Thursday, December 31, 2015

slight paranoia: October 2006

slight paranoia: October 2006

Soghoian and the airline boarding passes

Soh goy an

http://paranoia.dubfire.net/2006_10_01_archive.html?m=1

Tweet from @torproject

It's the last day of #32C3-please consider making a donation to the Tor Project! https://t.co/twit7DghZT https://t.co/6oGFIkKldj

http://twitter.com/torproject/status/682248940109053952

Tuesday, December 29, 2015

Sunday, December 27, 2015

Saturday, December 26, 2015

Privacy Act of 1974 | OPCL | Department of Justice

Privacy Act of 1974 | OPCL | Department of Justice: The Privacy Act of 1974, 5 U.S.C. � 552a, establishes a code of fair information practices that governs the collection, maintenance, use, and dissemination of information about individuals that is maintained in systems of records by federal agencies.

Thursday, December 24, 2015

Security Camera or Pet Monitor? Vimtag Has a Hybrid Solution! - TechAcute

Security Camera or Pet Monitor? Vimtag Has a Hybrid Solution! - TechAcute: "What’s maybe the most interesting thing about the Vimtag FI-361 HD is surely the remote viewing support. You just have to install the camera in one of the nearby locations that you want to monitor, and once that is done you can access a remote feed via your phone. "



'via Blog this'

Prevalence of 845G>A HFE mutation in Slavic populations: an east-west linear gradient in South Slavs

Prevalence of 845G>A HFE mutation in Slavic populations: an east-west
linear gradient in South Slavs.

http://www.ncbi.nlm.nih.gov/pmc/articles/PMC3118720/

Wednesday, December 23, 2015

Juniper Networks security flaw may have exposed US government data | Technology | The Guardian

Juniper Networks security flaw may have exposed US government data | Technology | The Guardian: Two security flaws that lay undiscovered in Juniper Networks’ widely used corporate virtual private network (VPN) software for three years could have exposed sensitive informative to foreign governments or criminal groups, researchers have said.

IRS Transcript Site

...is crazy stupid picky about your address.



https://sa.www4.irs.gov/irfof-tra/start.do


Data Protection Act | Get Safe Online

Data Protection Act | Get Safe Online: The Data Protection Act (DPA) protects the privacy and integrity of data held on individuals by businesses and other organisations. The act ensures that individuals (customers and employees) have access to their data and can correct it, if necessary. It is enforced by the Information Commissioner’s Office (ICO), which has responsibility for overseeing the Freedom of Information Act and the regulation of interception of communications under the Regulation of Investigatory Powers Act 2000 (RIPA).

Federal Agency Data Protection Act (2008; 110th Congress H.R. 4791) - GovTrack.us

Federal Agency Data Protection Act (2008; 110th Congress H.R. 4791) - GovTrack.us: 6/3/2008--Passed House amended.Federal Agency Data Protection Act - Section3 - Defines "personally identifiable information" as any information about an individual maintained by a federal agency, including information about the individual's ... Read more >

Mod5: Data protection in Germany: overview

PLC - Data protection in Germany: overview: Apart from the general data protection laws there are sector-specific regulations at both state and federal level that provide data protection requirements.



Use as example 'relative' to the U.S.

Weak encryption won't defeat terrorists –�but it will enable hackers | Trevor Timm | Opinion | The Guardian

Weak encryption won't defeat terrorists –�but it will enable hackers | Trevor Timm | Opinion | The Guardian: Bizarrely, Comey told the Senate that whether or not tech companies decide to introduce backdoors in their encryption is “not a technical issue” but it’s a “business model question”. That’s a strange thing to say since a large group of the world’s leading computer scientists wrote a paper explaining that it is a technical issue, and that you can’t create a backdoor without making everyone’s communications more vulnerable to all sorts of hackers, whether they be private criminal elements or foreign governments.

China's Social Credit System: The most disturbing tech story of 2015

China's Social Credit System: The most disturbing tech story of 2015

"history has shown that such fears are prudent, whether we're talking
about China, the United States, or any other government or large
organization."
http://www.networkworld.com/article/3017417/security/china-scs-social-credit-system-most-disturbing-tech-story-of-2015.html

Weak encryption won't defeat terrorists but it will enable hackers | Trevor Timm | Opinion | The Guardian

Weak encryption won't defeat terrorists but it will enable hackers | Trevor Timm | Opinion | The Guardian: Bizarrely, Comey told the Senate that whether or not tech companies decide to introduce backdoors in their encryption is “not a technical issue” but it’s a “business model question”. That’s a strange thing to say since a large group of the world’s leading computer scientists wrote a paper explaining that it is a technical issue, and that you can’t create a backdoor without making everyone’s communications more vulnerable to all sorts of hackers, whether they be private criminal elements or foreign governments.

Facebook Threatens Security Researcher With Legal Action Over Instagram Vulnerability: - News Independent

Facebook Threatens Security Researcher With Legal Action Over Instagram Vulnerability: - News Independent: “Despite all efforts to follow Facebook’s rules, I was now being threatened with legal and criminal charges, and it was all being done against my employer,” Wineberg wrote in his blog. Announced in 2011, Facebook Bug Bounty Program offers a minimum of $500 to anyone who reports security vulnerabilities on Facebook website.

A Few Thoughts on Cryptographic Engineering: On the Juniper backdoor

A Few Thoughts on Cryptographic Engineering: On the Juniper backdoor: Because what Ralf and Steve et al. found is beyond belief. Ralf's excellent post provides all of the technical details, and you should honest just stop reading now and go read that.

Tuesday, December 22, 2015

Long-Awaited Cyber Information Sharing Bill Enacted | Resources | Morrison Foerster

Long-Awaited Cyber Information Sharing Bill Enacted | Resources | Morrison Foerster: After more than four years of congressional consideration of cyber issues, legislation to authorize companies to share cyber threat information has finally been enacted.

Business Email Compromise Attacks Rapidly Evolving

Business Email Compromise Attacks Rapidly Evolving: "Business email compromise attacks, also known as "masquerading" or invoice scams, are becoming more sophisticated and pervasive, and small businesses are the primary targets, says Joseph Opacki, vice president of threat research at security firm PhishLabs."



'via Blog this'

Evolving Microsoft SmartScreen to protect you from drive-by attacks | Microsoft Edge Dev Blog

Evolving Microsoft SmartScreen to protect you from drive-by attacks | Microsoft Edge Dev Blog: "Microsoft SmartScreen, integrated with Microsoft Edge, Internet Explorer, and the Windows operating system, has helped protect users from socially engineered attacks such as phishing and malware downloads since its initial release in Internet Explorer 7"



'via Blog this'

Otis Redding - Live on the Sunset Strip - CD!

Otis Redding - Live on the Sunset Strip - Amazon.com Music:

This is the first time the recordings have been released as a complete package and the songs are sequenced exactly as they went down, complete with an emcee and spoken introductions by Redding. Booklet features rare photographs as well as extensive liner notes by Ashley Kahn, author of music biographies and a contributor to NPR's Morning Edition.

Also: Live in London and Paris

Friday, December 18, 2015

CISA Is Now The Law: How Congress Quietly Passed The Second Patriot Act | Zero Hedge

CISA Is Now The Law: How Congress Quietly Passed The Second Patriot Act | Zero Hedge: the second Patriot Act will be the law, and with it what little online privacy US citizens may enjoy, will be gone.

Shedding Some Light on the Problem of Medical Data Loss | Healthcare Informatics Magazine | Health IT | Information Technology

Shedding Some Light on the Problem of Medical Data Loss | Healthcare Informatics Magazine | Health IT | Information Technology: "According to the study, external “actors” were behind a large number of PHI breaches (903), yet internal “actors” were responsible for 791 incidences, followed by partners with 122 incidences."



'via Blog this'

FBI has lead in probe of 1.2 billion stolen Web credentials: documents | Reuters

FBI has lead in probe of 1.2 billion stolen Web credentials: documents | Reuters: "The court papers were filed in support of a search warrant the FBI sought in December 2014 and that was executed a month later related to email records.

"



'via Blog this'

The Black Community Needs Encryption | Motherboard

This adds to argument on DP legislation...

Black Community Needs Encryption | Motherboard

http://motherboard.vice.com/read/the-black-community-needs-encryption

Tuesday, December 15, 2015

5 Cyber Security Predictions of 2016

5 Cyber Security Predictions of 2016: Exploitations are in a constant state of evolution, but what if you had insights into what cyber criminals might have planned for next year?

Monday, December 14, 2015

SMART on FHIR

SMART on FHIR: SMART on FHIR is a set of open specifications to integrate apps with Electronic Health Records, portals, Health Information Exchanges, and other Health IT systems. You get...

LA and San Diego leads cities in solar energy production

For its size, San Diego produces more solar power than any other city. Many open air parking lots now have solar panels. Some housing estates have solar on all roofs.

http://www.scpr.org/news/2014/04/10/43425/la-leads-cities-in-solar-energy-production/

Love .... Stephen
From My iPhone

Privacy Not Included: Federal Law Lags Behind New Tech

Privacy Not Included: Federal Law Lags Behind New Tech: "A 2009 law called on HHS to work with the Federal Trade Commission — which targets unfair business practices and identity theft — and to submit recommendations to Congress within a year on how to deal with entities handling health information that falls outside of HIPAA. Six years later, however, no recommendations have been issued."



'via Blog this'

UK online fraud losses higher than realised, University study suggests | Security | Techworld

UK online fraud losses higher than realised, University study suggests | Security | Techworld: "In the Centre for Cyber Security’s initial survey of 1,500 people using Google Customer Surveys, 11.6 percent reported computer fraud losses in excess of more than £65 ($100), although the majority of the rest lost only trivial amounts."



'via Blog this'

USDA awards $23.4 million in grants to rural telemedicine projects - FierceHealthIT

USDA awards $23.4 million in grants to rural telemedicine projects - FierceHealthIT: "The U.S. Department of Agriculture has awarded $23.4 million in grants to 75 projects across 31 states as part of its USDA Rural Development's Distance Learning and Telemedicine program, according to an announcement."



'via Blog this'

Saturday, December 12, 2015

Hundreds of thousands of engine immobilisers hackable over the net • The Register

Hundreds of thousands of engine immobilisers hackable over the net • The Register: "Kiwi hacker Lachlan Temple has found holes in a popular cheap car tracking and immobilisation gadget that can allow remote attackers to locate, eavesdrop, and in some cases cut the fuel intake to hundreds of thousands of vehicles, some while in motion."



'via Blog this'

Gout food guide

Yes: 
Fruits
Nuts
Vegetables
Whole grains
Complex carbohydrates
Vitamin C
Water
Coffee
Cherries
Eggs
Dairy
Lean meat
Ham
Chicken
Pork
Rabbit
Oysters
Crab
Shrimp
Halibut
Salmon
Tuna canned
Flounder
Sole
Catfish

No:
Herring
Sardines
Mussels
Marmite
Liver
Kidney
Anchovies
White bread
High-fructose corn syrup
Red meats
Goose
Turkey
Veal
Venison
Bacon
Scallops
Cod
Trout
Haddock
Mackerel
Tuna fresh




Matthew Fort on gout | Life and style | The Guardian

Matthew Fort on gout | Life and style | The Guardian: "The following have a high purine content (of more than 150g) and should therefore be avoided:

Fish and seafood: sardines, herring, mussels.
Meat: heart, meat extract, yeast."



'via Blog this'

Tuesday, December 8, 2015

Univ.-Prof. Dr. Rainer Böhme – Security and Privacy Lab – University of Innsbruck

Univ.-Prof. Dr. Rainer Böhme – Security and Privacy Lab – University
of Innsbruck

Check out the publications...

http://informationsecurity.uibk.ac.at/people/rainer-boehme/

SEC Consult: House of Keys: Industry-Wide HTTPS Certificate and SSH Key Reuse Endangers Millions of Devices Worldwide

SEC Consult: House of Keys: Industry-Wide HTTPS Certificate and SSH Key Reuse Endangers Millions of Devices Worldwide: In some cases this behaviour can be attributed to a vendor's insecure default configuration. An example is Ubiquiti Networks, who have remote management enabled by default in most products.



For CC project?

Saturday, December 5, 2015

Jimmy's Famous Seafood - Home

Jimmy's Famous Seafood - Home

Crab cakes for Christmas?

http://www.jimmysfamousseafood.com/

White House to Establish Privacy Council - Infosecurity Magazine

White House to Establish Privacy Council - Infosecurity Magazine: "“The digital economy has changed how citizens interact with their government. With the click of a button, you can gain information about a job, receive health insurance, qualify for a student loan, seek immigration services or veterans’ benefits or file your taxes. This digital revolution creates enormous opportunities for our ability to search, connect and discover, but it also creates enormous challenges for our economy and our people.”"



'via Blog this'

Silicon Valley just had a 'binders full of women' moment - CNET

Silicon Valley just had a 'binders full of women' moment - CNET: ""I know there are many remarkable women who would flourish in the venture business," he said"



'via Blog this'

Friday, December 4, 2015

Lahey Hospital pays $850,000 over security breach, potential HIPAA violations

Lahey Hospital pays $850,000 over security breach, potential HIPAA violations: "Lahey Hospital and Medical Center has settled with the U.S. Department of Health and Human Services' Office for Civil Rights for potential HIPAA violations related to lax security.

The nonprofit teaching hospital, which is affiliated with Tufts Medical School, will pay $850,000 and "will adopt a robust corrective action plan to correct deficiencies" in its HIPAA policies, according to HHS."



'via Blog this'

OCR hits BCBS Puerto Rico affiliate with second largest HIPAA fine - FierceHealthIT

OCR hits BCBS Puerto Rico affiliate with second largest HIPAA fine - FierceHealthIT: "The Triple-S Management Corporation will pay $3.5 million in a settlement to the U.S. Department of Health and Human Services Office for Civil Rights following multiple HIPAA violations, the second largest fine paid for a failure to protect patient information.  "



'via Blog this'

More enforcement likely in second round of HIPAA audits, attorney says - FierceHealthIT

More enforcement likely in second round of HIPAA audits, attorney says - FierceHealthIT: "The second round of HIPAA compliance audits likely will include more enforcement actions, according to Anna Spencer, a partner at law firm Sidley Austin LLP."



'via Blog this'

New HIPAA Settlement: The Other Shoe Drops On PR Insurer - Food, Drugs, Healthcare, Life Sciences - United States

New HIPAA Settlement: The Other Shoe Drops On PR Insurer - Food, Drugs, Healthcare, Life Sciences - United States: "Nearly two years after being hit with an unprecedented $6.8 million fine (later reduced to $1.5 million), a Puerto Rico insurer has agreed to a new $3.5 million settlement with the Office for Civil Rights (OCR) of the U.S. Department of Health and Human Services (HHS) for alleged HIPAA violations."



'via Blog this'

Parallel Construction Revealed: How The DEA Is Trained To Launder Classified Surveillance Info | Techdirt

Parallel Construction Revealed: How The DEA Is Trained To Launder Classified Surveillance Info | Techdirt: "Last summer, Reuters revealed how the NSA and other surveillance organizations would share info with the DEA and other law enforcement agencies, but then tell them to reconstruct the evidence via a process called "parallel construction," so that the surveillance would not then be discussed in court."

DWT releases latest health care breach charts - Lexology

DWT releases latest health care breach charts - Lexology: Given the number of large data breaches affecting health care entities in 2015, it is no surprise that the number of individuals affected by a breach in the health care sector has increased dramatically in the past year.

IEEE Xplore Abstract - Balancing Societal Security and Individual Privacy: Accountable Escrow System

IEEE Xplore Abstract - Balancing Societal Security and Individual Privacy: Accountable Escrow System: To reconcile individual privacy and societal security, we explore whether we can have surveillance in a form that is verifiably accountable to citizens.

Sunday, November 29, 2015

The FISA Court’s Uncelebrated Good Points | emptywheel

"...However, I think it likely that after both instances, the NSA took its toys and went elsewhere for part of the relevant collection, in the first case to SPCMA analysis on EO 12333 collected Internet metadata, and in the second to CISA (though just for cyber applications)"

https://www.emptywheel.net/2015/11/04/the-fisa-courts-uncelebrated-good-points/

Thursday, November 26, 2015

Nearly 80% of Small Businesses Have no Cyber Attack Response Plan

Nearly 80% of Small Businesses Have no Cyber Attack Response Plan

But of course...

https://smallbusiness.com/tech/cyber-attack-response-planr/

FTC ALJ: Embarrassment/Emotional Harm and Risk of Harm Does Not Satisfy “Substantial Consumer Injury” Prong of Unfairness

"Complaint counsel may find it preferable to have an ALJ decision on the books rather than a more precedential adverse Commission or Circuit Court of Appeal's decision, which could bind the FTC more significantly in data security cases going forward."

http://www.hldataprotection.com/2015/11/articles/consumer-privacy/ftc-alj-embarrassmentemotional-harm-and-risk-of-harm-does-not-satisfy-substantial-consumer-injury-prong-of-unfairness/

Monday, November 23, 2015

USA Conference - Wearables

USA Conference



Check out who is speaking, company profiles, etc.



Also VB results last year.

Saturday, November 21, 2015

Administrative Law Judge Dismisses FTC’s LabFTC LabMD: "no substantial Injury” to Consumers

Administrative Law Judge Dismisses FTC's LabMD Complaint, Finding
Insufficient Evidence of "Substantial Injury" to Consumers | The
National Law Review

...dismissing the FTC's complaint against LabMD, on the ground that
the Commission's staff had failed to carry its burden of demonstrating
a "likely substantial injury" to consumers resulting from LabMD's
allegedly "unfair" data security practices...

http://www.natlawreview.com/article/administrative-law-judge-dismisses-ftc-s-labmd-complaint-finding-insufficient

Dohm DS Black - Marpac

....The Official Sound Conditioner of the National Sleep Foundation...

https://www.marpac.com/dohm-product-category/product/47-dohm-ds-black.html

Wednesday, November 18, 2015

Endpoint security lags in spite of vulnerabilities

http://www.net-security.org/secworld.php?id=19096

majority of VP and C-Level IT leaders surveyed indicated a heightened fear of a security breach in the coming year and acknowledged a rapidly shifting security landscape, which now includes endpoint security.  

Triage in general practice

Develop a practice based triage protocol which clearly outlines the steps of the triage process and the roles and responsibilities of those involved.

http://www.medicalprotection.org/uk/practice-matters-issue-3/triage-in-general-practice

Wednesday, November 11, 2015

Earlier Intervention for High Blood Pressure Reduces Heart Risk by 40 Percent

Earlier Intervention for High Blood Pressure Reduces Heart Risk by 40 Percent

Personal blog post tying this to aldosterone.

http://www.newsweek.com/earlier-intervention-high-blood-pressure-reduces-heart-risk-40-percent-392538

Sunday, November 8, 2015

Effect of C282Y Genotype on Self-Reported Musculoskeletal Complications in Hereditary Hemochromatosis

Effect of C282Y Genotype on Self-Reported Musculoskeletal
Complications in Hereditary Hemochromatosis


http://www.ncbi.nlm.nih.gov/pmc/articles/PMC4378978/

Tweet from @Mangan150

Hypogonadism in Hemochromatosis: Reversal with Iron Depletion
https://t.co/4PoB84CIXo
Rising iron levels with age could lower T levels.

http://twitter.com/Mangan150/status/662405366068572161

Sent from Echofon - http://www.echofon.com/


From My iPhone

Oklahoma Earthquakes Are a National Security Threat - Bloomberg Business

Oklahoma Earthquakes Are a National Security Threat - Bloomberg Business

"Now the massive oil stockpile faces an emerging threat: earthquakes.
In the past month, a flurry of quakes have hit within a few miles of
Cushing, rattling the town and its massive tanks. According to the
Oklahoma Geological Survey, more than a dozen quakes have registered
3.0 or higher on the Richter scale within a few miles of Cushing since
mid-September. The biggest, registering at 4.5, hit about three miles
away on Oct. 10."

http://www.bloomberg.com/news/articles/2015-10-23/oklahoma-earthquakes-are-a-national-security-threat

Thursday, November 5, 2015

Wednesday, November 4, 2015

[1509.06533] Factors influencing risk acceptance of Cloud Computing services in the UK Government

[1509.06533] Factors influencing risk acceptance of Cloud Computing services in the UK Government: We focused on perceived risks and perceived security concerns. Based on these results, we suggest a number of implications for risk managers, policy makers and cloud service providers.

“Fracking” controversy and communication: Using national survey data to understand public perceptions of hydraulic fracturing

“Fracking” controversy and communication: Using national survey data to understand public perceptions of hydraulic fracturing: In contrast, people more likely to support fracking tend to be older, hold a bachelor's degree or higher, politically conservative, watch TV news more than once a week, and associate the process with positive economic or energy supply outcomes.

The “Nasty Effect:” Online Incivility and Risk Perceptions of Emerging Technologies - Anderson - 2013 - Journal of Computer-Mediated Communication - Wiley Online Library

The “Nasty Effect:” Online Incivility and Risk Perceptions of Emerging Technologies - Anderson - 2013 - Journal of Computer-Mediated Communication - Wiley Online Library: we examine the effects online incivility on perceptions toward a particular issue—namely, an emerging technology, nanotechnology. We found that exposure to uncivil blog comments can polarize risk perceptions of nanotechnology along the lines of religiosity and issue support.

Cultural worldviews and environmental risk perceptions: A meta-analysis

Cultural worldviews and environmental risk perceptions: A meta-analysis: individuals who scored higher on egalitarianism perceived more environmental risks (r = .25), whereas individuals who scored higher on hierarchism and individualism perceived fewer environmental risks (r = −.18 and −.17, respectively).

An Open Letter from Crypto and IS Folks

Ax14.pdf: As
leading
members
of the US
cryptog
raphy and information
-
security research communities
, we
deplore these practices
and urge that they be changed

Privacy and National Security in the Digital Age. European and Comparative Constitutional Perspectives by Federico Fabbrini :: SSRN

Privacy and National Security in the Digital Age. European and Comparative Constitutional Perspectives by Federico Fabbrini :: SSRN: The article introduces the theme of the protection of the right to privacy in a world characterized by rapid developments in digital technology and the need to fight terrorism.

Malignant Melanoma Misdiagnosed as a Diabetic Foot Ulcer

Malignant Melanoma Misdiagnosed as a Diabetic Foot Ulcer: Malignant melanoma, although rare, is a skin cancer with the highest mortality.

Keys To Diagnosing Metastatic Melanoma In The Foot And Ankle | Podiatry Today

Keys To Diagnosing Metastatic Melanoma In The Foot And Ankle | Podiatry Today: Lesions of the feet and ankle are notoriously misdiagnosed. Without early detection and treatment, survival rates plunge for these patients.

The patient in our case report was receiving primary treatment from an oncologist. By the time we saw him in the podiatry clinic, palliative care was the only treatment available for his chronic pain. Our patient died one year later. It is of paramount importance to identify these lesions and provide proper treatment as early as possible.

Minorities Absent In Growing Cyber War | The Daily Caller

Minorities Absent In Growing Cyber War | The Daily Caller: "African-Americans and Latinos make up less than 10 percent of the cyber workforce, according to the International Consortium of Minority Cybersecurity Professionals, who hosted the briefing, along with cyber think tank Institute for Critical Infrastructure Technology and Texas Democrat Sheila Jackson-Lee."



'via Blog this'

Saturday, October 31, 2015

CRAN: Contributed Documentation

CRAN: Contributed Documentation: Manuals, tutorials, etc. provided by users of R.

Friday, October 30, 2015

Thursday, October 29, 2015

The Business Case for Gender Diversity - by Caroline Turner - AMERICAN DIVERSITY REPORT

The Business Case for Gender Diversity - by Caroline Turner - AMERICAN DIVERSITY REPORT: According to Cumulative Gallup Workplace Studies cited in “Business Case for Diversity with Inclusion,” organizations with inclusive cultures do better on several scores than those that aren’t inclusive:
39% higher customer satisfaction
22% greater productivity
27% higher profitability.

Minorities Absent In Growing Cyber War | The Daily Caller

Minorities Absent In Growing Cyber War | The Daily Caller: African-Americans and Latinos make up less than 10 percent of the cyber workforce, according to the International Consortium of Minority Cybersecurity Professionals

Wednesday, October 28, 2015

Study Reveals Why Lefties Are Rare

Study Reveals Why Lefties Are Rare

Professor Daniel M. Abrams and graduate student Mark J. Panaggio—both
right-handers—are the first to use real-world data (from competitive
sports) to test and confirm the hypothesis that social behavior is
related to population-level handedness.

http://m.livescience.com/19968-study-reveals-lefties-rare.html

Monday, October 26, 2015

Eight charts that put tech companies’ diversity stats into perspective | Gigaom

Eight charts that put tech companies’ diversity stats into perspective | Gigaom: "High level conclusions: Cisco and Intel lead the pack with the worst gender diversity, 77 percent (Cisco) and 76 percent (Intel) male. "



'via Blog this'

Saturday, October 24, 2015

CAESS - FAQ

CAESS - FAQ - Car hacking context:

http://www.autosec.org/faq.html#q3

Friday, October 23, 2015

BlackBerry’s Priv Android Slider Phone up for Pre-order at $699 | Re/code

BlackBerry’s Priv Android Slider Phone up for Pre-order at $699 | Re/code: "Priv will pack a 5.4-inch dual-curved screen and an 18-megapixel camera as well as a feature designed to warn users when their privacy could be at risk. "



'via Blog this'

Thursday, October 22, 2015

Hacktivism 1-2-3: how privacy enhancing technologies change the face of anonymous hacktivism | Internet Policy Review

Hacktivism 1-2-3: how privacy enhancing technologies change the face of anonymous hacktivism | Internet Policy Review: Through the short summary of the ad-hoc vigilante group Anonymous, this article describes hacktivism 1.0 as electronic civil disobedience conducted by outsiders.

Interview With Julie Ann Horvath by Julie Ann Horvath | Model View Culture

Interview With Julie Ann Horvath by Julie Ann Horvath | Model View Culture

"Julie: I think a lot of marginalized people who have had really bad
experiences in tech, need that non-disparagement money to survive."

https://modelviewculture.com/pieces/interview-with-julie-ann-horvath

Thursday, October 15, 2015

Online Poker 'Moratorium' Being Discussed On Capitol Hill: Report

Online Poker 'Moratorium' Being Discussed On Capitol Hill: Report: "Online casino games are regulated in Nevada, New Jersey and Delaware, but California, New York and Pennsylvania are all taking serious looks at the casino gaming sub-industry."



'via Blog this'

Could Tramadol cause Gout aggravated - eHealthMe.com

Could Tramadol cause Gout aggravated - eHealthMe.com:



Gout aggravated is found among people who take Tramadol, especially for people who are male, 60 old...

Tuesday, October 13, 2015

The fake LinkedIn recruiter network hackers are using to reel in business users | ZDNet

The fake LinkedIn recruiter network hackers are using to reel in business users | ZDNet: "Hackers known to use Zeus malware to hack critical infrastructure targets have developed an elaborate network of fake recruiter profiles for phishing on LinkedIn."



'via Blog this'

LinkedIn Sockpuppets Are Targeting Security Researchers | News from the Lab

LinkedIn Sockpuppets Are Targeting Security Researchers | News from the Lab: "Multiple LinkedIn accounts recently targeted numerous security specialists in an attempt to map their social graphs."



'via Blog this'

Internet Crime Complaint Center (IC3) | Internet of Things Poses Opportunities for Cyber Crime

Internet Crime Complaint Center (IC3) | Internet of Things Poses
Opportunities for Cyber Crime


http://www.ic3.gov/media/2015/150910.aspx

Family Tree DNA Partners with National Geographic's Genographic Project to Provide Additional Insight into Family History and Ancestral Roots | news.sys-con.com

Family Tree DNA Partners with National Geographic's Genographic
Project to Provide Additional Insight into Family History and
Ancestral Roots | news.sys-con.com

http://news.sys-con.com/node/3483540

Friday, October 2, 2015

5 Tools To Check For Broken Links On Your Website - WPUniversity

5 Tools To Check For Broken Links On Your Website - WPUniversity: Unlike Xenu’s Link Sleuth, Screaming Frog is explicitly intended for site optimization. It dives deeper into page-level elements like heading tags and meta data.

Privacy in the Age of Big Data - Stanford Law Review

Privacy in the Age of Big Data - Stanford Law Review: At the same time, the “data deluge” presents privacy concerns that could stir a regulatory backlash, dampening the data economy and stifling innovation.

The Schizophrenic State: Data Protection versus Surveillance in Europe and America by Alessandro Guarino :: SSRN

The Schizophrenic State: Data Protection versus Surveillance in Europe and America by Alessandro Guarino :: SSRN: On both sides of the Atlantic the tension between privacy and security in cyberspace, as well as the very definition of these concepts has been very much in the forefront since 2001 and recently much more so

The Right to Be Forgotten - Stanford Law Review

The Right to Be Forgotten - Stanford Law Review: Although Reding depicted the new right as a modest expansion of existing data privacy rights, in fact it represents the biggest threat to free speech on the Internet in the coming decade.