Just a basic blog—snagging random stuff that catches our eye—nothing else, really...
Thursday, June 30, 2016
Cybersecurity and privacy | Digital Single Market
Wednesday, June 29, 2016
wsRadio.com | 06/24/16 Cyber Boot Camp Report - wsRadio.com
Mobile ransomware use jumps, blocking access to phones | Network World
'via Blog this'
The EU’s fight against cybercrime continues – attacks against information systems
Monday, June 27, 2016
Historical exchange rates from 1953 with graph and charts
http://fxtop.com/en/historical-exchange-rates.php?A=1&C1=GBP&C2=USD&YA=1&DD1=01&MM1=01&YYYY1=1953&B=1&P=&I=1&DD2=27&MM2=06&YYYY2=2016&btnOK=Go%21
Sunday, June 26, 2016
Saturday, June 25, 2016
The Antivirus Industry’s Dirty Little Secret
'via Blog this'
Friday, June 24, 2016
Don’t Let Cybercriminals Hide from the FBI
"The rest of the security world calls the NIT "malicious code" ("malcode" for short) and deploying it "hacking," because the software exploits a vulnerability in the target's computer, the same way a criminal would."
http://www.govtech.com/opinion/Dont-Let-Cybercriminals-Hide-from-the-FBI.html
Thursday, June 23, 2016
Work and Personality: Use of the NEO-PI-R
Psychology - Costa - 2008 - Applied Psychology - Wiley Online Library
http://onlinelibrary.wiley.com/doi/10.1111/j.1464-0597.1996.tb00766.x/abstract
Wednesday, June 22, 2016
Chapter 1: Section 1: Introduction To Personality Theory And Development | AllPsych
"A trait is a relatively permanent individual characteristic. For example, most of know people who are outgoing, friendly, confident, or shy. When we describe these people, we use these traits to better understand their personality; to better understand who they are. A state, on the other hand, is a temporary change in one's personality. Examples of states might be angry, depressed, fearful, or anxious. We typically use states to describe a person's reaction to something."
Tuesday, June 21, 2016
Monday, June 20, 2016
Sync NI - Technology News, Business News in Belfast and Northern Ireland - The Evolution of Cloud
Sunday, June 19, 2016
More Companies Opt to Sit Out Trump’s Coronation in Cleveland - Bloomberg Politics
Bloomberg Politics
http://www.bloomberg.com/politics/articles/2016-06-16/more-companies-opt-to-sit-out-trump-s-coronation-in-cleveland
Six Answers to Trump's Question About 'What's Going On' With Muslims - The Atlantic
The Atlantic
http://www.theatlantic.com/international/archive/2016/06/trump-muslims-ban-orlando/486950/?utm_source=atltw
IEEE Xplore Abstract - Neural Markers of Cybersecurity: An fMRI Study of Phishing, and Malware Warnings
Annual Cyberjutsu Awards Nominations - Women's Society of Cyberjutsu
http://womenscyberjutsu.org/page/AWARDS16
Saturday, June 18, 2016
IEEE Xplore Abstract - Organisations Capability and Aptitude towards IT Security Governance
Friday, June 17, 2016
(IT) Information Technology Webinars | CompTIA
'via Blog this'
Thursday, June 16, 2016
Short Personality Test - The Psychometrics Centre
Wednesday, June 15, 2016
Monday, June 13, 2016
HIPAA Gotcha Questions for Business Associates
Orlando nightclub shooting: Talking gun control at a shooting range - BBC News
http://www.bbc.com/news/world-us-canada-36514354
Try VMware Workstation Player. Deliver a virtual desktop to your employees. | United States
Healthcare Compliance Gotchas - InformationWeek
Five Gray Areas of HIPAA You Can’t Ignore | EMR and HIPAA
HIPAA Happenings -- The New HITECH Act Megarule
Timeline of Important Events in the History of HIPAA - HIPAA Journal
Why Healthcare Ransomware Attacks Are HIPAA Data Breaches
Is Ransomware Considered A HIPAA Breach? |
Is Ransomware Considered A Health Data Breach Under HIPAA? - Forbes
Few Consequences For HIPAA Health Privacy Law's Repeat Offenders - ProPublica
You can't do that in healthcare: 5 tips on staying true to HIPAA | Healthcare Dive
Upset About Their Bad Yelp Reviews, Your Health Providers Are Spilling Patient Secrets — Pacific Standard
Sunday, June 12, 2016
EROVR - A Transformable Dolly, Wagon, & Cart | Indiegogo
The EROVR transforms 10 different ways to carry whatever life throws at you.
First batch of Chromebooks reach End Of Life and get no more support or updates
or updates | BetaNews
http://betanews.com/2016/06/10/google-chromebook-end-of-life/
Saturday, June 11, 2016
'Minnesota Men' on Trial
"Nur had commissioned him to kill 16 Americans supposedly responsible for airstrikes on ISIS in Kobane, Syria. ISIS had come up with the names and addresses of the pilots by hacking a military database. Omar complained this information was too "hot": He had accidentally clicked on the link to the names and addresses, making it possible for law enforcement to track him."
http://www.weeklystandard.com/minnesota-men-on-trial/article/2002781
Cyber risk as systemic risk | VOX, CEPR’s Policy Portal
"The root cause of systemic crises is risk-taking behaviour of economic"
http://voxeu.org/article/cyber-risk-systemic-risk
10 ways law firms can make life difficult for hackers | Network World
'via Blog this'
HIE Dispute with Vendor Spotlights Critical Security Issues
'via Blog this'
Friday, June 10, 2016
Thursday, June 9, 2016
NYTimes: There Are More White Voters Than People Think. That’s Good News for Trump.
News for Trump.
http://www.nytimes.com/2016/06/10/upshot/there-are-more-white-voters-than-people-think-thats-good-news-for-trump.html?smprod=nytcore-iphone&smid=nytcore-iphone-share
Your free anti-virus software is in jeopardy | Komando.com
http://www.komando.com/happening-now/358642/your-free-anti-virus-software-is-in-jeopardy
From My iPhone
Psychological tests & quizzes — WordPress Plugins
Norms for the Big Five Inventory and other personality measures – The Hardest Science
Calculating Scale Scores for Psychological Tests
Tuesday, June 7, 2016
Upset About Their Bad Yelp Reviews, Your Health Providers Are Spilling Patient Secrets — Pacific Standard
Take a personality test
"this website provides a collection of interactive personality tests with detailed results that can be taken for personal entertainment or to learn more about personality assessment"
Research Background and Frequently Asked Questions on the Big Five
Personality research, like any science, relies on quantifiable concrete data which can be used to examine what people are like. This is where the Big Five plays an important role.
Handy tools
https://sitecheck.sucuri.net//
Parasites:
http://www.unmaskparasites.com/
VirusTotal:
https://www.virustotal.com/
Malware:
http://quttera.com/website-malware-scanner#
IP check:
http://mxtoolbox.com/blacklists.aspx
Shipowners are unprepared for cyber risks
http://www.marinemec.com/news/view,shipowners-are-unprepared-for-cyber-risks_43195.htm
Monday, June 6, 2016
Upset About Their Bad Yelp Reviews, Your Health Providers Are Spilling Patient Secrets — Pacific Standard
'via Blog this'
Single Group Correlational Study: Basic Analyses
Protecting Corporate Data... When an Employee Leaves
Why Ex-Employees Might Just Be Your Company's Biggest Threat - Forbes
A Third of Ex-Employees Accessing Company Data - Enterprise Network Security Blog from ISDecisions
Sunday, June 5, 2016
Saturday, June 4, 2016
‘Wifi Whisperer’ Siphons Your Data in the Creepiest Way Possible | WIRED
For Cam, JD, etc.
http://www.wired.com/2016/06/wifi-whisperer-stalks-phones-data-creepiest-way-possible/
Friday, June 3, 2016
How Pure-Play is the PureFunds ISE Cyber Security ETF? - Investing News Network
http://investingnews.com/daily/tech-investing/cybersecurity-investing/how-pure-play-is-the-purefunds-ise-cyber-security-etf/
Want a job that pays at least $90,000 a year? Get into ransomware • The Register
http://www.theregister.co.uk/2016/06/03/ransomware_pays_90000_a_year/?utm_source=twitterfeed&utm_medium=twitter
Want a job that pays at least $90,000 a year? Get into ransomware • The Register
http://www.theregister.co.uk/2016/06/03/ransomware_pays_90000_a_year/?utm_source=twitterfeed&utm_medium=twitter
Thursday, June 2, 2016
wsRadio.com | 05/27/16 Mayor's Cyber Cup Winners Take on The Cyber Boot Camp - wsRadio.com
Recalls Look-up by VIN (Vehicle Identification Number)
With Remote Hacking, the Government’s Particularity Problem Isn’t Going Away | Just Security
Going Away | Just Security
https://www.justsecurity.org/31365/remote-hacking-governments-particularity-problem-isnt/
Wednesday, June 1, 2016
Out-of-Box Exploitation: A Security Analysis of OEM Updaters: Blog: Duo Security
'via Blog this'
Five tests for a theory of the crime drop - Springer
'via Blog this'
State CIOs struggle with cybersecurity, cloud computing amid rampant workforce changes, report finds | Healthcare IT News
"State governments face persistent challenges in cybersecurity risk reduction because of four key issues: inadequate strategic direction and organizational structure, constrained security budgets, increasing the sophistication of the threats, and lack of cybersecurity professionals."