Sunday, January 31, 2016

The Secrets to Giving Day-Old French Fries a Delicious Second Life

The Secrets to Giving Day-Old French Fries a Delicious Second Life | Food Hacks: If you don't have a baking sheet, never fear—that cast iron skillet works here, too, unless you're reheating a truly ginormous amount of leftover fries.

Amazon.com: S+ By ResMed Personal Sleep Solution: Health & Personal Care

Amazon.com: S+ By ResMed Personal Sleep Solution: Health & Personal Care

Is the quantified self cyber-narcissism? Or a more responsible way to live?

http://www.amazon.com/S-ResMed-Personal-Sleep-Solution/dp/B00NP52QE0/ref=sr_1_1?ie=UTF8&qid=1454268399&sr=8-1&keywords=resmed+s%2B

The Ultimate Guide To Sleep Tracking | Sleep Junkies

The Ultimate Guide To Sleep Tracking | Sleep Junkies

Some pretty good data here...

http://sleepjunkies.com/features/the-ultimate-guide-to-sleep-tracking/

Obama unveils $4.2 billion plan to teach kids computer science - CSMonitor.com

Obama unveils $4.2 billion plan to teach kids computer science - CSMonitor.com

http://m.csmonitor.com/USA/Education/2016/0130/Obama-unveils-4.2-billion-plan-to-teach-kids-computer-science

Powerball Jackpot at $1.5 Billion, 'But Not Many Jacks in the Pot - High Country Press

Powerball Jackpot at $1.5 Billion, 'But Not Many Jacks in the Pot -
High Country Press

http://www.hcpress.com/news/powerball-jackpot-at-1-5-billion-but-not-many-jacks-in-the-pot.html

Proof of "Too Much TV"? The Full List of 1,400-Plus Primetime Series That Aired Last Year - Hollywood Reporter

Proof of "Too Much TV"? The Full List of 1,400-Plus Primetime Series
That Aired Last Year - Hollywood Reporter

http://www.hollywoodreporter.com/live-feed/proof-tv-full-list-1400-859851

Data Privacy Day: Take Charge of Your Family’s Privacy | Electronic Frontier Foundation

Data Privacy Day: Take Charge of Your Family's Privacy | Electronic
Frontier Foundation


https://www.eff.org/deeplinks/2016/01/data-privacy-day-take-charge-your-familys-privacy

More CISOs looking to recruit cyber-security trainers than leaders, analysts, engineers or pen testers - When IT Meets Politics

More CISOs looking to recruit cyber-security trainers than leaders,
analysts, engineers or pen testers - When IT Meets Politics


http://www.computerweekly.com/blogs/when-it-meets-politics/2016/01/the-harvey-nash-survey-shows-t.html

VideoDriverHowto - Community Help Wiki

VideoDriverHowto - Community Help Wiki: "This guide and its subpages describe the driver situation in ubuntu and how to install proprietary binary/restricted drivers where open source drivers are not available."



'via Blog this'

Thursday, January 28, 2016

Report Shows Pretext for Passing CISA Was All Wrong - Reason.com

Report Shows Pretext for Passing CISA Was All Wrong - Reason.com: But contrary to the pro-CISA crowd's claims, "insufficient sharing" of our personal data by corporations and government agencies had nothing to do with the failure at OPM—and a new joint report from the FBI and the Department of Homeland Security (DHS) makes this clear.

Don't fear the Reaper - as mysterious new problems emerge - The Washington Post

More Air Force drones are crashing than ever as mysterious new problems emerge - The Washington Post: "General Atomics engineers made little headway in identifying the mechanical gremlin that was plaguing the starter-generators. Meanwhile, Reapers kept crashing."

What America's ISIS Strategy Is Missing | The National Interest

What America's ISIS Strategy Is Missing | The National Interest: "The real strategic shift would be to make governance issues matter more than military issues, get the anti–Islamic State coalition back into action for real and strike some hard but important diplomatic deals."

A Shodan Tutorial and Primer

A Shodan Tutorial and Primer: Shodan is a search engine for finding specific devices, and device types, that exist online. The most popular searches are for things like webcam, linksys, cisco, netgear, SCADA, etc.

And then there is this: http://www.howtogeek.com/169575/how-to-ensure-your-router-cameras-printers-and-other-devices-arent-accessible-on-the-internet/

How Canada’s Cybercrime Problems Differ From the US | Motherboard

How Canada’s Cybercrime Problems Differ From the US | Motherboard: Canada’s underground market for stolen banking credentials, cards, and IDs, is also thriving, Hellberg writes...

Cybercrime: an overview of incidents and issues in Canada - Royal Canadian Mounted Police

Cybercrime: an overview of incidents and issues in Canada - Royal Canadian Mounted Police: The RCMP's first report on cybercrime, and focuses on aspects of the cybercrime environment that affect Canada's public organizations, businesses and citizens in real and harmful ways. 2014

Canadian security professionals unsure about defenses, Ponemon study finds | IT Business

Canadian security professionals unsure about defenses, Ponemon study finds | IT Business: A little over half of Canada’s IT security professionals aren’t very confident about their ability to defend against attacks: Ponemon 2014

Sunday, January 24, 2016

How to Make a $19 Police Radio Scanner - All

How to Make a $19 Police Radio Scanner - All: "In this guide I will explain how to build an inexpensive SDR (software defined radio) that can be used to receive police, fire, taxi, and other digital radio transmissions."



'via Blog this'

Saturday, January 23, 2016

As if a 20-Year Consent Order Wasn’t Enough Fun: FTC Brings First Monetary Settlement in Information Security Case

As if a 20-Year Consent Order Wasn’t Enough Fun: FTC Brings First Monetary Settlement in Information Security Case - Lexology: The FTC reached a $250,000 settlement with a 20-year consent order with Henry Schein Practice Solutions, Inc. over its use of allegedly subpar encryption technology in its offering to dental practices.

Project Ubertooth - Ubertooth One

Project Ubertooth - Ubertooth One: Ubertooth One is the next generation hardware platform of Project Ubertooth. It supersedes Ubertooth Zero and is currently the preferred platform.

Amazon.com: IEIK SDRMCX RTL-SDR, FM DAB, DVB-T USB Stick

Amazon.com: IEIK SDRMCX RTL-SDR, FM DAB, DVB-T USB Stick Set with RTL2832U & R820T. Great SDR for SDR#, Low-Cost Software Defined Radio Compatible with Many SDR Software Packages: Electronics



Great for many applications including general radio scanning, air
traffic control, public safety radio, ADS-B aircraft radar, AIS boat
radar, ACARS, trunked radio, P25/MotoTRBO digital voice, TETRA, POCSAG,
weather balloons, APRS, NOAA APT weather satellites, Meteor M2
satellites, radio astronomy, meteor scatter monitoring, DAB, or for use
as a low cost panadapter with a traditional ham radio. 

Guide to setting up your RTL2832U DVB-T stick for SDR | Ham Radio Science

Guide to setting up your RTL2832U DVB-T stick for SDR | Ham Radio Science: Even though the instructions below for installing a RTL2832U stick are valid...



SDR

Alternative Installation Procedure for RTL Sticks and HDSDR

Alternative Installation Procedure for RTL Sticks and HDSDR | Ham Radio Science: There is a new ExtIO.dll available for supporting HDSDR with RTL2832U based SDR sticks.



SDR

Medical fraud north of the 49th

For the trip...

http://www.ncbi.nlm.nih.gov/pmc/articles/PMC3537805/

Cyber Conscious: Why Time Is Running Out for Executives With No Cybersecurity Initiatives

..."choosing an executive with security aptitude must be at the center of the selection process."

https://securityintelligence.com/cyber-conscious-why-time-is-running-out-for-executives-with-no-cybersecurity-initiatives/?utm_content=buffer4309c&utm_medium=social&utm_source=twitter.com&utm_campaign=buffer

Go Garmin! Get Fitness and Fashion- Garmin Vivofit 2 Fitness Tracker Review | Wear Action

Go Garmin! Get Fitness and Fashion- Garmin Vivofit 2 Fitness Tracker
Review | Wear Action

"keeping track of how long you're restless, awake, or sleeping
peacefully as well as vibrating at your wrist to wake you"

http://wearaction.com/garmin-vivofit-2-activity-tracker

When hacking saves lives: Hacking medical devices and implants

When hacking saves lives: Hacking medical devices and implants

http://www.net-security.org/secworld.php?id=19282

Friday, January 22, 2016

Yet another bill seeks to weaken encryption-by-default on smartphones | Ars Technica

Yet another bill seeks to weaken encryption-by-default on smartphones
| Ars Technica

"Ted Lieu (D-Calif.) wholly dismissed law enforcement's arguments that
they needed new expansive powers..."

http://arstechnica.com/tech-policy/2016/01/yet-another-bill-seeks-to-weaken-encryption-by-default-on-smartphones/

Thursday, January 21, 2016

Assessing IT Security Standards Against the Upcoming GDPR for Cloud Systems

"This work in progress aims at identifying a mapping between the current security standards (in particular, but not limited to, ISO 27001-2013) and the upcoming regulations in data protection. "

https://orbilu.uni.lu/handle/10993/20791

Monday, January 18, 2016

DDoS scammers collect $20,000 with Ashley Madison extortion | CSO Online

...Since September, Salted Hash has followed the extortion attempts from a group of scammers overseas who are targeting the leaked Ashley Madison email list....

http://www.csoonline.com/article/2996614/cyber-attacks-espionage/ddos-scammers-collect-20-000-with-ashley-madison-extortion.html

Medtronic Announces Foray Into Wearable Tech For Mental Health

Medtronic is collaborating with Australian medtech company Medibio on a non-invasive, wearable device-based solution to diagnose depression and other mental conditions using electrocardiogram (ECG) and circadian heart rate variability analysis.

http://www.meddeviceonline.com/doc/medtronic-announces-foray-into-wearable-tech-for-mental-health-0001

National Consumer Health Privacy Survey 2005 - CHCF.org

National Consumer Health Privacy Survey 2005 - CHCF.org: "despite federal protections under HIPAA — two in three Americans were concerned about the confidentiality of their personal health information and were largely unaware of their privacy rights."

Recent Developments in Canadian Privacy and Cybersecurity Law | Junto

...helpful...

http://juntoblog.net/recent-developments-in-canadian-privacy-and-cybersecurity-law/

Michael Power » The Canadian Privacy Cases of 2014

Very interesting...and helpful. Check on 2015.

http://michaelpower.ca/2015/02/the-canadian-privacy-cases-of-2014/

Ontario’s sole health privacy prosecution quietly dismissed | Toronto Star

...If found guilty, McLellan would have been the first individual convicted under the 2004 Personal Health Information Protection Act (PHIPA) — but she no longer faces a trial or the possible $50,000 fine...

http://www.thestar.com/life/health_wellness/2015/03/30/ontarios-sole-health-privacy-prosecution-quietly-dismissed.html

CSA Model Code | CIPP Guide

... Canada was the first country in the world to establish a voluntary, national standard for personal information protection.

https://www.cippguide.org/2010/06/29/csa-model-code/

Friday, January 15, 2016

Thursday, January 14, 2016

Agreement reached on new EU cyber-security rules - Lexology

Agreement reached on new EU cyber-security rules - Lexology

http://www.lexology.com/library/detail.aspx?g=c91e9963-d752-42dc-b186-0d475e91c659

New EU cybersecurity rules neutered by future backdoors, weakened crypto | Ars Technica

New EU cybersecurity rules neutered by future backdoors, weakened
crypto | Ars Technica

http://arstechnica.com/tech-policy/2015/12/new-eu-cybersecurity-rules-neutered-by-future-backdoors-and-weakened-crypto/

First EU-wide rules to improve cybersecurity: deal with EP - Consilium

First EU-wide rules to improve cybersecurity: deal with EP - Consilium

This is in top of and different from GDPR.

http://www.consilium.europa.eu/en/press/press-releases/2015/12/08-improve-cybersecurity/

When hacking saves lives: Hacking medical devices and implants

When hacking saves lives: Hacking medical devices and implants


http://www.net-security.org/secworld.php?id=19282

Nissan Shuts Websites After Anti-whaling Cyber Attack | SecurityWeek.Com

Hacktivism...

http://www.securityweek.com/nissan-shuts-websites-after-anti-whaling-cyber-attack?utm_source=dlvr.it&utm_medium=twitter

Cyber security attacks are on the rise

ICS CERT ...

http://www.businessinsider.com/r-us-official-sees-more-cyber-attacks-on-industrial-control-systems-2016-1

Cyber security: "Without fair protection at European level, we will be in trouble"

Check status...

http://www.europarl.europa.eu/news/en/news-room/20160113STO09602/Cyber-security-Without-fair-protection-at-European-level-we'll-be-in-trouble

Cyber Security Incident Response Plan - business.com

Decent depth...

http://www.business.com/internet-security/prepare-cyber-security-incident-response-plan/

Wednesday, January 13, 2016

What Malware Taught us for 2016 - BankInfoSecurity

...A senior cybersecurity evangelist at IBM Security, Kessem says she sees a significant new sophistication in common malware - signs that organized crime has stepped in and exerted influence.

http://www.bankinfosecurity.com/whitepapers.php?wp_id=2166&rf=kessem

Powerball Windfall? Schools Don't Always Benefit From Lottery Sales - NBC News

State legisfakers...

http://www.nbcnews.com/news/us-news/powerball-windfall-schools-don-t-always-benefit-lottery-sales-n494746

Privacy by Design: An Engineering Ethics Perspective

Privacy by Design: An Engineering Ethics Perspective: "This panel, part of the "IT, Ethics, and Law" lecture series co-sponsored by the Ethics Center and the High Tech Law Institute, was held January 23, 2013."



'via Blog this'

Privacy-by-Design: Understanding Data Access Models for Secondary Data

Privacy-by-Design: Understanding Data Access Models for Secondary Data: "We review state of the art in privacy protection technology and policy frameworks from widely different fields, and synthesize the findings to present a comprehensive system of privacy protection in population informatics research using the privacy-by-design approach."

Also check out: https://www.blackhat.com/docs/asia-14/materials/Chow/WP-Asia-14-Chow-Privacy-By-Design-For-The-Security-Practitioner.pdf

And buy this for AL blog post: http://link.springer.com/chapter/10.1007%2F978-94-017-9385-8_16

Note this: https://iapp.org/media/pdf/knowledge_center/PbD_Popdata_BC.pdf

'via Blog this'

Opacity | Technology

Opacity | Technology: "Opacity provides a transparency-enhancing tool in the form of a cryptographic scheme that enables companies to inform end-users about the actual data processing that takes place on their personal data."



'via Blog this'

Tuesday, January 12, 2016

The 2016 cyber security roadmap | Information Age

The 2016 cyber security roadmap | Information Age


http://www.information-age.com/technology/security/123460760/2016-cyber-security-roadmap

OASIS Privacy by Design Documentation for Software Engineers (PbD-SE) TC | OASIS

The OASIS PbD-SE TC provides privacy governance and documentation standards for software engineers. It enables software organizations to embed privacy into the design and architecture of IT systems, without diminishing system functionality.

https://www.oasis-open.org/committees/tc_home.php?wg_abbrev=pbd-se

Saturday, January 9, 2016

6 Guidelines To Follow When Developing Combination Products

Dentrix G5 used a less complex method of data masking to protect patient data than Advanced Encryption Standard (AES), which is recommended as an industry standard by the National Institute of Standards and Technology (NIST) and provides the appropriate protection to meet certain regulatory obligations under HIPAA. Nevertheless, for two years, Schein touted the product's "encryption capabilities" for protecting patient information and meeting "data protection regulations" in multiple marketing materials, including newsletters and brochures targeted at dentists.

http://www.meddeviceonline.com/doc/guidelines-to-follow-when-developing-combination-products-0001?user=3102642&source=nl:44700&utm_source=et_6231171&utm_medium=email&utm_campaign=MDOL_2016-01-09-Weekly-recap&utm_term=44ebb10c-3bba-4083-aa12-aba70ece19d4&utm_content=http%3a%2f%2fwww.meddeviceonline.com%2fnl%2f1869764%2f%25%25_subscriberkey%25%25

Dental Practice Software Provider Settles FTC Charges It Misled Customers About Encryption of Patient Data | Federal Trade Commission

Dentrix G5 used a less complex method of data masking to protect patient data than Advanced Encryption Standard (AES), which is recommended as an industry standard by the National Institute of Standards and Technology (NIST) and provides the appropriate protection to meet certain regulatory obligations under HIPAA. Nevertheless, for two years, Schein touted the product's "encryption capabilities" for protecting patient information and meeting "data protection regulations" in multiple marketing materials, including newsletters and brochures targeted at dentists.

https://www.ftc.gov/news-events/press-releases/2016/01/dental-practice-software-provider-settles-ftc-charges-it-misled

25 CISOs Identify the Biggest Security Challenges as They Enter 2016

Share...

http://www.securitycurrent.com/en/ciso_journal/ac_ciso_journal/cisos-identify-the-biggest-security-challenges-as-they-enter-the-new-year




From Stephen's mobile: 1 (619) 203-8317
Warning: May contain autocorrec terrors.

practical "privacy by design" health data - Google Scholar

Oh Canada...

https://scholar.google.com/scholar?as_ylo=2012&q=practical+%22privacy+by+design%22+health+data&hl=en&as_sdt=0,5&as_vis=1

practical privacy by design health data - Google Search

O Canada....

https://www.google.com/search?q=practical+privacy+by+design+health+data&oq=practical+privacy+by+design+health+data&aqs=chrome..69i57.18287j0j4&client=tablet-android-google&sourceid=chrome-mobile&ie=UTF-8

Survey finds most adults concerned about health data security

Survey finds most adults concerned about health data security: According to a recent survey by the University of Phoenix, the majority of adults in the U.S. - more than 75 percent, in fact - are concerned about the security of their healthcare data. With such a high number, it is clear this is a concern that professionals in the medical field need to take seriously to maximize patient experience.

Friday, January 8, 2016

Bio memetic security

Check it out ...

http://mobile.deloitte.wsj.com/cio/2016/01/04/the-nature-lovers-guide-to-cyber-security/

2015 Industry Drill-Down Report - Healthcare

2015 Industry Drill-Down Report - Healthcare: Modern medical care is delivered through an incredibly complex network of information technology systems connecting patients, doctors, nurses, pharmacists, technicians, administrators and accountants with electronic health records (EHR), connected medical devices and insurance companies.

Saturday, January 2, 2016

Absolutely No Machete Juggling » The Star Wars Saga: Introducing Machete Order

Absolutely No Machete Juggling » The Star Wars Saga: Introducing Machete Order: "How can you ensure that a viewing keeps the Vader reveal a sur­prise, while in­tro­duc­ing young Anakin before the end of Return of the Jedi?

Simple, watch them in this order: IV, V, II, III, VI. You may notice Episode I is gone. I'll get to that in a second.

"



'via Blog this'

Obama Administration Receives Little Support for the Consumer Privacy Bill of Rights Act | Ad Law Access

Good recital of the issues...

http://www.adlawaccess.com/2015/03/articles/obama-administration-receives-little-support-for-the-consumer-privacy-bill-of-rights-act/

Obama to propose new student privacy legislation - The Washington Post

Needed because there's no data protection law.

https://www.washingtonpost.com/local/education/obama-to-propose-new-student-privacy-legislation/2015/01/18/2ad6a8ae-9d92-11e4-bcfb-059ec7a93ddc_story.html

WIRED: Personal Privacy Is Only One of the Costs of NSA Surveillance

Check out this great article I read on WIRED:

Personal Privacy Is Only One of the Costs of NSA Surveillance

""But if you look closer, the more accurate story is that in the name of security, we're trading away not only privacy, but also the U.S. tech economy, internet openness, America's foreign policy interests and cybersecurity."

http://www.wired.com/2014/07/the-big-costs-of-nsa-surveillance-that-no-ones-talking-about/

Recommendations · SecUpwN/Android-IMSI-Catcher-Detector Wiki · GitHub

...yo cc, check dees out...

https://github.com/SecUpwN/Android-IMSI-Catcher-Detector/wiki/Recommendations

FBI admits it uses stingrays, zero-day exploits | Ars Technica UK

"Hess acknowledged that the bureau uses zero-days—the first time an official has done so. She said the trade-off is one the bureau wrestles with. "What is the greater good—to be able to identify a person who is threatening public safety?" Or to alert software makers to bugs that, if unpatched, could leave consumers vulnerable?

"How do we balance that?" she said. "That is a constant challenge for us.""

http://arstechnica.co.uk/tech-policy/2015/12/fbi-admits-it-uses-stingrays-zero-day-exploits/

Catching Kevin | WIRED

Catching Kevin | WIRED

Stingray

http://www.wired.com/1996/02/catching/

What Is the Big Secret Surrounding Stingray Surveillance? - Scientific American

What Is the Big Secret Surrounding Stingray Surveillance? - Scientific American

Owsely

http://www.scientificamerican.com/article/what-is-the-big-secret-surrounding-stingray-surveillance/

NACDL - Home

NACDL - Home

http://www.nacdl.org/