Tuesday, February 27, 2018

Feds' case against alleged NSA hoarder hits turbulence - POLITICO

Feds' case against alleged NSA hoarder hits turbulence - POLITICO: "Mere unauthorized possession and retention of a document does not give rise to criminal liability," defense attorneys wrote. "What makes the conduct ... criminal is when the person knows the information in the document contains national defense information and, regardless of that knowledge, chooses to retain it at home."

Anatomy of an Attack on the Industrial IoT

Anatomy of an Attack on the Industrial IoT: "During her reconnaissance, she obtained access and visibility to a dozen gas detectors. Due to the Web server interface vulnerability identified in the ICS-CERT advisory, she can bypass the authentication process and make configuration changes to the device, such as altering detection ranges and alarm limits. This access enables her to generate alarms at will."

The Blockchain-GDPR Paradox – wearetheledger – Medium

The Blockchain-GDPR Paradox – wearetheledger – Medium: "some topics on how GDPR relates to blockchain technology. Especially on how GDPR has the opposite effect in some ways, when it comes to making Blockchain Architecture compliant with GDPR."

More Than Just Bitcoin: Blockchain Has Value Across Multiple Industries

More Than Just Bitcoin: Blockchain Has Value Across Multiple Industries: "The tokenized equity brings a dynamism never before seen in the venture capital industry, as the tokens are tradable on the secondary market and investors can sell them and cash in well ahead of an IPO."



And safer food...

Mobile ransomware skyrockets 415% in 2017 on the heel's of WannaCry's success | CIO Dive

Mobile ransomware skyrockets 415% in 2017 on the heel's of WannaCry's success | CIO Dive

https://www.ciodive.com/news/mobile-ransomware-skyrockets-415-in-2017-on-the-heels-of-wannacrys-succe/517960/

What makes Warren Buffett a ‘prime example’ of the failure of American capitalism? - MarketWatch

'Warren Buffett should not be celebrated as an avatar of American capitalism; he should be decried as a prime example of its failure, a false prophet leading the nation toward more monopoly and inequality.'

https://www.marketwatch.com/story/why-warren-buffett-is-a-prime-example-of-the-failure-of-american-capitalism-2018-02-15

Monday, February 26, 2018

International Association of Privacy Professionals

International Association of Privacy Professionals: Check out these 101-level resources to gain a high-level awareness of the laws, the job and the IAPP.

Third party risk - CyberGRX

Home - CyberGRX: "Always know which third parties pose the most risk to your enterprise. Spot data risk sooner, respond to threats from third parties faster."



'via Blog this'

TruSight third party risk

TruSight: "TruSight’s approach is unique — by working with industry participants and harnessing collective expertise, we raise standards for all and simplify the third-party risk assessment process."



'via Blog this'

How Houston's Data Centers Weathered the Storm • Data Center Frontier

How Houston's Data Centers Weathered the Storm • Data Center Frontier

https://datacenterfrontier.com/how-houstons-data-centers-weathered-the-storm/

Friday, February 23, 2018

Race, Class and the Disconnect in Tech Diversity Efforts

Race, Class and the Disconnect in Tech Diversity Efforts: "On Thanksgiving, 70 predominantly Latino food service workers lost their jobs at tech giant Intel’s Santa Clara, CA campus. Last week, the same company welcomed diversity dignitaries from all over the country to talk about increasing the numbers of Black and Latino workers in the tech sector."



'via Blog this'

This 'Gray Hat' Hacker Breaks Into Your Car — To Prove A Point : All Tech Considered : NPR

This 'Gray Hat' Hacker Breaks Into Your Car — To Prove A Point : All Tech Considered : NPR

https://www.npr.org/sections/alltechconsidered/2018/02/23/583682220/this-gray-hat-hacker-breaks-into-your-car-to-prove-a-point

Thursday, February 22, 2018

RR: SEC.gov | Statement on Commission Statement and Guidance on Public Company Cybersecurity Disclosures

SEC.gov | Statement on Commission Statement and Guidance on Public Company Cybersecurity Disclosures: The more significant question is whether this rebranded guidance will actually help companies provide investors with comprehensive, particularized, and meaningful disclosure about cybersecurity risks and incidents. I fear it will not.



Per Politico..."Democratic
Commissioner Kara Stein
, though, found fault with the updated guidance. She supported advancing
it, but with reservations. She said the SEC could have done more, like
exploring potential rules that would establish a timeframe for companies to
disclose a breach to investors. "While it may have the potential of providing
both companies and investors with incremental benefit, the guidance does not
sufficiently advance the ball - even in the context of disclosure
guidance," she wrote . "Even more, it may provide investors a false
sense of comfort that we, at the commission, have done something more than we
have."

Many businesses still using outdated security, says Troy Hunt

Many businesses still using outdated security, says Troy Hunt: “There is definitely financial motive,” he said. “We still see a lot of selling of data. Following the LinkedIn breach in 2012, we saw that data extensively sold. And details from the Adobe breach in 2013 are still being sold on the Dream Market on the dark web.”

In Tech, Gender Diversity Boosts Performance | Morgan Stanley

In Tech, Gender Diversity Boosts Performance | Morgan Stanley: The lack of women in technology companies isn't just a question for academic research and industry debate, it should also be of interest to investors, according to recent findings from Morgan Stanley's Sustainability and Global Quantitative Research teams.

RR: Aetna HIV settlement: Customers to get $17 million - CNN

Aetna HIV settlement: Customers to get $17 million - CNN: After thousands of customers' HIV statuses were revealed in mailings last year, a federal class-action lawsuit against health care company Aetna has reached a $17 million settlement.

2018: The Year of the FTC and Informational Injuries? | Eye On Privacy

2018: The Year of the FTC and Informational Injuries? | Eye On Privacy: "panelists attending the workshop argued that potential future harm should be actionable as well. We anticipate hearing more from the FTC as a result of this workshop during 2018."

Cyber Incident & Breach Response | Online Trust Alliance

Cyber Incident & Breach Response | Online Trust Alliance: "2017 Cyber Incident & Breach Readiness Guide(PDF) - For nearly a decade OTA has published a Breach Readiness Guide to help organizations enhance data protection and prepare for a breach incident. Reflecting the evolution of cybercrime beyond the traditional breach, the 2017 Guide has been broadened to include the wider impact of cyber incidents."

Rise in cryptomining malware impacts organizations worldwide - Help Net Security

Rise in cryptomining malware impacts organizations worldwide - Help Net Security:

"Mobile malware reaches enterprise level – In the last year, we have witnessed several attacks directed at enterprises originating from mobile devices. This includes mobile devices acting as a proxy, triggered by the MilkyDoor malware, andused to collect internal data from the enterprise network. Another type is mobile malware, such as the Switcher malware, that attempts to attack network elements (e.g. routers) to redirect network traffic to a malicious server under the attacker’s control."

"Maya Horowitz, Threat Intelligence Group Manager at Check Point commented: “The second half of 2017 has seen crypto-miners take the world by storm to become a favorite monetizing attack vector. While this is not an entirely new malware type, the increasing popularity and value of cryptocurrency has led to a significant increase in the distribution of crypto-mining malware. Also, there has been a continuation of trends, such as ransomware, that date back to 2016, which is still a leading attack vector, used for both global attacks and targeted attacks against specific organizations. 25% of the attacks we saw in this period exploit vulnerabilities discovered over a decade ago, and less than 20% use ones from the last couple of years.”"

Blockchain For Identity Management: It’s Years Away

Blockchain For Identity Management: It’s Years Away:



"Rather than lodging a virtual currency transfer, it's possible to embed identity information in the ledger. The broad vision is a blockchain could be a tamper-proof reference point to verify personal data without having to expose the actual data to a service provider.

Consumers would be in control of their identity information, a concept referred to as self-sovereign identity. That reduces the chance that a data breach would spill their details all over the internet."

"But many analysts contend that it will be years - if not decades - before blockchain-like technologies may be used for identity at scale.

"When I talk to people who really understand what blockchain-based technology is about, they will quite openly say we're talking about 10- to 20-year time frames here," says Martha Bennett, a principal analyst with Forrester who has been studying the area for three years."

Blockchain Could Make You—Not Equifax—the Owner of Your Data | Investopedia

Blockchain Could Make You—Not Equifax—the Owner of Your Data | Investopedia: But the idea behind Datawallet holds a more fundamental appeal, the ability to control what Engel calls a "self-sovereign wallet," which makes the user the sole owner of their data and the only one with the ability to grant access to it. Engel says, "you have the monopoly over that data about you."

NOCTI industry-based credentials and partner industry certifications

NOCTI: NOCTI is the largest provider of industry-based credentials and partner industry certifications for career and technical education (CTE) programs across the nation.

What is TSA? | Technology Student Association

What is TSA? | Technology Student Association: 230,000 middle and high school students nationwide aspire to be future engineers, scientists and technologists through the Technology Student Association.

PCRN: Learning Module - Perkins Accountability Requirements

PCRN: Learning Module - Perkins Accountability Requirements: An overview of Perkins IV accountability requirements, annual reporting cycles and timelines.

Bitcoin Dips Again After Snapping Five-day Winning Streak Yesterday

Bitcoin Dips Again After Snapping Five-day Winning Streak Yesterday

https://finance.yahoo.com/news/bitcoin-dips-again-snapping-five-081200174.html

This Startup’s Test Shows How Harassment Targets Women Online | WIRED

What makes Warren Buffett a ‘prime example’ of the failure of American capitalism? - MarketWatch

Wednesday, February 21, 2018

Home | FUSE

Home | FUSE: "FUSE ignites and nurtures STEAM exploration
through an innovative challenge-based approach and studio environment."



'via Blog this'

Top 6 Data Loss Causes and Top 10 Preventions

Top 6 Data Loss Causes and Top 10 Preventions: Power outages and power surges are bad for your computer and your data.

Tuesday, February 20, 2018

British Airways Shares Flop After Flight Cancellations | Fortune

British Airways Shares Flop After Flight Cancellations | Fortune: Shares in the parent company of British Airways fell on Tuesday after a huge IT failure left 75,000 passengers stranded over a holiday weekend, dealing a major blow to an airline that once marketed itself as “the world’s favorite.”

British Airways Shares Flop After Flight Cancellations | Fortune

British Airways Shares Flop After Flight Cancellations | Fortune: Shares in the parent company of British Airways fell on Tuesday after a huge IT failure left 75,000 passengers stranded over a holiday weekend, dealing a major blow to an airline that once marketed itself as “the world’s favorite.”

Atlanta's Hartsfield-Jackson airport restores power after crippling outage - CNN

Atlanta's Hartsfield-Jackson airport restores power after crippling outage - CNN: Nearly 11 hours after a power outage paralyzed the world's busiest airport, Atlanta's Hartsfield-Jackson International got its electricity back late Sunday night.

Delta: 5-hour computer outage cost us $150 million - Sep. 7, 2016

Delta: 5-hour computer outage cost us $150 million - Sep. 7, 2016: Delta Air Lines says the total bill for its devastating computer outage will come to $150 million.
The problem occurred when the company lost power at its operations center in Atlanta early on the morning of Aug. 8, causing computers needed to book in passengers and fly jets to be down for nearly five hours.

11 data centre disasters | Gallery | Computerworld UK

11 data centre disasters | Gallery | Computerworld UK: Large enterprises should be well equipped to deal with data centre outages, yet many still seem to be affected by them as their systems become more complex and reliant on various infrastructure and outsourced partners.

‘Catastrophic’ Power Outage Nearly Destroyed MSPB’s Electronic Records System - Tech - GovExec.com

‘Catastrophic’ Power Outage Nearly Destroyed MSPB’s Electronic Records System - Tech - GovExec.com: Tweet this on Twitter
Share this on Google Plus
Share this on LinkedIn
Print this article
Email this article
Increase size
A little-reported but “catastrophic” power outage that hit the Merit Systems Protection Board staff on June 30, 2015, has prompted a series of reforms to the federal employee complaint adjudication agency’s in-house electronic records system.

Hurricane Sandy takes data centers offline with flooding, power outages | Ars Technica

Hurricane Sandy takes data centers offline with flooding, power outages | Ars Technica: Flooding and power outages caused by Hurricane Sandy have forced several New York data centers to switch to generator power. But those generators are quickly running out of fuel, so data center companies are telling their customers to shut down their servers and move workloads elsewhere.

Uninterruptible Power Supply: Why is it Beeping and What Does It Do?

Uninterruptible Power Supply: Why is it Beeping and What Does It Do?: If your desktop computer is plugged into an unreasonably heavy box on the floor instead of a surge protector (also known as an uninterruptible power supply or UPS), here’s some good news: when the power goes out in the near future, you’re protected from hours of frustration.

Amazon's Cloud Crash Disaster Permanently Destroyed Many Customers' Data - BI

Amazon's Cloud Crash Disaster Permanently Destroyed Many Customers' Data - BI: Approximately 11 hours of historical data wasn't recoverable and will appear as small gaps in the timeline. Our development team is also hard at work to limit the impact of any future AWS interruptions.

Monday, February 19, 2018

Facts About Electric Power Surges

US Power Outage Statistics

Data: Explore 15 Years Of Power Outages | Inside Energy

Data: Explore 15 Years Of Power Outages | Inside Energy

http://insideenergy.org/2014/08/18/data-explore-15-years-of-power-outages/

EIA data show average frequency and duration of electric power outages - Today in Energy - U.S. Energy Information Administration (EIA)

EIA data show average frequency and duration of electric power outages - Today in Energy - U.S. Energy Information Administration (EIA)

https://www.eia.gov/todayinenergy/detail.php?id=27892

Angus King Condemns Intel Officials’ Unpreparedness For Cyber Attacks Against U.S. - The Daily Caller

Angus King Condemns Intel Officials' Unpreparedness For Cyber Attacks Against U.S. - The Daily Caller

http://dailycaller.com/2018/02/13/angus-king-condemns-intel-officials-unpreparedness-for-cyber-attacks-against-us/

Black Hat USA 2018 | Call for Papers

Black Hat USA 2018 | Call for Papers:

"Call for Papers Opens: February 6, 2018
Call for Papers Closes: April 9, 2018
Notification to Authors: end of May, 2018"



'via Blog this'

Kremlin, angry over alleged hacker's extradition, warns US to stop…

Sunday, February 18, 2018

Target will pay hack victims $10 million - Mar. 19, 2015

Target will pay hack victims $10 million - Mar. 19, 2015: "Target will reimburse victims for "lost time," as it says in court papers. That might include the time victims spent getting cards replaced and calling their bank -- and even then, only when it was documented.

A victim's time is valued at $10 per hour. And at most, they can get reimbursed for two hours for dealing with each instance of "substantiated loss.""



'via Blog this'

Privacilla Sponsors

Privacilla Sponsors: "Privacilla.org has been supported by generous contributions from the following organizations and individuals:"



'via Blog this'

Classic fit button-down non-iron twill lilac shirt | Charles Tyrwhitt

Classic fit button-down non-iron twill lilac shirt | Charles Tyrwhitt: "Ours have a handsome full collar roll that's been specifically developed to look divine with your best silk."



'via Blog this'

How To Calibrate a Mac Laptop's Power System - NewerTech

How To Calibrate a Mac Laptop's Power System - NewerTech: "After the battery is 100% charged, keep the power adapter plugged into the computer for an additional 2+ hours."



'via Blog this'

Six Reasons FCC Rules Are Not Needed to Protect Privacy | Competitive Enterprise Institute

Six Reasons FCC Rules Are Not Needed to Protect Privacy | Competitive Enterprise Institute: "The Competitive Enterprise Institute has been long been skeptical of the Federal Communication Commission’s (FCC) approach to regulating how Internet service providers (ISPs) use subscriber data."

Yes, There Are Other Laws That Protect Privacy, But FCC's Rules Were Still Helpful | Techdirt

Yes, There Are Other Laws That Protect Privacy, But FCC's Rules Were Still Helpful | Techdirt: "As we noted, it's an unfortunate exaggeration (pushed by some well meaning folks) to say that ISPs will now be packaging up and selling individuals' specific browsing history. That's just not true. Some people responded to us by noting that just because that's not how the ad market works today, it doesn't mean that won't change. But... that's probably not the case. Don't get me wrong: getting rid of these privacy rules is still a really bad idea, but let's look a little deeper at what ISPs can't do, before we explain why those privacy rules are still important."

The Privacy Torts: a flawed argument that they work

The Privacy Torts: How U.S. State Law Quietly Leads the Way in Privacy Protection: "The following list of key cases, statutes, and other sources should serve as a starting point for determining the status of the privacy torts in each state’s law. "



'via Blog this'

Friday, February 16, 2018

Six Reasons FCC Rules Are Not Needed to Protect Privacy | Competitive Enterprise Institute

Six Reasons FCC Rules Are Not Needed to Protect Privacy | Competitive Enterprise Institute: In other words, if an ISP intercepts the contents of a subscriber’s Web traffic, or gives such data to an advertiser, that provider had better be sure it has the subscriber’s consent.

Russia Blamed for NotPetya Cyberattack: What You Need to Know | Fortune

Russia Blamed for NotPetya Cyberattack: What You Need to Know | Fortune

http://fortune.com/2018/02/16/russia-notpetya-cyberattack-damage/

King on Russia meddling

Angus King: We can't fight Russian meddling if Trump keeps denying it exists http://thehill.com/homenews/senate/373678-angus-king-we-cant-fight-russian-election-meddling-if-trump-continues-to-deny

The Data-Driven Advantage for the Insurance Industry | V12Data

RR: Equifax breach worsens, additional consumer data exposed

Custom furniture, home decor, and unique jewelry made for you by the most talented makers in the world

Before You Launch a Patreon for Your Writing, Read This

Before You Launch a Patreon for Your Writing, Read This: "The other half of community-building is conversation.

Don’t just use your Patreon for writing; engage with your patrons by asking them questions or inviting them to contribute suggestions for future work.

Post writing selfies, record short videos, do livestream Q&As — anything that starts a conversation with your patrons is a great way to help your community grow."



'via Blog this'

RR: 5 HIPAA Data Breaches Lead to $3.5M OCR Settlement

5 HIPAA Data Breaches Lead to $3.5M OCR Settlement: Fresenius Medical Care North America failed to adhere to HIPAA’s risk analysis and risk management requirements, which resulted in an OCR settlement.

RR: Business Associate Dismissal Denied in HIPAA Data Breach Case

Business Associate Dismissal Denied in HIPAA Data Breach Case: Press America’s motion to dismiss claims in a HIPAA data breach case with CVS Pharmacy was recently denied by a New York District Court.

Thursday, February 15, 2018

InfraGard San Diego's CYBER2028 Futurist Symposium, Tue, Mar 13, 2018 at 8:00 AM | Former Estonian president Ilves to speak

Partnerships that Strengthen State Apprenticeship Expansion Efforts | Maher & Maher

GoPro - Karma

Check for videos...

Hover Camera Passport foldable drone now on sale - RC Drone Arena

News, Jan. 25, 2018: Overhaul at the FCC? | Big Medicine vs. Big Pharma | Antitrust & Tech | Open Markets Institute

RR: PHI Disclosure Leads to $100K OCR HIPAA Settlement

Assessing the trends, scale and nature of economic cybercrimes: overview and Issues | SpringerLink

WhiteFox Defense Technologies, Inc.: Comprehensive Counter-Drone Detection and Mitigation System and Services

Drone security. .is a thing. https://www.whitefoxdefense.com/

Wednesday, February 14, 2018

Monday, February 12, 2018

Magnetic Whiteboard Wall Dry-Erase Wall Paneling - WhiteWalls(R)

Magnetic Whiteboard Wall Dry-Erase Wall Paneling - WhiteWalls®

Pod???

https://www.magnatag.com/whitewall-steel-whiteboard-walls

Pennsylvania's struggling rural broadband is about to lose out on $140 million - Technical.ly Philly

Pennsylvania's struggling rural broadband is about to lose out on $140 million - Technical.ly Philly

https://technical.ly/philly/2017/11/13/pennsylvania-struggling-provide-rural-broadband/

Verizon, AT&T Blocking Rural Broadband Stimulus? - CBS News

Broadband Wars, Verizon NJ Update: Kick the Wireless Cantenna?

Broadband Wars, Verizon NJ Update: Kick the Wireless Cantenna?

https://www.huffingtonpost.com/bruce-kushnick/broadband-wars-verizon-nj_b_1628385.html

Verizon Abandoning 8,500 Rural Customers Is Proof that Wireless Is Not Broadband - Motherboard

Verizon Abandoning 8,500 Rural Customers Is Proof that Wireless Is Not Broadband - Motherboard

https://motherboard.vice.com/en_us/article/8x8gyx/verizon-abandoning-8500-rural-customers-is-proof-that-wireless-is-not-broadband

The High-Intensity Cardio Workout You Can Do In Your Living Room - Health

The High-Intensity Cardio Workout You Can Do In Your Living Room - Health

http://www.health.com/fitness/cardio-workout-anywhere

Hotel Room Workout: 8 Workouts You Can Do In A Small Space Anywhere

Hotel Room Workout: 8 Workouts You Can Do In A Small Space Anywhere

https://www.self.com/story/8-workouts-you-can-do-in-a-hotel-room-in-20-minutes-or-less

7 Intense Workouts You Can Do in Small Spaces

13 Creative Ways to Get a Cardio Workout in Your Bedroom

13 Creative Ways to Get a Cardio Workout in Your Bedroom

http://www.cosmopolitan.com/health-fitness/advice/a34260/bedroom-cardio-workout/

10 Non-Gym Workouts You Can Do in Super Small Spaces

10 Non-Gym Workouts You Can Do in Super Small Spaces | Brit + Co

https://www.brit.co/small-space-exercise/

7 Slimming Workouts For Small Spaces | Prevention

7 Slimming Workouts For Small Spaces | Prevention

https://www.prevention.com/fitness/small-space-workout

SureCloud Launches Ransomware Simulator

The CLOUD Act: A Dangerous Expansion of Police Snooping on Cross-Border Data | Electronic Frontier Foundation

The CLOUD Act: A Dangerous Expansion of Police Snooping on Cross-Border Data | Electronic Frontier Foundation

https://www.eff.org/deeplinks/2018/02/cloud-act-dangerous-expansion-police-snooping-cross-border-data

Sunday, February 11, 2018

Women In Tech: Hot Topics and Top Influencers

Women In Tech: Hot Topics and Top Influencers: "When we say tech, what do you first think of? Young men squirreling away in a dark room surrounded by half eaten pizzas, lit only by flickering lines of code – an army of wannabe Mark Zuckerbergs on a mission to develop the newest product which will make them millions? Or a woman? "



'via Blog this'

Download Exclusive Research: 2016 State of SMB Cybersecurity

Download Exclusive Research: 2016 State of SMB Cybersecurity: We surveyed 1000 IT leaders at small and medium sized businesses across North America and the UK. The results clearly showed that the risk of cyber attack has increased and that attacks are getting more targeted and costly.

Interview With Rich Edson of Fox News

Interview With Rich Edson of Fox News: "QUESTION: In the U.S. we’re already seeing this?

SECRETARY TILLERSON: In the U.S. in 2018."



'via Blog this'

Russians already meddling in US midterms, Tillerson says | Fox News

Russians already meddling in US midterms, Tillerson says | Fox News: “I think it's important we just continue to say to Russia, ‘Look, you think we don't see what you're doing. We do see it and you need to stop. If you don't, you're going to just continue to invite consequences for yourself,’” said Tillerson.

Smart TV Is Vulnerable To Hackers Says Consumer Reports

Trump declines to implement new Russia sanctions | TheHill

Trump declines to implement new Russia sanctions | TheHill

"The Trump administration told Congress on Monday that bipartisan legislation passed last year authorizing new sanctions on Russia is already "serving as a deterrent," and there's no need to actually implement the penalties at this time."

http://thehill.com/homenews/administration/371333-state-dept-tells-congress-no-additional-russia-sanctions-necessary-at

Saturday, February 10, 2018

Suit Alleges That ICE Is Targeting Immigrant-Rights Advocates | New York Law Journal

Suit Alleges That ICE Is Targeting Immigrant-Rights Advocates | New York Law Journal: A prominent New York City immigrant-rights activist recently released from custody by immigration authorities alleges in a lawsuit filed on Thursday that he and other activists are being targeted for deportation because of their political speech.

Friday, February 9, 2018

Tillerson warns US is vulnerable to Russian meddling ahead of midterms - CNNPolitics

Tillerson warns US is vulnerable to Russian meddling ahead of midterms - CNNPolitics: Secretary of State Rex Tillerson warned that any Russian interference in November's midterm elections would "invite consequences," but suggested the United States is still vulnerable to such meddling.

"Well, I don't know that I would say we're better prepared (than in 2016) because the Russians will adapt as well," Tillerson told Fox News in an interview from, Bogota, Colombia Tuesday. "The point is if it's their intention to interfere, they're going to find ways to do that."

Trash land

What Spectre and Meltdown Mean For WebKit | WebKit

Tuesday, February 6, 2018

2017 State of IBM i Security Study - DataBreachToday

2017 State of IBM i Security Study - DataBreachToday: Drawing participants from healthcare, communication, transportation, finance, and many other industries, the 2017 State of IBM i Security Study analyzed 332 servers.

The top five contested issues in the EU’s developing ePrivacy Regulation

The top five contested issues in the EU’s developing ePrivacy Regulation: Many voices and perspectives�— from consumer groups to industry associations to regulators — have weighed in on the terms of the European Union’s proposed ePrivacy Regulation (referenced as ePR here going forward) since it was released by the Commission�Jan. 10, 2017.

Multiple vulnerabilities in the online services of (GPS) location tracking devices

Multiple vulnerabilities in the online services of (GPS) location tracking devices: These vulnerabilities allow an unauthorized third party (among other things) access to the location data of all location tracking devices managed by the vulnerable online services.

Does Meeting Compliance Include File Servers? - Enterprise Network Security Blog from ISDecisions

Does Meeting Compliance Include File Servers? - Enterprise Network Security Blog from ISDecisions: The moment a user saves a PDF report, performs an export of data, or writes correspondence in a Word doc that includes protected information, the server hosting any of these files is now subject to compliance.

Policy Roundtable: What to Make of Trump's National Security Strategy - Texas National Security Review

Policy Roundtable: What to Make of Trump's National Security Strategy - Texas National Security Review: We at TNSR have assembled an all-star cast of experts from a variety of backgrounds to analyze the Trump administration's National Security Strategy.
Facebook ShareLinkedin ShareGoogle Plus ShareTwitter ShareMail Share

Most Read War on the Rocks Articles of 2017 - War on the Rocks

Most Read War on the Rocks Articles of 2017 - War on the Rocks: What does this year’s slate of most popular articles tell us? It would be reckless to read too much into this list.

Flaws of Blockchains and Perspectives on Cryptocurrencies

Flaws of Blockchains and Perspectives on Cryptocurrencies: Many are looking to the blockchain to solve many decentralization and consensus problems. I believe the infrastructure people are seeking is possible to build, but not in the way blockchain and cryptocurrencies have been approaching it so far. There are fundamental flaws to the current popular approach

Malware Posing as Human Rights Organizations (Iran Threats: Documenting Iranian State Sponsored Hacking)

Malware Posing as Human Rights Organizations (Iran Threats: Documenting Iranian State Sponsored Hacking): a series of intrusion attempts conducted in July and August, targeting human rights organizations, bloggers and foreign policy institutions.

Small Business Cyberattack Protection Bill Gets Senate OK | Bloomberg Law

Small Business Cyberattack Protection Bill Gets Senate OK | Bloomberg Law: Small businesses are the backbone of the U.S. economy-- something numerous members of Congress said in a segment on recent episode of HBO Inc.’s ‘Last Week Tonight.’ There are approximately 28.2 million small businesses in the U.S.that employ half of all workers in the country, according to the Small Business Administration.

IEEE-SA - IEEE Anti-Malware Support Service (AMSS)

IEEE-SA - IEEE Anti-Malware Support Service (AMSS): CMX provides real-time access to information related to clean software files, even prior to the publication of the corresponding software. This can help reduce the number of false positives detected by anti-virus software when more aggressively searching for malware.

Sunday, February 4, 2018

Myalgic Encephalomyelitis - NORD (National Organization for Rare Disorders)

https://rarediseases.org/rare-diseases/myalgic-encephalomyelitis/

The symptoms that persist create an overall feeling of "brain fog". Significant changes in personality can be present, and will vary according to the underlying cause, the severity of the inflammation, and delays in treatment. Affected individuals may also have a variety of neurocognitive impairments such as difficulty processing information (e.g. poor concentration, slowed thought), difficulty with planning and making decisions, and substantial memory deficits. For many people, these deficits affect nearly all spheres of their daily activity, severely impacting overall daily functioning levels and posing a significant burden to families and caretakers. A variety of pain symptoms can be associated with ME, including chronic headaches and significant muscle pain (myalgia). Sleep disturbances including abnormal sleep patterns and "unrefreshing" sleep, where a person does not feel refreshed upon waking may also occur. Additional neurological symptoms may include an inability to focus vision, impaired depth perception, loss of proprioception, visual-spatial disorientation, sensitivity to sunlight, muscle weakness, unsteadiness, and poor coordination.

Get the Facts about ME/CFS | Solve ME/CFS Initiative

http://solvecfs.org/what-is-mecfs/

ME/CFS symptoms, which can often be made worse by standing upright, include
  • Extreme exhaustion
  • Non-restorative sleep
  • Brain fog/cognitive impairment
  • Joint pain
  • Inflamed lymph nodes
  • Persistent sore throat
  • Severe headache
  • Neurological abnormalities
  • Complete organ system shutdown
  • Sensitivity to light, sound, odors, chemicals, foods, and medications
  • Irritability, depression, and mood swings

Book of Broken Promises

The IRREGULATORS  want you to get the facts. "The Book of Broken Promises: $400 Billion Broadband Scandal & Free the Net" is the 3rd book in a trilogy that started in 1998, "The Book of Broken Promises" proves that few have a clue about the factual history of broadband, much less fiber optic deployments in America that customers paid for, especially the FCC.

http://irregulators.org/bookofbrokenpromises/

FCC Releases Draft Internet Freedom Order - Advisories & Blogs - Davis Wright Tremaine

Cybertelecom :: Timeline

AT&T Long Lines - Explosion Damage Photos

AT&T Sabotage: etler

American Republican Army...

Nalani Checa (@nalanicheca) | Instagram photos and videos

Saturday, February 3, 2018

How to Apply

Every year hundreds of men, women and children face uncertainty when healthcare providers are unable to discover the cause for their symptoms.

https://undiagnosed.hms.harvard.edu/apply/

UDN | Undiagnosed Diseases Network

Every year hundreds of men, women and children face uncertainty when healthcare providers are unable to discover the cause for their symptoms.
https://undiagnosed.hms.harvard.edu/

Learning About An Undiagnosed Condition in an Adult - National Human Genome Research Institute (NHGRI)

A consultation at a genetics service with a genetics professional can sometimes provide clues about a difficult to diagnose condition. 
https://www.genome.gov/17515946/Learning-About-An-Undiagnosed-Condition-in-an-Adult

RARE Toolkits: BECOMING AN EMPOWERED PATIENT: A TOOLKIT FOR THE UNDIAGNOSED

Tips for the Undiagnosed | Genetic and Rare Diseases Information Center (GARD) – an NCATS Program

But You Dont Look Sick? support for those with invisible illness or chronic illness Lost in the Land of the Undiagnosed

Undiagnosed Medical Problems Support Group & Community - Inspire

Help for People With an Undiagnosed Disease

Friday, February 2, 2018

Eleventh World Conference on Information Security Education

CFP: "IFIP Working Group 11.8 - Information Security Education will hold the Eleventh World Conference on Information Security Education (WISE11) in order to advance the state of computer security and information assurance education throughout the world."



Poznan, Poland, September 18-21, 2018

'via Blog this'

Thursday, February 1, 2018

Cyber security expert claims Matt Hancock app raises privacy concerns

A Poor Mother's Right to Privacy: A Review by Danielle Keats Citron :: SSRN

A Poor Mother's Right to Privacy: A Review by Danielle Keats Citron :: SSRN

https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3100513

Ask Alexa - Things That Are Smart Wiki

Ask Alexa - Things That Are Smart Wiki: "Ask Alexa is an add-in to the SmartThings mobile application that allows you to control a broad array of devices with your Amazon Alexa Enabled Devices. "



'via Blog this'

Blockchain security and the cryptocurrency boom

Blockchain security and the cryptocurrency boom

Gender and the Law Blog

Annual Privacy Notice | Cox Communications

Amo Apartments - Apartments in San Diego, CA

Amo Apartments - Apartments in San Diego, CA

https://www.amolittleitaly.com/