Just a basic blog—snagging random stuff that catches our eye—nothing else, really...
Sunday, January 31, 2016
The Secrets to Giving Day-Old French Fries a Delicious Second Life
Amazon.com: S+ By ResMed Personal Sleep Solution: Health & Personal Care
Is the quantified self cyber-narcissism? Or a more responsible way to live?
http://www.amazon.com/S-ResMed-Personal-Sleep-Solution/dp/B00NP52QE0/ref=sr_1_1?ie=UTF8&qid=1454268399&sr=8-1&keywords=resmed+s%2B
The Ultimate Guide To Sleep Tracking | Sleep Junkies
Some pretty good data here...
http://sleepjunkies.com/features/the-ultimate-guide-to-sleep-tracking/
Obama unveils $4.2 billion plan to teach kids computer science - CSMonitor.com
http://m.csmonitor.com/USA/Education/2016/0130/Obama-unveils-4.2-billion-plan-to-teach-kids-computer-science
Powerball Jackpot at $1.5 Billion, 'But Not Many Jacks in the Pot - High Country Press
High Country Press
http://www.hcpress.com/news/powerball-jackpot-at-1-5-billion-but-not-many-jacks-in-the-pot.html
Proof of "Too Much TV"? The Full List of 1,400-Plus Primetime Series That Aired Last Year - Hollywood Reporter
That Aired Last Year - Hollywood Reporter
http://www.hollywoodreporter.com/live-feed/proof-tv-full-list-1400-859851
Data Privacy Day: Take Charge of Your Family’s Privacy | Electronic Frontier Foundation
Frontier Foundation
https://www.eff.org/deeplinks/2016/01/data-privacy-day-take-charge-your-familys-privacy
More CISOs looking to recruit cyber-security trainers than leaders, analysts, engineers or pen testers - When IT Meets Politics
analysts, engineers or pen testers - When IT Meets Politics
http://www.computerweekly.com/blogs/when-it-meets-politics/2016/01/the-harvey-nash-survey-shows-t.html
VideoDriverHowto - Community Help Wiki
'via Blog this'
Saturday, January 30, 2016
Flying Squirrel Wireless Discovery & Mapping Application | Center for High Assurance Computer Systems
'via Blog this'
Backdoored Ransomware for Educational Purposes | MalwareTech
So many things off here...
http://www.malwaretech.com/2016/01/backdoored-ransomware-for-educational.html?m=1
Thursday, January 28, 2016
Report Shows Pretext for Passing CISA Was All Wrong - Reason.com
Don't fear the Reaper - as mysterious new problems emerge - The Washington Post
What America's ISIS Strategy Is Missing | The National Interest
A Shodan Tutorial and Primer
And then there is this: http://www.howtogeek.com/169575/how-to-ensure-your-router-cameras-printers-and-other-devices-arent-accessible-on-the-internet/
How Canada’s Cybercrime Problems Differ From the US | Motherboard
Cybercrime: an overview of incidents and issues in Canada - Royal Canadian Mounted Police
Canadian security professionals unsure about defenses, Ponemon study finds | IT Business
Wednesday, January 27, 2016
Sunday, January 24, 2016
How to Make a $19 Police Radio Scanner - All
'via Blog this'
Saturday, January 23, 2016
As if a 20-Year Consent Order Wasn’t Enough Fun: FTC Brings First Monetary Settlement in Information Security Case
Project Ubertooth - Ubertooth One
Amazon.com: IEIK SDRMCX RTL-SDR, FM DAB, DVB-T USB Stick
Great for many applications including general radio scanning, air
traffic control, public safety radio, ADS-B aircraft radar, AIS boat
radar, ACARS, trunked radio, P25/MotoTRBO digital voice, TETRA, POCSAG,
weather balloons, APRS, NOAA APT weather satellites, Meteor M2
satellites, radio astronomy, meteor scatter monitoring, DAB, or for use
as a low cost panadapter with a traditional ham radio.
Guide to setting up your RTL2832U DVB-T stick for SDR | Ham Radio Science
SDR
Alternative Installation Procedure for RTL Sticks and HDSDR
SDR
Cyber Conscious: Why Time Is Running Out for Executives With No Cybersecurity Initiatives
..."choosing an executive with security aptitude must be at the center of the selection process."
Go Garmin! Get Fitness and Fashion- Garmin Vivofit 2 Fitness Tracker Review | Wear Action
Review | Wear Action
"keeping track of how long you're restless, awake, or sleeping
peacefully as well as vibrating at your wrist to wake you"
http://wearaction.com/garmin-vivofit-2-activity-tracker
When hacking saves lives: Hacking medical devices and implants
http://www.net-security.org/secworld.php?id=19282
Friday, January 22, 2016
Yet another bill seeks to weaken encryption-by-default on smartphones | Ars Technica
| Ars Technica
"Ted Lieu (D-Calif.) wholly dismissed law enforcement's arguments that
they needed new expansive powers..."
http://arstechnica.com/tech-policy/2016/01/yet-another-bill-seeks-to-weaken-encryption-by-default-on-smartphones/
Thursday, January 21, 2016
Assessing IT Security Standards Against the Upcoming GDPR for Cloud Systems
"This work in progress aims at identifying a mapping between the current security standards (in particular, but not limited to, ISO 27001-2013) and the upcoming regulations in data protection. "
Wednesday, January 20, 2016
As IoT takes center stage at CES 2016, security gets lost in the wings | ZDNet
http://www.zdnet.com/article/why-every-tech-company-is-now-a-security-company/
Tuesday, January 19, 2016
PewResearchCenter - Privacy and Information Sharing (PDF)
PewResearchCenter - Privacy and Information Sharing
OUTLOOK 2016: Lab Tests, Cybersecurity, Off-Label Use Among Top Device Issues | Bloomberg BNA
Monday, January 18, 2016
DDoS scammers collect $20,000 with Ashley Madison extortion | CSO Online
...Since September, Salted Hash has followed the extortion attempts from a group of scammers overseas who are targeting the leaked Ashley Madison email list....
Medtronic Announces Foray Into Wearable Tech For Mental Health
http://www.meddeviceonline.com/doc/medtronic-announces-foray-into-wearable-tech-for-mental-health-0001
National Consumer Health Privacy Survey 2005 - CHCF.org
Michael Power » The Canadian Privacy Cases of 2014
Very interesting...and helpful. Check on 2015.
http://michaelpower.ca/2015/02/the-canadian-privacy-cases-of-2014/
Ontario’s sole health privacy prosecution quietly dismissed | Toronto Star
...If found guilty, McLellan would have been the first individual convicted under the 2004 Personal Health Information Protection Act (PHIPA) — but she no longer faces a trial or the possible $50,000 fine...
http://www.thestar.com/life/health_wellness/2015/03/30/ontarios-sole-health-privacy-prosecution-quietly-dismissed.html
CSA Model Code | CIPP Guide
... Canada was the first country in the world to establish a voluntary, national standard for personal information protection.
Sunday, January 17, 2016
2016 Cybercrime Reloaded: Our Predictions for the Year Ahead - Security Intelligence
Security Intelligence
https://apple.news/AqHTdB4iLNmGVt846maVpkA
Saturday, January 16, 2016
$30 webcam spun into persistent network backdoor • The Register
"It is not something users should expect to surface in the wild and is rather an example of the risks posed by internet-of-things devices. Ollman dumped and reflashed the camera's firmware so that it opened a remote backdoor..."
http://www.theregister.co.uk/2016/01/13/30_dlink_web_cam_spun_into_persistent_network_backdoor/
Friday, January 15, 2016
MAVProxyUser/SilverPushUnmasked · GitHub
'via Blog this'
Privacy by design: delivering the promises(pdf) | Paperity
Thursday, January 14, 2016
Agreement reached on new EU cyber-security rules - Lexology
http://www.lexology.com/library/detail.aspx?g=c91e9963-d752-42dc-b186-0d475e91c659
New EU cybersecurity rules neutered by future backdoors, weakened crypto | Ars Technica
crypto | Ars Technica
http://arstechnica.com/tech-policy/2015/12/new-eu-cybersecurity-rules-neutered-by-future-backdoors-and-weakened-crypto/
First EU-wide rules to improve cybersecurity: deal with EP - Consilium
This is in top of and different from GDPR.
http://www.consilium.europa.eu/en/press/press-releases/2015/12/08-improve-cybersecurity/
When hacking saves lives: Hacking medical devices and implants
http://www.net-security.org/secworld.php?id=19282
Wednesday, January 13, 2016
What Malware Taught us for 2016 - BankInfoSecurity
...A senior cybersecurity evangelist at IBM Security, Kessem says she sees a significant new sophistication in common malware - signs that organized crime has stepped in and exerted influence.
http://www.bankinfosecurity.com/whitepapers.php?wp_id=2166&rf=kessem
Privacy by Design: An Engineering Ethics Perspective
'via Blog this'
Privacy-by-Design: Understanding Data Access Models for Secondary Data
Also check out: https://www.blackhat.com/docs/asia-14/materials/Chow/WP-Asia-14-Chow-Privacy-By-Design-For-The-Security-Practitioner.pdf
And buy this for AL blog post: http://link.springer.com/chapter/10.1007%2F978-94-017-9385-8_16
Note this: https://iapp.org/media/pdf/knowledge_center/PbD_Popdata_BC.pdf
'via Blog this'
Opacity | Technology
'via Blog this'
Tuesday, January 12, 2016
The 2016 cyber security roadmap | Information Age
http://www.information-age.com/technology/security/123460760/2016-cyber-security-roadmap
OASIS Privacy by Design Documentation for Software Engineers (PbD-SE) TC | OASIS
The OASIS PbD-SE TC provides privacy governance and documentation standards for software engineers. It enables software organizations to embed privacy into the design and architecture of IT systems, without diminishing system functionality.
https://www.oasis-open.org/committees/tc_home.php?wg_abbrev=pbd-se
Monday, January 11, 2016
Going Beyond the Obvious: 2016 Predictions for Healthcare IT | Chilmark Research
http://www.chilmarkresearch.com/2015/12/21/going-beyond-the-obvious-2016-predictions-for-healthcare-it/
Cyber security guidelines for ships launched today | Hellenic Shipping News Worldwide
News Worldwide
http://www.hellenicshippingnews.com/cyber-security-guidelines-for-ships-launched-today/
Sunday, January 10, 2016
Saturday, January 9, 2016
6 Guidelines To Follow When Developing Combination Products
Dentrix G5 used a less complex method of data masking to protect patient data than Advanced Encryption Standard (AES), which is recommended as an industry standard by the National Institute of Standards and Technology (NIST) and provides the appropriate protection to meet certain regulatory obligations under HIPAA. Nevertheless, for two years, Schein touted the product's "encryption capabilities" for protecting patient information and meeting "data protection regulations" in multiple marketing materials, including newsletters and brochures targeted at dentists.
Dental Practice Software Provider Settles FTC Charges It Misled Customers About Encryption of Patient Data | Federal Trade Commission
Dentrix G5 used a less complex method of data masking to protect patient data than Advanced Encryption Standard (AES), which is recommended as an industry standard by the National Institute of Standards and Technology (NIST) and provides the appropriate protection to meet certain regulatory obligations under HIPAA. Nevertheless, for two years, Schein touted the product's "encryption capabilities" for protecting patient information and meeting "data protection regulations" in multiple marketing materials, including newsletters and brochures targeted at dentists.
25 CISOs Identify the Biggest Security Challenges as They Enter 2016
Survey finds most adults concerned about health data security
Friday, January 8, 2016
2015 Industry Drill-Down Report - Healthcare
Wednesday, January 6, 2016
Ammon Bundy: His history and a $500,000 federal loan | OregonLive.com
"come participate in this wonderful thing in Harney County that the
Lord is about to accomplish."
http://www.oregonlive.com/pacific-northwest-news/index.ssf/2016/01/ammon_bundy_his_history_and_a.html
HARMAN acquires Israeli cyber security startup TowerSec for US$75M
Beep beep!
http://e27.co/harman-acquires-israeli-cyber-security-startup-towersec-us75m-20160106/
Tuesday, January 5, 2016
Voice Command Watch User Manual | Martian Smartwatch
Monday, January 4, 2016
My 2016 Cyber Security Predictions - CSO | The Resource for Data Security Executives
Security Executives
http://www.cso.com.au/article/591272/my-2016-cyber-security-predictions/
Saturday, January 2, 2016
Absolutely No Machete Juggling » The Star Wars Saga: Introducing Machete Order
Simple, watch them in this order: IV, V, II, III, VI. You may notice Episode I is gone. I'll get to that in a second.
"
'via Blog this'
Obama Administration Receives Little Support for the Consumer Privacy Bill of Rights Act | Ad Law Access
Good recital of the issues...
Obama to propose new student privacy legislation - The Washington Post
Needed because there's no data protection law.
WIRED: Personal Privacy Is Only One of the Costs of NSA Surveillance
Check out this great article I read on WIRED:
Personal Privacy Is Only One of the Costs of NSA Surveillance
""But if you look closer, the more accurate story is that in the name of security, we're trading away not only privacy, but also the U.S. tech economy, internet openness, America's foreign policy interests and cybersecurity."
http://www.wired.com/2014/07/the-big-costs-of-nsa-surveillance-that-no-ones-talking-about/
FBI admits it uses stingrays, zero-day exploits | Ars Technica UK
"Hess acknowledged that the bureau uses zero-days—the first time an official has done so. She said the trade-off is one the bureau wrestles with. "What is the greater good—to be able to identify a person who is threatening public safety?" Or to alert software makers to bugs that, if unpatched, could leave consumers vulnerable?
"How do we balance that?" she said. "That is a constant challenge for us.""
http://arstechnica.co.uk/tech-policy/2015/12/fbi-admits-it-uses-stingrays-zero-day-exploits/
What Is the Big Secret Surrounding Stingray Surveillance? - Scientific American
Owsely
http://www.scientificamerican.com/article/what-is-the-big-secret-surrounding-stingray-surveillance/
Friday, January 1, 2016
How Secret Police Devices Track Your Cellphone
http://www.tomsguide.com/us/cellphone-tracker-stingray,news-21718.html
Justice Department Announces Enhanced Policy for Use of Cell-Site Simulators | OPA | Department of Justice
Simulators | OPA | Department of Justice
http://www.justice.gov/opa/pr/justice-department-announces-enhanced-policy-use-cell-site-simulators?_ga=1.256289033.380430286.1338068988