https://www.emptywheel.net/2015/08/24/under-cisa-would-wyndham-be-able-to-pre-empt-ftc-action/
Otis Redding - Live on the Sunset Strip - CD!
Otis Redding - Live on the Sunset Strip - Amazon.com Music:
This is the first time the recordings have been released as a complete package and the songs are sequenced exactly as they went down, complete with an emcee and spoken introductions by Redding. Booklet features rare photographs as well as extensive liner notes by Ashley Kahn, author of music biographies and a contributor to NPR's Morning Edition.
Also: Live in London and Paris
This is the first time the recordings have been released as a complete package and the songs are sequenced exactly as they went down, complete with an emcee and spoken introductions by Redding. Booklet features rare photographs as well as extensive liner notes by Ashley Kahn, author of music biographies and a contributor to NPR's Morning Edition.
Also: Live in London and Paris
Friday, December 18, 2015
CISA Is Now The Law: How Congress Quietly Passed The Second Patriot Act | Zero Hedge
CISA Is Now The Law: How Congress Quietly Passed The Second Patriot Act | Zero Hedge: the second Patriot Act will be the law, and with it what little online privacy US citizens may enjoy, will be gone.
Shedding Some Light on the Problem of Medical Data Loss | Healthcare Informatics Magazine | Health IT | Information Technology
Shedding Some Light on the Problem of Medical Data Loss | Healthcare Informatics Magazine | Health IT | Information Technology: "According to the study, external “actors” were behind a large number of PHI breaches (903), yet internal “actors” were responsible for 791 incidences, followed by partners with 122 incidences."
'via Blog this'
'via Blog this'
Could this 14,000-year-old bone belong to an archaic human species? - CSMonitor.com
Could this 14,000-year-old bone belong to an archaic human species? -
CSMonitor.com
http://m.csmonitor.com/Science/2015/1217/Could-this-14-000-year-old-bone-belong-to-an-archaic-human-species
CSMonitor.com
http://m.csmonitor.com/Science/2015/1217/Could-this-14-000-year-old-bone-belong-to-an-archaic-human-species
FBI has lead in probe of 1.2 billion stolen Web credentials: documents | Reuters
FBI has lead in probe of 1.2 billion stolen Web credentials: documents | Reuters: "The court papers were filed in support of a search warrant the FBI sought in December 2014 and that was executed a month later related to email records.
"
'via Blog this'
"
'via Blog this'
Thursday, December 17, 2015
Lack of cyber security draws hackers to hospital devices - FT.com
Lack of cyber security draws hackers to hospital devices - FT.com
http://www.ft.com/intl/cms/s/2/37034b82-94ef-11e5-bd82-c1fb87bef7af.html#axzz3uPIVL1CC
http://www.ft.com/intl/cms/s/2/37034b82-94ef-11e5-bd82-c1fb87bef7af.html#axzz3uPIVL1CC
New Tier 2 UK immigration rules won't help with cyber security shortage
New Tier 2 immigration rules won't help with cyber security shortage in UK.
http://www.workpermit.com/news/2015-12-16/new-tier-2-immigration-rules-wont-help-with-cyber-security-shortage
http://www.workpermit.com/news/2015-12-16/new-tier-2-immigration-rules-wont-help-with-cyber-security-shortage
The Black Community Needs Encryption | Motherboard
This adds to argument on DP legislation...
Black Community Needs Encryption | Motherboard
http://motherboard.vice.com/read/the-black-community-needs-encryption
Black Community Needs Encryption | Motherboard
http://motherboard.vice.com/read/the-black-community-needs-encryption
Wednesday, December 16, 2015
Why are Mastercard Inc and Visa Inc Likely to Feel the Heat
Why are Mastercard Inc and Visa Inc Likely to Feel the Heat
http://www.businessfinancenews.com/26805-why-are-mastercard-inc-and-visa-inc-likely-to-feel-the-heat/
http://www.businessfinancenews.com/26805-why-are-mastercard-inc-and-visa-inc-likely-to-feel-the-heat/
Nearly 1 in 5 health data breaches take years to spot, says Verizon • The Register
Nearly 1 in 5 health data breaches take years to spot, says Verizon •
The Register
http://www.theregister.co.uk/2015/12/16/verizon_health_breaches_survey/
The Register
http://www.theregister.co.uk/2015/12/16/verizon_health_breaches_survey/
Verizon report finds 90% of industries suffer a PHI breach | Healthcare Dive
Verizon report finds 90% of industries suffer a PHI breach | Healthcare Dive
http://www.healthcaredive.com/news/verizon-report-finds-90-of-industries-suffer-a-phi-breach/410867/
http://www.healthcaredive.com/news/verizon-report-finds-90-of-industries-suffer-a-phi-breach/410867/
Lawyers Break Down 2016 HIPAA Audits, Connected Devices
Lawyers Break Down 2016 HIPAA Audits, Connected Devices
http://healthitsecurity.com/news/lawyers-break-down-2016-hipaa-audits-connected-devices
http://healthitsecurity.com/news/lawyers-break-down-2016-hipaa-audits-connected-devices
What Donald Trump and dying white people have in common - The Washington Post
What Donald Trump and dying white people have in common - The Washington Post
https://www.washingtonpost.com/news/wonk/wp/2015/12/15/what-donald-trump-and-dying-white-people-have-in-common-2/
https://www.washingtonpost.com/news/wonk/wp/2015/12/15/what-donald-trump-and-dying-white-people-have-in-common-2/
Tuesday, December 15, 2015
5 Cyber Security Predictions of 2016
5 Cyber Security Predictions of 2016: Exploitations are in a constant state of evolution, but what if you had insights into what cyber criminals might have planned for next year?
NSA: Deleting Old Phone Metadata 'Inappropriate, Unworkable'
NSA: Deleting Old Phone Metadata 'Inappropriate, Unworkable'
Essay meat - law makers
http://www.insidesources.com/nsa-deleting-old-phone-metadata-inappropriate-unworkable/
Essay meat - law makers
http://www.insidesources.com/nsa-deleting-old-phone-metadata-inappropriate-unworkable/
The top cyber-security trends of 2015 | BetaNews
The top cyber-security trends of 2015 | BetaNews
http://betanews.com/2015/12/14/the-top-cyber-security-trends-of-2015/
http://betanews.com/2015/12/14/the-top-cyber-security-trends-of-2015/
Anti-Malware Vendor Market Share Still Dominated by Microsoft
Anti-Malware Vendor Market Share Still Dominated by Microsoft
http://news.softpedia.com/news/anti-malware-vendor-market-share-still-dominated-by-microsoft-497581.shtml
http://news.softpedia.com/news/anti-malware-vendor-market-share-still-dominated-by-microsoft-497581.shtml
Monday, December 14, 2015
SMART on FHIR
SMART on FHIR: SMART on FHIR is a set of open specifications to integrate apps with Electronic Health Records, portals, Health Information Exchanges, and other Health IT systems. You get...
LA and San Diego leads cities in solar energy production
For its size, San Diego produces more solar power than any other city. Many open air parking lots now have solar panels. Some housing estates have solar on all roofs.
http://www.scpr.org/news/2014/04/10/43425/la-leads-cities-in-solar-energy-production/
Love .... Stephen
From My iPhone
http://www.scpr.org/news/2014/04/10/43425/la-leads-cities-in-solar-energy-production/
Love .... Stephen
From My iPhone
San Diego leads California in solar installations
Since 2009: San Diego leads California in solar installations |
SanDiegoUnionTribune.com
http://www.sandiegouniontribune.com/news/2009/jul/16/1m16solar001246-city-leads-california-solar-instal/?metro
SanDiegoUnionTribune.com
http://www.sandiegouniontribune.com/news/2009/jul/16/1m16solar001246-city-leads-california-solar-instal/?metro
Sunday, December 13, 2015
What lies beneath? The top cyber security trends of 2015 | ITProPortal.com
What lies beneath? The top cyber security trends of 2015 | ITProPortal.com
http://www.itproportal.com/2015/12/12/what-lies-beneath-the-top-cyber-security-trends-of-2015/
http://www.itproportal.com/2015/12/12/what-lies-beneath-the-top-cyber-security-trends-of-2015/
Privacy Not Included: Federal Law Lags Behind New Tech
Privacy Not Included: Federal Law Lags Behind New Tech: "A 2009 law called on HHS to work with the Federal Trade Commission — which targets unfair business practices and identity theft — and to submit recommendations to Congress within a year on how to deal with entities handling health information that falls outside of HIPAA. Six years later, however, no recommendations have been issued."
'via Blog this'
'via Blog this'
UK online fraud losses higher than realised, University study suggests | Security | Techworld
UK online fraud losses higher than realised, University study suggests | Security | Techworld: "In the Centre for Cyber Security’s initial survey of 1,500 people using Google Customer Surveys, 11.6 percent reported computer fraud losses in excess of more than £65 ($100), although the majority of the rest lost only trivial amounts."
'via Blog this'
'via Blog this'
USDA awards $23.4 million in grants to rural telemedicine projects - FierceHealthIT
USDA awards $23.4 million in grants to rural telemedicine projects - FierceHealthIT: "The U.S. Department of Agriculture has awarded $23.4 million in grants to 75 projects across 31 states as part of its USDA Rural Development's Distance Learning and Telemedicine program, according to an announcement."
'via Blog this'
'via Blog this'
Saturday, December 12, 2015
Hundreds of thousands of engine immobilisers hackable over the net • The Register
Hundreds of thousands of engine immobilisers hackable over the net • The Register: "Kiwi hacker Lachlan Temple has found holes in a popular cheap car tracking and immobilisation gadget that can allow remote attackers to locate, eavesdrop, and in some cases cut the fuel intake to hundreds of thousands of vehicles, some while in motion."
'via Blog this'
'via Blog this'
Leveraging the Analog Domain for Security (LADS)
Leveraging the Analog Domain for Security (LADS)
http://www.darpa.mil/program/leveraging-the-analog-domain-for-security
HPE Matter | Gazing Into the Crystal Ball: Predicting 2016 Security Concerns
HPE Matter | Gazing Into the Crystal Ball: Predicting 2016 Security Concerns
https://www.hpematter.com/issue-no-7-fall-2015/gazing-crystal-ball-predicting-2016-security-concerns
https://www.hpematter.com/issue-no-7-fall-2015/gazing-crystal-ball-predicting-2016-security-concerns
Gout food guide
Yes:
Fruits
Nuts
Vegetables
Whole grains
Complex carbohydrates
Vitamin C
Water
Coffee
Cherries
Eggs
Dairy
Lean meat
Ham
Chicken
Pork
Rabbit
Oysters
Crab
Shrimp
Halibut
Salmon
Tuna canned
Flounder
Sole
Catfish
No:
Herring
Sardines
Mussels
Marmite
Liver
Kidney
Anchovies
White bread
High-fructose corn syrup
Red meats
Goose
Turkey
Veal
Venison
Bacon
Scallops
Cod
Trout
Haddock
Mackerel
Tuna fresh
Matthew Fort on gout | Life and style | The Guardian
Matthew Fort on gout | Life and style | The Guardian: "The following have a high purine content (of more than 150g) and should therefore be avoided:
Fish and seafood: sardines, herring, mussels.
Meat: heart, meat extract, yeast."
'via Blog this'
Fish and seafood: sardines, herring, mussels.
Meat: heart, meat extract, yeast."
'via Blog this'
Friday, December 11, 2015
Thursday, December 10, 2015
'Intelligence Professional' Says NSA Deserves Trust, Power And Its Bulk Phone Metadata Collection Back | Techdirt
'Intelligence Professional' Says NSA Deserves Trust, Power And Its
Bulk Phone Metadata Collection Back | Techdirt
https://www.techdirt.com/articles/20151204/19021132992/intelligence-professional-says-nsa-deserves-trust-power-bulk-phone-metadata-collection-back.shtml
Bulk Phone Metadata Collection Back | Techdirt
https://www.techdirt.com/articles/20151204/19021132992/intelligence-professional-says-nsa-deserves-trust-power-bulk-phone-metadata-collection-back.shtml
Terrorist attacks don't warrant return to mass NSA spying, McCaul says
Terrorist attacks don't warrant return to mass NSA spying, McCaul says.
http://www.usatoday.com/story/news/2015/12/09/terrorist-attacks-dont-warrant-return-mass-nsa-spying-mccaul-says/77031124/
http://www.usatoday.com/story/news/2015/12/09/terrorist-attacks-dont-warrant-return-mass-nsa-spying-mccaul-says/77031124/
Wednesday, December 9, 2015
Brabus Turns Mercedes-Benz Sprinter Into "Business Lounge"
Brabus Turns Mercedes-Benz Sprinter Into "Business Lounge"
http://www.automobilemag.com/features/news/1408-brabus-turns-mercedes-benz-sprinter-into-business-lounge/?utm_campaign=Sprinter_Vans_Outbrain_2015&utm_source=DFA&utm_medium=cpm
http://www.automobilemag.com/features/news/1408-brabus-turns-mercedes-benz-sprinter-into-business-lounge/?utm_campaign=Sprinter_Vans_Outbrain_2015&utm_source=DFA&utm_medium=cpm
CNN | Donald Trump Reveals the Secrets to Wealth Creation
CNN | Donald Trump Reveals the Secrets to Wealth Creation
Bogus site...
http://cnn.com-report.careers/Breaking-News/Trump-reveals-secret-to-wealth/?affid=28&s1=106747&s2=1280&s3=49743723591
Bogus site...
http://cnn.com-report.careers/Breaking-News/Trump-reveals-secret-to-wealth/?affid=28&s1=106747&s2=1280&s3=49743723591
Tuesday, December 8, 2015
Hack Me: A Geopolitical Analysis of Surveillance Software - Infosecurity Magazine
Hack Me: A Geopolitical Analysis of Surveillance Software -
Infosecurity Magazine
http://www.infosecurity-magazine.com/opinions/hack-me-a-geopolitical-analysis/
Infosecurity Magazine
http://www.infosecurity-magazine.com/opinions/hack-me-a-geopolitical-analysis/
Sunday, December 6, 2015
RRI: empty toolbox or opportunity to seize? | The Trovatist
RRI: empty toolbox or opportunity to seize? | The Trovatist
https://chanceseeking.wordpress.com/2015/08/24/rri-empty-toolbox-or-opportunity-to-seize/
https://chanceseeking.wordpress.com/2015/08/24/rri-empty-toolbox-or-opportunity-to-seize/
Rainer Böhme - Google Scholar Citations
Rainer Böhme - Google Scholar Citations
Amazing scores...
https://scholar.google.de/citations?user=ez_Q6GMAAAAJ&hl=de
Amazing scores...
https://scholar.google.de/citations?user=ez_Q6GMAAAAJ&hl=de
Univ.-Prof. Dr. Rainer Böhme – Security and Privacy Lab – University of Innsbruck
Univ.-Prof. Dr. Rainer Böhme – Security and Privacy Lab – University
of Innsbruck
Check out the publications...
http://informationsecurity.uibk.ac.at/people/rainer-boehme/
of Innsbruck
Check out the publications...
http://informationsecurity.uibk.ac.at/people/rainer-boehme/
SEC Consult: House of Keys: Industry-Wide HTTPS Certificate and SSH Key Reuse Endangers Millions of Devices Worldwide
SEC Consult: House of Keys: Industry-Wide HTTPS Certificate and SSH Key Reuse Endangers Millions of Devices Worldwide: In some cases this behaviour can be attributed to a vendor's insecure default configuration. An example is Ubiquiti Networks, who have remote management enabled by default in most products.
For CC project?
For CC project?
NSA Surveillance Programs New Limitations - Fortune
NSA Surveillance Programs New Limitations - Fortune
http://fortune.com/2015/12/05/nsa-surveillance-programs-new-limitations/
http://fortune.com/2015/12/05/nsa-surveillance-programs-new-limitations/
Saturday, December 5, 2015
White House to Establish Privacy Council - Infosecurity Magazine
White House to Establish Privacy Council - Infosecurity Magazine: "“The digital economy has changed how citizens interact with their government. With the click of a button, you can gain information about a job, receive health insurance, qualify for a student loan, seek immigration services or veterans’ benefits or file your taxes. This digital revolution creates enormous opportunities for our ability to search, connect and discover, but it also creates enormous challenges for our economy and our people.”"
'via Blog this'
'via Blog this'
Silicon Valley just had a 'binders full of women' moment - CNET
Silicon Valley just had a 'binders full of women' moment - CNET: ""I know there are many remarkable women who would flourish in the venture business," he said"
'via Blog this'
'via Blog this'
GCHQ admits to hacking in court, says hacking helps stop terror attacks - SC Magazine
GCHQ admits to hacking in court, says hacking helps stop terror attacks - SC Magazine: "GCHQ has admitted for the first time that it has hacked computers, smartphones, and networks in the UK and abroad."
'via Blog this'
'via Blog this'
Friday, December 4, 2015
Lahey Hospital pays $850,000 over security breach, potential HIPAA violations
Lahey Hospital pays $850,000 over security breach, potential HIPAA violations: "Lahey Hospital and Medical Center has settled with the U.S. Department of Health and Human Services' Office for Civil Rights for potential HIPAA violations related to lax security.
The nonprofit teaching hospital, which is affiliated with Tufts Medical School, will pay $850,000 and "will adopt a robust corrective action plan to correct deficiencies" in its HIPAA policies, according to HHS."
'via Blog this'
The nonprofit teaching hospital, which is affiliated with Tufts Medical School, will pay $850,000 and "will adopt a robust corrective action plan to correct deficiencies" in its HIPAA policies, according to HHS."
'via Blog this'
High Cost of HIPAA Violations Demonstrated in $3.5 Million Settlement | Obermayer Rebmann Maxwell & Hippel LLP - JDSupra
High Cost of HIPAA Violations Demonstrated in $3.5 Million Settlement | Obermayer Rebmann Maxwell & Hippel LLP - JDSupra: "OCR investigated Triple-S and its subsidiaries after receiving several breach notifications from Triple-S involving unsecured PHI."
'via Blog this'
'via Blog this'
OCR hits BCBS Puerto Rico affiliate with second largest HIPAA fine - FierceHealthIT
OCR hits BCBS Puerto Rico affiliate with second largest HIPAA fine - FierceHealthIT: "The Triple-S Management Corporation will pay $3.5 million in a settlement to the U.S. Department of Health and Human Services Office for Civil Rights following multiple HIPAA violations, the second largest fine paid for a failure to protect patient information. "
'via Blog this'
'via Blog this'
More enforcement likely in second round of HIPAA audits, attorney says - FierceHealthIT
More enforcement likely in second round of HIPAA audits, attorney says - FierceHealthIT: "The second round of HIPAA compliance audits likely will include more enforcement actions, according to Anna Spencer, a partner at law firm Sidley Austin LLP."
'via Blog this'
'via Blog this'
New HIPAA Settlement: The Other Shoe Drops On PR Insurer - Food, Drugs, Healthcare, Life Sciences - United States
New HIPAA Settlement: The Other Shoe Drops On PR Insurer - Food, Drugs, Healthcare, Life Sciences - United States: "Nearly two years after being hit with an unprecedented $6.8 million fine (later reduced to $1.5 million), a Puerto Rico insurer has agreed to a new $3.5 million settlement with the Office for Civil Rights (OCR) of the U.S. Department of Health and Human Services (HHS) for alleged HIPAA violations."
'via Blog this'
'via Blog this'
Here’s how Larry Klayman celebrates victory — but then, maybe the NSA already knew? - The Washington Post
Here's how Larry Klayman celebrates victory — but then, maybe the NSA
already knew? - The Washington Post
https://www.washingtonpost.com/news/style/wp/2015/12/03/heres-how-larry-klayman-celebrates-victory-but-then-maybe-the-nsa-already-knew/
already knew? - The Washington Post
https://www.washingtonpost.com/news/style/wp/2015/12/03/heres-how-larry-klayman-celebrates-victory-but-then-maybe-the-nsa-already-knew/
Parallel Construction Revealed: How The DEA Is Trained To Launder Classified Surveillance Info | Techdirt
Parallel Construction Revealed: How The DEA Is Trained To Launder Classified Surveillance Info | Techdirt: "Last summer, Reuters revealed how the NSA and other surveillance organizations would share info with the DEA and other law enforcement agencies, but then tell them to reconstruct the evidence via a process called "parallel construction," so that the surveillance would not then be discussed in court."
Thursday, December 3, 2015
Interesting Tidbits from the House Intelligence Authorization | emptywheel
Interesting Tidbits from the House Intelligence Authorization | emptywheel
https://www.emptywheel.net/2015/12/01/interesting-tidbits-from-the-house-intelligence-authorization/
https://www.emptywheel.net/2015/12/01/interesting-tidbits-from-the-house-intelligence-authorization/
DWT releases latest health care breach charts - Lexology
DWT releases latest health care breach charts - Lexology: Given the number of large data breaches affecting health care entities in 2015, it is no surprise that the number of individuals affected by a breach in the health care sector has increased dramatically in the past year.
Symantec Corp to double cyber-security experts at Chennai centre | The Indian Express
Symantec Corp to double cyber-security experts at Chennai centre | The
Indian Express
http://indianexpress.com/article/technology/tech-news-technology/symantec-corp-to-double-cyber-security-experts-at-chennai-centre/
Indian Express
http://indianexpress.com/article/technology/tech-news-technology/symantec-corp-to-double-cyber-security-experts-at-chennai-centre/
Wednesday, December 2, 2015
NSA phone surveillance not worth the costs: Expert
NSA phone surveillance not worth the costs: Expert
http://www.cnbc.com/2015/11/30/nsa-phone-surveillance-not-worth-the-costs-expert.html
http://www.cnbc.com/2015/11/30/nsa-phone-surveillance-not-worth-the-costs-expert.html
Tuesday, December 1, 2015
Interesting Tidbits from the House Intelligence Authorization | emptywheel
Interesting Tidbits from the House Intelligence Authorization | emptywheel
EO 123333
https://www.emptywheel.net/2015/12/01/interesting-tidbits-from-the-house-intelligence-authorization/
EO 123333
https://www.emptywheel.net/2015/12/01/interesting-tidbits-from-the-house-intelligence-authorization/
Healthcare Data Breaches Not Top Consumer Concern
Test with Google, and get actual wording: http:// healthitsecurity.com/news/healthcare-data-breaches-not-top-consumer-concern
Subscribe to:
Posts (Atom)