Sunday, January 31, 2016

The Secrets to Giving Day-Old French Fries a Delicious Second Life

The Secrets to Giving Day-Old French Fries a Delicious Second Life | Food Hacks: If you don't have a baking sheet, never fear—that cast iron skillet works here, too, unless you're reheating a truly ginormous amount of leftover fries.

Amazon.com: S+ By ResMed Personal Sleep Solution: Health & Personal Care

Amazon.com: S+ By ResMed Personal Sleep Solution: Health & Personal Care

Is the quantified self cyber-narcissism? Or a more responsible way to live?

http://www.amazon.com/S-ResMed-Personal-Sleep-Solution/dp/B00NP52QE0/ref=sr_1_1?ie=UTF8&qid=1454268399&sr=8-1&keywords=resmed+s%2B

The Ultimate Guide To Sleep Tracking | Sleep Junkies

The Ultimate Guide To Sleep Tracking | Sleep Junkies

Some pretty good data here...

http://sleepjunkies.com/features/the-ultimate-guide-to-sleep-tracking/

VideoDriverHowto - Community Help Wiki

VideoDriverHowto - Community Help Wiki: "This guide and its subpages describe the driver situation in ubuntu and how to install proprietary binary/restricted drivers where open source drivers are not available."



'via Blog this'

Saturday, January 30, 2016

Thursday, January 28, 2016

Report Shows Pretext for Passing CISA Was All Wrong - Reason.com

Report Shows Pretext for Passing CISA Was All Wrong - Reason.com: But contrary to the pro-CISA crowd's claims, "insufficient sharing" of our personal data by corporations and government agencies had nothing to do with the failure at OPM—and a new joint report from the FBI and the Department of Homeland Security (DHS) makes this clear.

Don't fear the Reaper - as mysterious new problems emerge - The Washington Post

More Air Force drones are crashing than ever as mysterious new problems emerge - The Washington Post: "General Atomics engineers made little headway in identifying the mechanical gremlin that was plaguing the starter-generators. Meanwhile, Reapers kept crashing."

What America's ISIS Strategy Is Missing | The National Interest

What America's ISIS Strategy Is Missing | The National Interest: "The real strategic shift would be to make governance issues matter more than military issues, get the anti–Islamic State coalition back into action for real and strike some hard but important diplomatic deals."

A Shodan Tutorial and Primer

A Shodan Tutorial and Primer: Shodan is a search engine for finding specific devices, and device types, that exist online. The most popular searches are for things like webcam, linksys, cisco, netgear, SCADA, etc.

And then there is this: http://www.howtogeek.com/169575/how-to-ensure-your-router-cameras-printers-and-other-devices-arent-accessible-on-the-internet/

How Canada’s Cybercrime Problems Differ From the US | Motherboard

How Canada’s Cybercrime Problems Differ From the US | Motherboard: Canada’s underground market for stolen banking credentials, cards, and IDs, is also thriving, Hellberg writes...

Cybercrime: an overview of incidents and issues in Canada - Royal Canadian Mounted Police

Cybercrime: an overview of incidents and issues in Canada - Royal Canadian Mounted Police: The RCMP's first report on cybercrime, and focuses on aspects of the cybercrime environment that affect Canada's public organizations, businesses and citizens in real and harmful ways. 2014

Canadian security professionals unsure about defenses, Ponemon study finds | IT Business

Canadian security professionals unsure about defenses, Ponemon study finds | IT Business: A little over half of Canada’s IT security professionals aren’t very confident about their ability to defend against attacks: Ponemon 2014

Sunday, January 24, 2016

How to Make a $19 Police Radio Scanner - All

How to Make a $19 Police Radio Scanner - All: "In this guide I will explain how to build an inexpensive SDR (software defined radio) that can be used to receive police, fire, taxi, and other digital radio transmissions."



'via Blog this'

Saturday, January 23, 2016

As if a 20-Year Consent Order Wasn’t Enough Fun: FTC Brings First Monetary Settlement in Information Security Case

As if a 20-Year Consent Order Wasn’t Enough Fun: FTC Brings First Monetary Settlement in Information Security Case - Lexology: The FTC reached a $250,000 settlement with a 20-year consent order with Henry Schein Practice Solutions, Inc. over its use of allegedly subpar encryption technology in its offering to dental practices.

Project Ubertooth - Ubertooth One

Project Ubertooth - Ubertooth One: Ubertooth One is the next generation hardware platform of Project Ubertooth. It supersedes Ubertooth Zero and is currently the preferred platform.

Amazon.com: IEIK SDRMCX RTL-SDR, FM DAB, DVB-T USB Stick

Amazon.com: IEIK SDRMCX RTL-SDR, FM DAB, DVB-T USB Stick Set with RTL2832U & R820T. Great SDR for SDR#, Low-Cost Software Defined Radio Compatible with Many SDR Software Packages: Electronics



Great for many applications including general radio scanning, air
traffic control, public safety radio, ADS-B aircraft radar, AIS boat
radar, ACARS, trunked radio, P25/MotoTRBO digital voice, TETRA, POCSAG,
weather balloons, APRS, NOAA APT weather satellites, Meteor M2
satellites, radio astronomy, meteor scatter monitoring, DAB, or for use
as a low cost panadapter with a traditional ham radio. 

Alternative Installation Procedure for RTL Sticks and HDSDR

Alternative Installation Procedure for RTL Sticks and HDSDR | Ham Radio Science: There is a new ExtIO.dll available for supporting HDSDR with RTL2832U based SDR sticks.



SDR

Go Garmin! Get Fitness and Fashion- Garmin Vivofit 2 Fitness Tracker Review | Wear Action

Go Garmin! Get Fitness and Fashion- Garmin Vivofit 2 Fitness Tracker
Review | Wear Action

"keeping track of how long you're restless, awake, or sleeping
peacefully as well as vibrating at your wrist to wake you"

http://wearaction.com/garmin-vivofit-2-activity-tracker

Friday, January 22, 2016

Yet another bill seeks to weaken encryption-by-default on smartphones | Ars Technica

Yet another bill seeks to weaken encryption-by-default on smartphones
| Ars Technica

"Ted Lieu (D-Calif.) wholly dismissed law enforcement's arguments that
they needed new expansive powers..."

http://arstechnica.com/tech-policy/2016/01/yet-another-bill-seeks-to-weaken-encryption-by-default-on-smartphones/

Thursday, January 21, 2016

Assessing IT Security Standards Against the Upcoming GDPR for Cloud Systems

"This work in progress aims at identifying a mapping between the current security standards (in particular, but not limited to, ISO 27001-2013) and the upcoming regulations in data protection. "

https://orbilu.uni.lu/handle/10993/20791

Wednesday, January 20, 2016

Tuesday, January 19, 2016

OUTLOOK 2016: Lab Tests, Cybersecurity, Off-Label Use Among Top Device Issues | Bloomberg BNA

OUTLOOK 2016: Lab Tests, Cybersecurity, Off-Label Use Among Top Device Issues | Bloomberg BNA: “Combination product reform seems likely in 2016,” Thompson said. Thompson, with Epstein Becker & Green PC in Washington, is also the general counsel of the Combination Product Coalition (CPC), an industry group.

Monday, January 18, 2016

DDoS scammers collect $20,000 with Ashley Madison extortion | CSO Online

...Since September, Salted Hash has followed the extortion attempts from a group of scammers overseas who are targeting the leaked Ashley Madison email list....

http://www.csoonline.com/article/2996614/cyber-attacks-espionage/ddos-scammers-collect-20-000-with-ashley-madison-extortion.html

Medtronic Announces Foray Into Wearable Tech For Mental Health

Medtronic is collaborating with Australian medtech company Medibio on a non-invasive, wearable device-based solution to diagnose depression and other mental conditions using electrocardiogram (ECG) and circadian heart rate variability analysis.

http://www.meddeviceonline.com/doc/medtronic-announces-foray-into-wearable-tech-for-mental-health-0001

National Consumer Health Privacy Survey 2005 - CHCF.org

National Consumer Health Privacy Survey 2005 - CHCF.org: "despite federal protections under HIPAA — two in three Americans were concerned about the confidentiality of their personal health information and were largely unaware of their privacy rights."

Ontario’s sole health privacy prosecution quietly dismissed | Toronto Star

...If found guilty, McLellan would have been the first individual convicted under the 2004 Personal Health Information Protection Act (PHIPA) — but she no longer faces a trial or the possible $50,000 fine...

http://www.thestar.com/life/health_wellness/2015/03/30/ontarios-sole-health-privacy-prosecution-quietly-dismissed.html

CSA Model Code | CIPP Guide

... Canada was the first country in the world to establish a voluntary, national standard for personal information protection.

https://www.cippguide.org/2010/06/29/csa-model-code/

Sunday, January 17, 2016

2016 Cybercrime Reloaded: Our Predictions for the Year Ahead - Security Intelligence

2016 Cybercrime Reloaded: Our Predictions for the Year Ahead -
Security Intelligence

https://apple.news/AqHTdB4iLNmGVt846maVpkA

$30 webcam spun into persistent network backdoor • The Register

"It is not something users should expect to surface in the wild and is rather an example of the risks posed by internet-of-things devices. Ollman dumped and reflashed the camera's firmware so that it opened a remote backdoor..."

http://www.theregister.co.uk/2016/01/13/30_dlink_web_cam_spun_into_persistent_network_backdoor/

Friday, January 15, 2016

MAVProxyUser/SilverPushUnmasked · GitHub

MAVProxyUser/SilverPushUnmasked · GitHub: "After reading the ARSTechnica article "Beware of ads that use inaudible sound to link your phone, TV, tablet, and PC" I decided to take a look around and see what all the hype was about."



'via Blog this'

Privacy by design: delivering the promises(pdf) | Paperity

Privacy by design: delivering the promises(pdf) | Paperity: An introductory message from Peter Hustinx, European Data Protection Supervisor, delivered at Privacy by Design:

First EU-wide rules to improve cybersecurity: deal with EP - Consilium

First EU-wide rules to improve cybersecurity: deal with EP - Consilium

This is in top of and different from GDPR.

http://www.consilium.europa.eu/en/press/press-releases/2015/12/08-improve-cybersecurity/

Wednesday, January 13, 2016

What Malware Taught us for 2016 - BankInfoSecurity

...A senior cybersecurity evangelist at IBM Security, Kessem says she sees a significant new sophistication in common malware - signs that organized crime has stepped in and exerted influence.

http://www.bankinfosecurity.com/whitepapers.php?wp_id=2166&rf=kessem

Privacy by Design: An Engineering Ethics Perspective

Privacy by Design: An Engineering Ethics Perspective: "This panel, part of the "IT, Ethics, and Law" lecture series co-sponsored by the Ethics Center and the High Tech Law Institute, was held January 23, 2013."



'via Blog this'

Privacy-by-Design: Understanding Data Access Models for Secondary Data

Privacy-by-Design: Understanding Data Access Models for Secondary Data: "We review state of the art in privacy protection technology and policy frameworks from widely different fields, and synthesize the findings to present a comprehensive system of privacy protection in population informatics research using the privacy-by-design approach."

Also check out: https://www.blackhat.com/docs/asia-14/materials/Chow/WP-Asia-14-Chow-Privacy-By-Design-For-The-Security-Practitioner.pdf

And buy this for AL blog post: http://link.springer.com/chapter/10.1007%2F978-94-017-9385-8_16

Note this: https://iapp.org/media/pdf/knowledge_center/PbD_Popdata_BC.pdf

'via Blog this'

Opacity | Technology

Opacity | Technology: "Opacity provides a transparency-enhancing tool in the form of a cryptographic scheme that enables companies to inform end-users about the actual data processing that takes place on their personal data."



'via Blog this'

OASIS Privacy by Design Documentation for Software Engineers (PbD-SE) TC | OASIS

The OASIS PbD-SE TC provides privacy governance and documentation standards for software engineers. It enables software organizations to embed privacy into the design and architecture of IT systems, without diminishing system functionality.

https://www.oasis-open.org/committees/tc_home.php?wg_abbrev=pbd-se

Saturday, January 9, 2016

6 Guidelines To Follow When Developing Combination Products

Dentrix G5 used a less complex method of data masking to protect patient data than Advanced Encryption Standard (AES), which is recommended as an industry standard by the National Institute of Standards and Technology (NIST) and provides the appropriate protection to meet certain regulatory obligations under HIPAA. Nevertheless, for two years, Schein touted the product's "encryption capabilities" for protecting patient information and meeting "data protection regulations" in multiple marketing materials, including newsletters and brochures targeted at dentists.

http://www.meddeviceonline.com/doc/guidelines-to-follow-when-developing-combination-products-0001?user=3102642&source=nl:44700&utm_source=et_6231171&utm_medium=email&utm_campaign=MDOL_2016-01-09-Weekly-recap&utm_term=44ebb10c-3bba-4083-aa12-aba70ece19d4&utm_content=http%3a%2f%2fwww.meddeviceonline.com%2fnl%2f1869764%2f%25%25_subscriberkey%25%25

Dental Practice Software Provider Settles FTC Charges It Misled Customers About Encryption of Patient Data | Federal Trade Commission

Dentrix G5 used a less complex method of data masking to protect patient data than Advanced Encryption Standard (AES), which is recommended as an industry standard by the National Institute of Standards and Technology (NIST) and provides the appropriate protection to meet certain regulatory obligations under HIPAA. Nevertheless, for two years, Schein touted the product's "encryption capabilities" for protecting patient information and meeting "data protection regulations" in multiple marketing materials, including newsletters and brochures targeted at dentists.

https://www.ftc.gov/news-events/press-releases/2016/01/dental-practice-software-provider-settles-ftc-charges-it-misled

25 CISOs Identify the Biggest Security Challenges as They Enter 2016

Share...

http://www.securitycurrent.com/en/ciso_journal/ac_ciso_journal/cisos-identify-the-biggest-security-challenges-as-they-enter-the-new-year




From Stephen's mobile: 1 (619) 203-8317
Warning: May contain autocorrec terrors.

Survey finds most adults concerned about health data security

Survey finds most adults concerned about health data security: According to a recent survey by the University of Phoenix, the majority of adults in the U.S. - more than 75 percent, in fact - are concerned about the security of their healthcare data. With such a high number, it is clear this is a concern that professionals in the medical field need to take seriously to maximize patient experience.

2015 Industry Drill-Down Report - Healthcare

2015 Industry Drill-Down Report - Healthcare: Modern medical care is delivered through an incredibly complex network of information technology systems connecting patients, doctors, nurses, pharmacists, technicians, administrators and accountants with electronic health records (EHR), connected medical devices and insurance companies.

Wednesday, January 6, 2016

Ammon Bundy: His history and a $500,000 federal loan | OregonLive.com

Ammon Bundy: His history and a $500,000 federal loan | OregonLive.com

"come participate in this wonderful thing in Harney County that the
Lord is about to accomplish."

http://www.oregonlive.com/pacific-northwest-news/index.ssf/2016/01/ammon_bundy_his_history_and_a.html

Tuesday, January 5, 2016

Voice Command Watch User Manual | Martian Smartwatch

Voice Command Watch User Manual | Martian Smartwatch: Mobile Phones: The “talk and listen” feature of your watch will work with selected iPhone and Android mobile phones that have Bluetooth wireless technology and a Hands-Free Profile (HFP).

Saturday, January 2, 2016

Absolutely No Machete Juggling » The Star Wars Saga: Introducing Machete Order

Absolutely No Machete Juggling » The Star Wars Saga: Introducing Machete Order: "How can you ensure that a viewing keeps the Vader reveal a sur­prise, while in­tro­duc­ing young Anakin before the end of Return of the Jedi?

Simple, watch them in this order: IV, V, II, III, VI. You may notice Episode I is gone. I'll get to that in a second.

"



'via Blog this'

WIRED: Personal Privacy Is Only One of the Costs of NSA Surveillance

Check out this great article I read on WIRED:

Personal Privacy Is Only One of the Costs of NSA Surveillance

""But if you look closer, the more accurate story is that in the name of security, we're trading away not only privacy, but also the U.S. tech economy, internet openness, America's foreign policy interests and cybersecurity."

http://www.wired.com/2014/07/the-big-costs-of-nsa-surveillance-that-no-ones-talking-about/

FBI admits it uses stingrays, zero-day exploits | Ars Technica UK

"Hess acknowledged that the bureau uses zero-days—the first time an official has done so. She said the trade-off is one the bureau wrestles with. "What is the greater good—to be able to identify a person who is threatening public safety?" Or to alert software makers to bugs that, if unpatched, could leave consumers vulnerable?

"How do we balance that?" she said. "That is a constant challenge for us.""

http://arstechnica.co.uk/tech-policy/2015/12/fbi-admits-it-uses-stingrays-zero-day-exploits/