Just a basic blog—snagging random stuff that catches our eye—nothing else, really...
Wednesday, February 28, 2018
Sessions says DOJ will investigate alleged FISA abuses | TheHill
Sessions says DOJ will investigate alleged FISA abuses | TheHill
http://thehill.com/homenews/administration/375863-sessions-says-justice-dept-will-investigate-alleged-fisa-abuses
Check it out.
http://thehill.com/homenews/administration/375863-sessions-says-justice-dept-will-investigate-alleged-fisa-abuses
Tuesday, February 27, 2018
Feds' case against alleged NSA hoarder hits turbulence - POLITICO
Feds' case against alleged NSA hoarder hits turbulence - POLITICO: "Mere unauthorized possession and retention of a document does not give rise to criminal liability," defense attorneys wrote. "What makes the conduct ... criminal is when the person knows the information in the document contains national defense information and, regardless of that knowledge, chooses to retain it at home."
Anatomy of an Attack on the Industrial IoT
Anatomy of an Attack on the Industrial IoT: "During her reconnaissance, she obtained access and visibility to a dozen gas detectors. Due to the Web server interface vulnerability identified in the ICS-CERT advisory, she can bypass the authentication process and make configuration changes to the device, such as altering detection ranges and alarm limits. This access enables her to generate alarms at will."
The Blockchain-GDPR Paradox – wearetheledger – Medium
The Blockchain-GDPR Paradox – wearetheledger – Medium: "some topics on how GDPR relates to blockchain technology. Especially on how GDPR has the opposite effect in some ways, when it comes to making Blockchain Architecture compliant with GDPR."
More Than Just Bitcoin: Blockchain Has Value Across Multiple Industries
More Than Just Bitcoin: Blockchain Has Value Across Multiple Industries: "The tokenized equity brings a dynamism never before seen in the venture capital industry, as the tokens are tradable on the secondary market and investors can sell them and cash in well ahead of an IPO."
And safer food...
And safer food...
Mobile ransomware skyrockets 415% in 2017 on the heel's of WannaCry's success | CIO Dive
Mobile ransomware skyrockets 415% in 2017 on the heel's of WannaCry's success | CIO Dive
https://www.ciodive.com/news/mobile-ransomware-skyrockets-415-in-2017-on-the-heels-of-wannacrys-succe/517960/
https://www.ciodive.com/news/mobile-ransomware-skyrockets-415-in-2017-on-the-heels-of-wannacrys-succe/517960/
What makes Warren Buffett a ‘prime example’ of the failure of American capitalism? - MarketWatch
'Warren Buffett should not be celebrated as an avatar of American capitalism; he should be decried as a prime example of its failure, a false prophet leading the nation toward more monopoly and inequality.'
Monday, February 26, 2018
International Association of Privacy Professionals
International Association of Privacy Professionals: Check out these 101-level resources to gain a high-level awareness of the laws, the job and the IAPP.
Third party risk - CyberGRX
Home - CyberGRX: "Always know which third parties pose the most risk to your enterprise. Spot data risk sooner, respond to threats from third parties faster."
'via Blog this'
'via Blog this'
TruSight third party risk
TruSight: "TruSight’s approach is unique — by working with industry participants and harnessing collective expertise, we raise standards for all and simplify the third-party risk assessment process."
'via Blog this'
'via Blog this'
How Houston's Data Centers Weathered the Storm • Data Center Frontier
How Houston's Data Centers Weathered the Storm • Data Center Frontier
https://datacenterfrontier.com/how-houstons-data-centers-weathered-the-storm/
https://datacenterfrontier.com/how-houstons-data-centers-weathered-the-storm/
Sunday, February 25, 2018
Saturday, February 24, 2018
Friday, February 23, 2018
Race, Class and the Disconnect in Tech Diversity Efforts
Race, Class and the Disconnect in Tech Diversity Efforts: "On Thanksgiving, 70 predominantly Latino food service workers lost their jobs at tech giant Intel’s Santa Clara, CA campus. Last week, the same company welcomed diversity dignitaries from all over the country to talk about increasing the numbers of Black and Latino workers in the tech sector."
'via Blog this'
'via Blog this'
This 'Gray Hat' Hacker Breaks Into Your Car — To Prove A Point : All Tech Considered : NPR
This 'Gray Hat' Hacker Breaks Into Your Car — To Prove A Point : All Tech Considered : NPR
https://www.npr.org/sections/alltechconsidered/2018/02/23/583682220/this-gray-hat-hacker-breaks-into-your-car-to-prove-a-point
https://www.npr.org/sections/alltechconsidered/2018/02/23/583682220/this-gray-hat-hacker-breaks-into-your-car-to-prove-a-point
Thursday, February 22, 2018
RR: SEC.gov | Statement on Commission Statement and Guidance on Public Company Cybersecurity Disclosures
SEC.gov | Statement on Commission Statement and Guidance on Public Company Cybersecurity Disclosures: The more significant question is whether this rebranded guidance will actually help companies provide investors with comprehensive, particularized, and meaningful disclosure about cybersecurity risks and incidents. I fear it will not.
Per Politico..."Democratic
Commissioner Kara Stein, though, found fault with the updated guidance. She supported advancing
it, but with reservations. She said the SEC could have done more, like
exploring potential rules that would establish a timeframe for companies to
disclose a breach to investors. "While it may have the potential of providing
both companies and investors with incremental benefit, the guidance does not
sufficiently advance the ball - even in the context of disclosure
guidance," she wrote . "Even more, it may provide investors a false
sense of comfort that we, at the commission, have done something more than we
have."
Per Politico..."Democratic
Commissioner Kara Stein, though, found fault with the updated guidance. She supported advancing
it, but with reservations. She said the SEC could have done more, like
exploring potential rules that would establish a timeframe for companies to
disclose a breach to investors. "While it may have the potential of providing
both companies and investors with incremental benefit, the guidance does not
sufficiently advance the ball - even in the context of disclosure
guidance," she wrote . "Even more, it may provide investors a false
sense of comfort that we, at the commission, have done something more than we
have."
Many businesses still using outdated security, says Troy Hunt
Many businesses still using outdated security, says Troy Hunt: “There is definitely financial motive,” he said. “We still see a lot of selling of data. Following the LinkedIn breach in 2012, we saw that data extensively sold. And details from the Adobe breach in 2013 are still being sold on the Dream Market on the dark web.”
In Tech, Gender Diversity Boosts Performance | Morgan Stanley
In Tech, Gender Diversity Boosts Performance | Morgan Stanley: The lack of women in technology companies isn't just a question for academic research and industry debate, it should also be of interest to investors, according to recent findings from Morgan Stanley's Sustainability and Global Quantitative Research teams.
RR: Aetna HIV settlement: Customers to get $17 million - CNN
Aetna HIV settlement: Customers to get $17 million - CNN: After thousands of customers' HIV statuses were revealed in mailings last year, a federal class-action lawsuit against health care company Aetna has reached a $17 million settlement.
2018: The Year of the FTC and Informational Injuries? | Eye On Privacy
2018: The Year of the FTC and Informational Injuries? | Eye On Privacy: "panelists attending the workshop argued that potential future harm should be actionable as well. We anticipate hearing more from the FTC as a result of this workshop during 2018."
Cyber Incident & Breach Response | Online Trust Alliance
Cyber Incident & Breach Response | Online Trust Alliance: "2017 Cyber Incident & Breach Readiness Guide(PDF) - For nearly a decade OTA has published a Breach Readiness Guide to help organizations enhance data protection and prepare for a breach incident. Reflecting the evolution of cybercrime beyond the traditional breach, the 2017 Guide has been broadened to include the wider impact of cyber incidents."
Rise in cryptomining malware impacts organizations worldwide - Help Net Security
Rise in cryptomining malware impacts organizations worldwide - Help Net Security:
"Mobile malware reaches enterprise level – In the last year, we have witnessed several attacks directed at enterprises originating from mobile devices. This includes mobile devices acting as a proxy, triggered by the MilkyDoor malware, andused to collect internal data from the enterprise network. Another type is mobile malware, such as the Switcher malware, that attempts to attack network elements (e.g. routers) to redirect network traffic to a malicious server under the attacker’s control."
"Maya Horowitz, Threat Intelligence Group Manager at Check Point commented: “The second half of 2017 has seen crypto-miners take the world by storm to become a favorite monetizing attack vector. While this is not an entirely new malware type, the increasing popularity and value of cryptocurrency has led to a significant increase in the distribution of crypto-mining malware. Also, there has been a continuation of trends, such as ransomware, that date back to 2016, which is still a leading attack vector, used for both global attacks and targeted attacks against specific organizations. 25% of the attacks we saw in this period exploit vulnerabilities discovered over a decade ago, and less than 20% use ones from the last couple of years.”"
"Mobile malware reaches enterprise level – In the last year, we have witnessed several attacks directed at enterprises originating from mobile devices. This includes mobile devices acting as a proxy, triggered by the MilkyDoor malware, andused to collect internal data from the enterprise network. Another type is mobile malware, such as the Switcher malware, that attempts to attack network elements (e.g. routers) to redirect network traffic to a malicious server under the attacker’s control."
"Maya Horowitz, Threat Intelligence Group Manager at Check Point commented: “The second half of 2017 has seen crypto-miners take the world by storm to become a favorite monetizing attack vector. While this is not an entirely new malware type, the increasing popularity and value of cryptocurrency has led to a significant increase in the distribution of crypto-mining malware. Also, there has been a continuation of trends, such as ransomware, that date back to 2016, which is still a leading attack vector, used for both global attacks and targeted attacks against specific organizations. 25% of the attacks we saw in this period exploit vulnerabilities discovered over a decade ago, and less than 20% use ones from the last couple of years.”"
Blockchain For Identity Management: It’s Years Away
Blockchain For Identity Management: It’s Years Away:
"Rather than lodging a virtual currency transfer, it's possible to embed identity information in the ledger. The broad vision is a blockchain could be a tamper-proof reference point to verify personal data without having to expose the actual data to a service provider.
Consumers would be in control of their identity information, a concept referred to as self-sovereign identity. That reduces the chance that a data breach would spill their details all over the internet."
"But many analysts contend that it will be years - if not decades - before blockchain-like technologies may be used for identity at scale.
"When I talk to people who really understand what blockchain-based technology is about, they will quite openly say we're talking about 10- to 20-year time frames here," says Martha Bennett, a principal analyst with Forrester who has been studying the area for three years."
"Rather than lodging a virtual currency transfer, it's possible to embed identity information in the ledger. The broad vision is a blockchain could be a tamper-proof reference point to verify personal data without having to expose the actual data to a service provider.
Consumers would be in control of their identity information, a concept referred to as self-sovereign identity. That reduces the chance that a data breach would spill their details all over the internet."
"But many analysts contend that it will be years - if not decades - before blockchain-like technologies may be used for identity at scale.
"When I talk to people who really understand what blockchain-based technology is about, they will quite openly say we're talking about 10- to 20-year time frames here," says Martha Bennett, a principal analyst with Forrester who has been studying the area for three years."
Blockchain Could Make You—Not Equifax—the Owner of Your Data | Investopedia
Blockchain Could Make You—Not Equifax—the Owner of Your Data | Investopedia: But the idea behind Datawallet holds a more fundamental appeal, the ability to control what Engel calls a "self-sovereign wallet," which makes the user the sole owner of their data and the only one with the ability to grant access to it. Engel says, "you have the monopoly over that data about you."
NOCTI industry-based credentials and partner industry certifications
NOCTI: NOCTI is the largest provider of industry-based credentials and partner industry certifications for career and technical education (CTE) programs across the nation.
What is TSA? | Technology Student Association
What is TSA? | Technology Student Association: 230,000 middle and high school students nationwide aspire to be future engineers, scientists and technologists through the Technology Student Association.
PCRN: Learning Module - Perkins Accountability Requirements
PCRN: Learning Module - Perkins Accountability Requirements: An overview of Perkins IV accountability requirements, annual reporting cycles and timelines.
Bitcoin Dips Again After Snapping Five-day Winning Streak Yesterday
Bitcoin Dips Again After Snapping Five-day Winning Streak Yesterday
https://finance.yahoo.com/news/bitcoin-dips-again-snapping-five-081200174.html
https://finance.yahoo.com/news/bitcoin-dips-again-snapping-five-081200174.html
Wednesday, February 21, 2018
Home | FUSE
Home | FUSE: "FUSE ignites and nurtures STEAM exploration
through an innovative challenge-based approach and studio environment."
'via Blog this'
through an innovative challenge-based approach and studio environment."
'via Blog this'
Top 6 Data Loss Causes and Top 10 Preventions
Top 6 Data Loss Causes and Top 10 Preventions: Power outages and power surges are bad for your computer and your data.
Tuesday, February 20, 2018
British Airways Shares Flop After Flight Cancellations | Fortune
British Airways Shares Flop After Flight Cancellations | Fortune: Shares in the parent company of British Airways fell on Tuesday after a huge IT failure left 75,000 passengers stranded over a holiday weekend, dealing a major blow to an airline that once marketed itself as “the world’s favorite.”
British Airways Shares Flop After Flight Cancellations | Fortune
British Airways Shares Flop After Flight Cancellations | Fortune: Shares in the parent company of British Airways fell on Tuesday after a huge IT failure left 75,000 passengers stranded over a holiday weekend, dealing a major blow to an airline that once marketed itself as “the world’s favorite.”
Atlanta's Hartsfield-Jackson airport restores power after crippling outage - CNN
Atlanta's Hartsfield-Jackson airport restores power after crippling outage - CNN: Nearly 11 hours after a power outage paralyzed the world's busiest airport, Atlanta's Hartsfield-Jackson International got its electricity back late Sunday night.
Delta: 5-hour computer outage cost us $150 million - Sep. 7, 2016
Delta: 5-hour computer outage cost us $150 million - Sep. 7, 2016: Delta Air Lines says the total bill for its devastating computer outage will come to $150 million.
The problem occurred when the company lost power at its operations center in Atlanta early on the morning of Aug. 8, causing computers needed to book in passengers and fly jets to be down for nearly five hours.
The problem occurred when the company lost power at its operations center in Atlanta early on the morning of Aug. 8, causing computers needed to book in passengers and fly jets to be down for nearly five hours.
11 data centre disasters | Gallery | Computerworld UK
11 data centre disasters | Gallery | Computerworld UK: Large enterprises should be well equipped to deal with data centre outages, yet many still seem to be affected by them as their systems become more complex and reliant on various infrastructure and outsourced partners.
‘Catastrophic’ Power Outage Nearly Destroyed MSPB’s Electronic Records System - Tech - GovExec.com
‘Catastrophic’ Power Outage Nearly Destroyed MSPB’s Electronic Records System - Tech - GovExec.com: Tweet this on Twitter
Share this on Google Plus
Share this on LinkedIn
Print this article
Email this article
Increase size
A little-reported but “catastrophic” power outage that hit the Merit Systems Protection Board staff on June 30, 2015, has prompted a series of reforms to the federal employee complaint adjudication agency’s in-house electronic records system.
Share this on Google Plus
Share this on LinkedIn
Print this article
Email this article
Increase size
A little-reported but “catastrophic” power outage that hit the Merit Systems Protection Board staff on June 30, 2015, has prompted a series of reforms to the federal employee complaint adjudication agency’s in-house electronic records system.
Hurricane Sandy takes data centers offline with flooding, power outages | Ars Technica
Hurricane Sandy takes data centers offline with flooding, power outages | Ars Technica: Flooding and power outages caused by Hurricane Sandy have forced several New York data centers to switch to generator power. But those generators are quickly running out of fuel, so data center companies are telling their customers to shut down their servers and move workloads elsewhere.
Uninterruptible Power Supply: Why is it Beeping and What Does It Do?
Uninterruptible Power Supply: Why is it Beeping and What Does It Do?: If your desktop computer is plugged into an unreasonably heavy box on the floor instead of a surge protector (also known as an uninterruptible power supply or UPS), here’s some good news: when the power goes out in the near future, you’re protected from hours of frustration.
Amazon's Cloud Crash Disaster Permanently Destroyed Many Customers' Data - BI
Amazon's Cloud Crash Disaster Permanently Destroyed Many Customers' Data - BI: Approximately 11 hours of historical data wasn't recoverable and will appear as small gaps in the timeline. Our development team is also hard at work to limit the impact of any future AWS interruptions.
Monday, February 19, 2018
Data: Explore 15 Years Of Power Outages | Inside Energy
Data: Explore 15 Years Of Power Outages | Inside Energy
http://insideenergy.org/2014/08/18/data-explore-15-years-of-power-outages/
http://insideenergy.org/2014/08/18/data-explore-15-years-of-power-outages/
EIA data show average frequency and duration of electric power outages - Today in Energy - U.S. Energy Information Administration (EIA)
EIA data show average frequency and duration of electric power outages - Today in Energy - U.S. Energy Information Administration (EIA)
https://www.eia.gov/todayinenergy/detail.php?id=27892
https://www.eia.gov/todayinenergy/detail.php?id=27892
Angus King Condemns Intel Officials’ Unpreparedness For Cyber Attacks Against U.S. - The Daily Caller
Angus King Condemns Intel Officials' Unpreparedness For Cyber Attacks Against U.S. - The Daily Caller
http://dailycaller.com/2018/02/13/angus-king-condemns-intel-officials-unpreparedness-for-cyber-attacks-against-us/
http://dailycaller.com/2018/02/13/angus-king-condemns-intel-officials-unpreparedness-for-cyber-attacks-against-us/
Black Hat USA 2018 | Call for Papers
Black Hat USA 2018 | Call for Papers:
"Call for Papers Opens: February 6, 2018
Call for Papers Closes: April 9, 2018
Notification to Authors: end of May, 2018"
'via Blog this'
"Call for Papers Opens: February 6, 2018
Call for Papers Closes: April 9, 2018
Notification to Authors: end of May, 2018"
'via Blog this'
Kremlin, angry over alleged hacker's extradition, warns US to stop…
Kremlin, angry over alleged hacker's extradition, warns US to stop…
https://www.usatoday.com/story/news/world/2018/02/08/russia-angry-over-alleged-hackers-extradition-alleged-hacker-warns-u-s-stop-hunting-down-our-citizen/318770002/
https://www.usatoday.com/story/news/world/2018/02/08/russia-angry-over-alleged-hackers-extradition-alleged-hacker-warns-u-s-stop-hunting-down-our-citizen/318770002/
Sunday, February 18, 2018
Target will pay hack victims $10 million - Mar. 19, 2015
Target will pay hack victims $10 million - Mar. 19, 2015: "Target will reimburse victims for "lost time," as it says in court papers. That might include the time victims spent getting cards replaced and calling their bank -- and even then, only when it was documented.
A victim's time is valued at $10 per hour. And at most, they can get reimbursed for two hours for dealing with each instance of "substantiated loss.""
'via Blog this'
A victim's time is valued at $10 per hour. And at most, they can get reimbursed for two hours for dealing with each instance of "substantiated loss.""
'via Blog this'
Privacilla Sponsors
Privacilla Sponsors: "Privacilla.org has been supported by generous contributions from the following organizations and individuals:"
'via Blog this'
'via Blog this'
Classic fit button-down non-iron twill lilac shirt | Charles Tyrwhitt
Classic fit button-down non-iron twill lilac shirt | Charles Tyrwhitt: "Ours have a handsome full collar roll that's been specifically developed to look divine with your best silk."
'via Blog this'
'via Blog this'
How To Calibrate a Mac Laptop's Power System - NewerTech
How To Calibrate a Mac Laptop's Power System - NewerTech: "After the battery is 100% charged, keep the power adapter plugged into the computer for an additional 2+ hours."
'via Blog this'
'via Blog this'
Six Reasons FCC Rules Are Not Needed to Protect Privacy | Competitive Enterprise Institute
Six Reasons FCC Rules Are Not Needed to Protect Privacy | Competitive Enterprise Institute: "The Competitive Enterprise Institute has been long been skeptical of the Federal Communication Commission’s (FCC) approach to regulating how Internet service providers (ISPs) use subscriber data."
Yes, There Are Other Laws That Protect Privacy, But FCC's Rules Were Still Helpful | Techdirt
Yes, There Are Other Laws That Protect Privacy, But FCC's Rules Were Still Helpful | Techdirt: "As we noted, it's an unfortunate exaggeration (pushed by some well meaning folks) to say that ISPs will now be packaging up and selling individuals' specific browsing history. That's just not true. Some people responded to us by noting that just because that's not how the ad market works today, it doesn't mean that won't change. But... that's probably not the case. Don't get me wrong: getting rid of these privacy rules is still a really bad idea, but let's look a little deeper at what ISPs can't do, before we explain why those privacy rules are still important."
The Privacy Torts: a flawed argument that they work
The Privacy Torts: How U.S. State Law Quietly Leads the Way in Privacy Protection: "The following list of key cases, statutes, and other sources should serve as a starting point for determining the status of the privacy torts in each state’s law. "
'via Blog this'
'via Blog this'
Friday, February 16, 2018
Six Reasons FCC Rules Are Not Needed to Protect Privacy | Competitive Enterprise Institute
Six Reasons FCC Rules Are Not Needed to Protect Privacy | Competitive Enterprise Institute: In other words, if an ISP intercepts the contents of a subscriber’s Web traffic, or gives such data to an advertiser, that provider had better be sure it has the subscriber’s consent.
Russia Blamed for NotPetya Cyberattack: What You Need to Know | Fortune
Russia Blamed for NotPetya Cyberattack: What You Need to Know | Fortune
http://fortune.com/2018/02/16/russia-notpetya-cyberattack-damage/
http://fortune.com/2018/02/16/russia-notpetya-cyberattack-damage/
King on Russia meddling
Angus King: We can't fight Russian meddling if Trump keeps denying it exists http://thehill.com/homenews/senate/373678-angus-king-we-cant-fight-russian-election-meddling-if-trump-continues-to-deny
Before You Launch a Patreon for Your Writing, Read This
Before You Launch a Patreon for Your Writing, Read This: "The other half of community-building is conversation.
Don’t just use your Patreon for writing; engage with your patrons by asking them questions or inviting them to contribute suggestions for future work.
Post writing selfies, record short videos, do livestream Q&As — anything that starts a conversation with your patrons is a great way to help your community grow."
'via Blog this'
Don’t just use your Patreon for writing; engage with your patrons by asking them questions or inviting them to contribute suggestions for future work.
Post writing selfies, record short videos, do livestream Q&As — anything that starts a conversation with your patrons is a great way to help your community grow."
'via Blog this'
RR: 5 HIPAA Data Breaches Lead to $3.5M OCR Settlement
5 HIPAA Data Breaches Lead to $3.5M OCR Settlement: Fresenius Medical Care North America failed to adhere to HIPAA’s risk analysis and risk management requirements, which resulted in an OCR settlement.
RR: Business Associate Dismissal Denied in HIPAA Data Breach Case
Business Associate Dismissal Denied in HIPAA Data Breach Case: Press America’s motion to dismiss claims in a HIPAA data breach case with CVS Pharmacy was recently denied by a New York District Court.
Thursday, February 15, 2018
Wednesday, February 14, 2018
Hackers From Florida, Canada Behind 2016 Uber Breach | SecurityWeek.Com
Hackers From Florida, Canada Behind 2016 Uber Breach | SecurityWeek.Com: Two individuals living in Canada and Florida were responsible for the massive data breach suffered by Uber in 2016, the ride-sharing company’s chief information security officer said on Tuesday.
Angus King: We can't fight Russian meddling if Trump keeps denying it exists | TheHill
Angus King: We can't fight Russian meddling if Trump keeps denying it exists | TheHill
http://thehill.com/homenews/senate/373678-angus-king-we-cant-fight-russian-election-meddling-if-trump-continues-to-deny
http://thehill.com/homenews/senate/373678-angus-king-we-cant-fight-russian-election-meddling-if-trump-continues-to-deny
Monday, February 12, 2018
Magnetic Whiteboard Wall Dry-Erase Wall Paneling - WhiteWalls(R)
Magnetic Whiteboard Wall Dry-Erase Wall Paneling - WhiteWalls®
https://www.magnatag.com/whitewall-steel-whiteboard-walls
Pod???
https://www.magnatag.com/whitewall-steel-whiteboard-walls
Pennsylvania's struggling rural broadband is about to lose out on $140 million - Technical.ly Philly
Pennsylvania's struggling rural broadband is about to lose out on $140 million - Technical.ly Philly
https://technical.ly/philly/2017/11/13/pennsylvania-struggling-provide-rural-broadband/
https://technical.ly/philly/2017/11/13/pennsylvania-struggling-provide-rural-broadband/
Verizon, AT&T Blocking Rural Broadband Stimulus? - CBS News
Verizon, AT&T Blocking Rural Broadband Stimulus? - CBS News
http://www.cbsnews.com/8301-505124_162-33441246/verizon-att-blocking-rural-broadband-stimulus/
http://www.cbsnews.com/8301-505124_162-33441246/verizon-att-blocking-rural-broadband-stimulus/
Broadband Wars, Verizon NJ Update: Kick the Wireless Cantenna?
Broadband Wars, Verizon NJ Update: Kick the Wireless Cantenna?
https://www.huffingtonpost.com/bruce-kushnick/broadband-wars-verizon-nj_b_1628385.html
https://www.huffingtonpost.com/bruce-kushnick/broadband-wars-verizon-nj_b_1628385.html
Verizon Abandoning 8,500 Rural Customers Is Proof that Wireless Is Not Broadband - Motherboard
Verizon Abandoning 8,500 Rural Customers Is Proof that Wireless Is Not Broadband - Motherboard
https://motherboard.vice.com/en_us/article/8x8gyx/verizon-abandoning-8500-rural-customers-is-proof-that-wireless-is-not-broadband
https://motherboard.vice.com/en_us/article/8x8gyx/verizon-abandoning-8500-rural-customers-is-proof-that-wireless-is-not-broadband
The High-Intensity Cardio Workout You Can Do In Your Living Room - Health
The High-Intensity Cardio Workout You Can Do In Your Living Room - Health
http://www.health.com/fitness/cardio-workout-anywhere
http://www.health.com/fitness/cardio-workout-anywhere
Hotel Room Workout: 8 Workouts You Can Do In A Small Space Anywhere
Hotel Room Workout: 8 Workouts You Can Do In A Small Space Anywhere
https://www.self.com/story/8-workouts-you-can-do-in-a-hotel-room-in-20-minutes-or-less
https://www.self.com/story/8-workouts-you-can-do-in-a-hotel-room-in-20-minutes-or-less
13 Creative Ways to Get a Cardio Workout in Your Bedroom
13 Creative Ways to Get a Cardio Workout in Your Bedroom
http://www.cosmopolitan.com/health-fitness/advice/a34260/bedroom-cardio-workout/
http://www.cosmopolitan.com/health-fitness/advice/a34260/bedroom-cardio-workout/
10 Non-Gym Workouts You Can Do in Super Small Spaces
10 Non-Gym Workouts You Can Do in Super Small Spaces | Brit + Co
https://www.brit.co/small-space-exercise/
https://www.brit.co/small-space-exercise/
7 Slimming Workouts For Small Spaces | Prevention
7 Slimming Workouts For Small Spaces | Prevention
https://www.prevention.com/fitness/small-space-workout
https://www.prevention.com/fitness/small-space-workout
The CLOUD Act: A Dangerous Expansion of Police Snooping on Cross-Border Data | Electronic Frontier Foundation
The CLOUD Act: A Dangerous Expansion of Police Snooping on Cross-Border Data | Electronic Frontier Foundation
https://www.eff.org/deeplinks/2018/02/cloud-act-dangerous-expansion-police-snooping-cross-border-data
https://www.eff.org/deeplinks/2018/02/cloud-act-dangerous-expansion-police-snooping-cross-border-data
Sunday, February 11, 2018
Women In Tech: Hot Topics and Top Influencers
Women In Tech: Hot Topics and Top Influencers: "When we say tech, what do you first think of? Young men squirreling away in a dark room surrounded by half eaten pizzas, lit only by flickering lines of code – an army of wannabe Mark Zuckerbergs on a mission to develop the newest product which will make them millions? Or a woman? "
'via Blog this'
'via Blog this'
Download Exclusive Research: 2016 State of SMB Cybersecurity
Download Exclusive Research: 2016 State of SMB Cybersecurity: We surveyed 1000 IT leaders at small and medium sized businesses across North America and the UK. The results clearly showed that the risk of cyber attack has increased and that attacks are getting more targeted and costly.
Interview With Rich Edson of Fox News
Interview With Rich Edson of Fox News: "QUESTION: In the U.S. we’re already seeing this?
SECRETARY TILLERSON: In the U.S. in 2018."
'via Blog this'
SECRETARY TILLERSON: In the U.S. in 2018."
'via Blog this'
Russians already meddling in US midterms, Tillerson says | Fox News
Russians already meddling in US midterms, Tillerson says | Fox News: “I think it's important we just continue to say to Russia, ‘Look, you think we don't see what you're doing. We do see it and you need to stop. If you don't, you're going to just continue to invite consequences for yourself,’” said Tillerson.
Smart TV Is Vulnerable To Hackers Says Consumer Reports
Smart TV Is Vulnerable To Hackers Says Consumer Reports
http://socialbarrel.com/smart-tv-is-vulnerable-to-hackers-says-consumer-reports/114774/
http://socialbarrel.com/smart-tv-is-vulnerable-to-hackers-says-consumer-reports/114774/
Trump declines to implement new Russia sanctions | TheHill
Trump declines to implement new Russia sanctions | TheHill
http://thehill.com/homenews/administration/371333-state-dept-tells-congress-no-additional-russia-sanctions-necessary-at
"The Trump administration told Congress on Monday that bipartisan legislation passed last year authorizing new sanctions on Russia is already "serving as a deterrent," and there's no need to actually implement the penalties at this time."
http://thehill.com/homenews/administration/371333-state-dept-tells-congress-no-additional-russia-sanctions-necessary-at
Saturday, February 10, 2018
Suit Alleges That ICE Is Targeting Immigrant-Rights Advocates | New York Law Journal
Suit Alleges That ICE Is Targeting Immigrant-Rights Advocates | New York Law Journal: A prominent New York City immigrant-rights activist recently released from custody by immigration authorities alleges in a lawsuit filed on Thursday that he and other activists are being targeted for deportation because of their political speech.
Friday, February 9, 2018
Tillerson warns US is vulnerable to Russian meddling ahead of midterms - CNNPolitics
Tillerson warns US is vulnerable to Russian meddling ahead of midterms - CNNPolitics: Secretary of State Rex Tillerson warned that any Russian interference in November's midterm elections would "invite consequences," but suggested the United States is still vulnerable to such meddling.
"Well, I don't know that I would say we're better prepared (than in 2016) because the Russians will adapt as well," Tillerson told Fox News in an interview from, Bogota, Colombia Tuesday. "The point is if it's their intention to interfere, they're going to find ways to do that."
"Well, I don't know that I would say we're better prepared (than in 2016) because the Russians will adapt as well," Tillerson told Fox News in an interview from, Bogota, Colombia Tuesday. "The point is if it's their intention to interfere, they're going to find ways to do that."
Thursday, February 8, 2018
Key iPhone Source Code Gets Posted Online in 'Biggest Leak in History' - Motherboard
Key iPhone Source Code Gets Posted Online in 'Biggest Leak in History' - Motherboard
https://motherboard.vice.com/en_us/article/a34g9j/iphone-source-code-iboot-ios-leak
https://motherboard.vice.com/en_us/article/a34g9j/iphone-source-code-iboot-ios-leak
Wednesday, February 7, 2018
12 Industrial Cyber Security Events You Shouldn't Miss in 2018
12 Industrial Cyber Security Events You Shouldn't Miss in 2018: "events will focus on a number of topics, including emerging industrial control system threat vectors, the need for collaborative IT-OT cybersecurity strategies, and the newest and most advanced methods for detecting industrial cyber attacks."
'via Blog this'
'via Blog this'
The Washington Post: The Trump administration gets the history of Internet regulations all wrong
The Trump administration gets the history of Internet regulations all wrong
http://wapo.st/2qdkg3U
http://wapo.st/2qdkg3U
Tuesday, February 6, 2018
2017 State of IBM i Security Study - DataBreachToday
2017 State of IBM i Security Study - DataBreachToday: Drawing participants from healthcare, communication, transportation, finance, and many other industries, the 2017 State of IBM i Security Study analyzed 332 servers.
The top five contested issues in the EU’s developing ePrivacy Regulation
The top five contested issues in the EU’s developing ePrivacy Regulation: Many voices and perspectives�— from consumer groups to industry associations to regulators — have weighed in on the terms of the European Union’s proposed ePrivacy Regulation (referenced as ePR here going forward) since it was released by the Commission�Jan. 10, 2017.
Multiple vulnerabilities in the online services of (GPS) location tracking devices
Multiple vulnerabilities in the online services of (GPS) location tracking devices: These vulnerabilities allow an unauthorized third party (among other things) access to the location data of all location tracking devices managed by the vulnerable online services.
Does Meeting Compliance Include File Servers? - Enterprise Network Security Blog from ISDecisions
Does Meeting Compliance Include File Servers? - Enterprise Network Security Blog from ISDecisions: The moment a user saves a PDF report, performs an export of data, or writes correspondence in a Word doc that includes protected information, the server hosting any of these files is now subject to compliance.
Policy Roundtable: What to Make of Trump's National Security Strategy - Texas National Security Review
Policy Roundtable: What to Make of Trump's National Security Strategy - Texas National Security Review: We at TNSR have assembled an all-star cast of experts from a variety of backgrounds to analyze the Trump administration's National Security Strategy.
Facebook ShareLinkedin ShareGoogle Plus ShareTwitter ShareMail Share
Facebook ShareLinkedin ShareGoogle Plus ShareTwitter ShareMail Share
Most Read War on the Rocks Articles of 2017 - War on the Rocks
Most Read War on the Rocks Articles of 2017 - War on the Rocks: What does this year’s slate of most popular articles tell us? It would be reckless to read too much into this list.
Flaws of Blockchains and Perspectives on Cryptocurrencies
Flaws of Blockchains and Perspectives on Cryptocurrencies: Many are looking to the blockchain to solve many decentralization and consensus problems. I believe the infrastructure people are seeking is possible to build, but not in the way blockchain and cryptocurrencies have been approaching it so far. There are fundamental flaws to the current popular approach
Malware Posing as Human Rights Organizations (Iran Threats: Documenting Iranian State Sponsored Hacking)
Malware Posing as Human Rights Organizations (Iran Threats: Documenting Iranian State Sponsored Hacking): a series of intrusion attempts conducted in July and August, targeting human rights organizations, bloggers and foreign policy institutions.
Small Business Cyberattack Protection Bill Gets Senate OK | Bloomberg Law
Small Business Cyberattack Protection Bill Gets Senate OK | Bloomberg Law: Small businesses are the backbone of the U.S. economy-- something numerous members of Congress said in a segment on recent episode of HBO Inc.’s ‘Last Week Tonight.’ There are approximately 28.2 million small businesses in the U.S.that employ half of all workers in the country, according to the Small Business Administration.
IEEE-SA - IEEE Anti-Malware Support Service (AMSS)
IEEE-SA - IEEE Anti-Malware Support Service (AMSS): CMX provides real-time access to information related to clean software files, even prior to the publication of the corresponding software. This can help reduce the number of false positives detected by anti-virus software when more aggressively searching for malware.
Monday, February 5, 2018
Sunday, February 4, 2018
Myalgic Encephalomyelitis - NORD (National Organization for Rare Disorders)
https://rarediseases.org/rare-diseases/myalgic-encephalomyelitis/
The symptoms that persist create an overall feeling of "brain fog". Significant changes in personality can be present, and will vary according to the underlying cause, the severity of the inflammation, and delays in treatment. Affected individuals may also have a variety of neurocognitive impairments such as difficulty processing information (e.g. poor concentration, slowed thought), difficulty with planning and making decisions, and substantial memory deficits. For many people, these deficits affect nearly all spheres of their daily activity, severely impacting overall daily functioning levels and posing a significant burden to families and caretakers. A variety of pain symptoms can be associated with ME, including chronic headaches and significant muscle pain (myalgia). Sleep disturbances including abnormal sleep patterns and "unrefreshing" sleep, where a person does not feel refreshed upon waking may also occur. Additional neurological symptoms may include an inability to focus vision, impaired depth perception, loss of proprioception, visual-spatial disorientation, sensitivity to sunlight, muscle weakness, unsteadiness, and poor coordination.
Get the Facts about ME/CFS | Solve ME/CFS Initiative
http://solvecfs.org/what-is-mecfs/
ME/CFS symptoms, which can often be made worse by standing upright, include
- Extreme exhaustion
- Non-restorative sleep
- Brain fog/cognitive impairment
- Joint pain
- Inflamed lymph nodes
- Persistent sore throat
- Severe headache
- Neurological abnormalities
- Complete organ system shutdown
- Sensitivity to light, sound, odors, chemicals, foods, and medications
- Irritability, depression, and mood swings
Book of Broken Promises
The IRREGULATORS want you to get the facts. "The Book of Broken Promises: $400 Billion Broadband Scandal & Free the Net" is the 3rd book in a trilogy that started in 1998, "The Book of Broken Promises" proves that few have a clue about the factual history of broadband, much less fiber optic deployments in America that customers paid for, especially the FCC.
Saturday, February 3, 2018
How to Apply
Every year hundreds of men, women and children face uncertainty when healthcare providers are unable to discover the cause for their symptoms.
UDN | Undiagnosed Diseases Network
Every year hundreds of men, women and children face uncertainty when healthcare providers are unable to discover the cause for their symptoms.
https://undiagnosed.hms.harvard.edu/Learning About An Undiagnosed Condition in an Adult - National Human Genome Research Institute (NHGRI)
A consultation at a genetics service with a genetics professional can sometimes provide clues about a difficult to diagnose condition.
https://www.genome.gov/17515946/Learning-About-An-Undiagnosed-Condition-in-an-AdultFriday, February 2, 2018
Eleventh World Conference on Information Security Education
CFP: "IFIP Working Group 11.8 - Information Security Education will hold the Eleventh World Conference on Information Security Education (WISE11) in order to advance the state of computer security and information assurance education throughout the world."
Poznan, Poland, September 18-21, 2018
'via Blog this'
Poznan, Poland, September 18-21, 2018
'via Blog this'
Thursday, February 1, 2018
Cyber security expert claims Matt Hancock app raises privacy concerns
Cyber security expert claims Matt Hancock app raises privacy concerns
https://www.belfasttelegraph.co.uk/news/uk/cyber-security-expert-claims-matt-hancock-app-raises-privacy-concerns-36557801.html
https://www.belfasttelegraph.co.uk/news/uk/cyber-security-expert-claims-matt-hancock-app-raises-privacy-concerns-36557801.html
A Poor Mother's Right to Privacy: A Review by Danielle Keats Citron :: SSRN
A Poor Mother's Right to Privacy: A Review by Danielle Keats Citron :: SSRN
https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3100513
https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3100513
Ask Alexa - Things That Are Smart Wiki
Ask Alexa - Things That Are Smart Wiki: "Ask Alexa is an add-in to the SmartThings mobile application that allows you to control a broad array of devices with your Amazon Alexa Enabled Devices. "
'via Blog this'
'via Blog this'
Blockchain security and the cryptocurrency boom
Blockchain security and the cryptocurrency boom
http://www.ibtimes.co.uk/blockchain-security-cryptocurrency-boom-1658062
http://www.ibtimes.co.uk/blockchain-security-cryptocurrency-boom-1658062
Blockchain security and the cryptocurrency boom
Blockchain security and the cryptocurrency boom
http://www.ibtimes.co.uk/blockchain-security-cryptocurrency-boom-1658062
http://www.ibtimes.co.uk/blockchain-security-cryptocurrency-boom-1658062
Subscribe to:
Posts (Atom)