Friday, July 02, 2010

It might be useful to collect these and put together the questions management will need to answer after a breach – and I suspect they are questions that should also be asked/answered in normal day-today monitoring of security.

http://www.databreaches.net/?p=12358

And so it starts: Blumenthal Investigating Wellpoint Security Breach

July 2, 2010 by admin

From the CTWatchdog:

Connecticut Attorney General Richard Blumenthal is investigating a massive security breach that allegedly compromised private financial and health information on nearly a half million WellPoint consumers, including thousands in Connecticut.

In a letter to WellPoint Inc., Blumenthal has requested detailed information about how the breach occurred, what steps have been taken to protect the affected individuals, and what new procedures have been adopted to prevent future breaches.

Blumenthal is also calling on WellPoint to provide the same protection that other companies have done after similar breaches — at least two years of credit monitoring, at least $25,000 of identity theft insurance and expenses covered to impose and later lift any security freeze on consumers’ credit reports.

[...]

Blumenthal is seeking a response by July 9. The information he is seeking includes:

  • the name and address of the computer company who updated the online application process in October 2009; [“We'd also like to send a letter to ______________” Bob]

  • What security protections, hardware or software, were present or used on the online application system prior to the upgrade;

  • the categories of information contained on the online system and compromised by this breach;

  • the process by which someone would be able to “manipulated the URL address” in order to view other individuals’ information;

  • Prior measures to safeguard sensitive information;

  • how and when WellPoint first learned about the breach;

  • the circumstances under which the information was accessed or viewed by anyone without authorization;

  • what, if any, security protocols or procedures were in effect to prevent the exposure of private information to users or applicants using the online system;

  • the number of individuals affected by this incident and their state of residence;

  • all steps taken to determine what caused the flaw in the online application system and the time period in which private information was publicly available;

  • how WellPoint determined that the information was accessed by fewer than 10 unidentified computers — someone other than the health insurer’s employees and affiliates;

  • copies of all investigative reports or audits relative to this incident;

  • all steps taken or that will be taken to warn all affected persons that their private information may have been compromised, and copies of any notification letters already sent;

  • an outline of any plan to prevent a future breach and a timeline for implementing that plan; and

  • corporate policies regarding securing servers, databases, or other systems containing private information.



Here we go again...

http://www.thetechherald.com/article.php/201026/5818/Sony-forced-to-recall-534-000-VAIO-notebooks

Sony forced to recall 534,000 VAIO notebooks

… According to Sony, the recall covers certain models in the VAIO F and VAIO C series and has been issued in light of a temperature-control defect that can lead to the production of potentially dangerous levels of heat within the hardware.



How to build the ultimate facial recognition database?

http://gizmodo.com/5577986/facebook-will-now-recognize-you-in-that-shameful-party-photo

Facebook Will Find Your Face In That Shameful Party Photo

Facebook appears to have added a shutterbug's [and Intelligence agencies Bob] dream feature: Face detection technology. As soon as you upload a picture, the feature realizes that there are humans in it and preselects their faces. You just add the poor souls' names.



Something to amuse my Anti-Trust lawyer friends...

http://news.cnet.com/8301-30684_3-20009502-265.html?part=rss&subj=news&tag=2547-1_3-0-20

Regulators bound to stack up over Google-ITA

When will the U.S. government eventually decide to confront Google?

That's really the only question that needs to be debated in the wake of Google's announcement that it plans to acquire ITA Software, the leading provider of flight information from airlines to travel Web sites, for $700 million in cash. As it stands, the deal would marry the world's leading Internet search company with a crucial link in the online flight reservation process, making life for executives at online travel sites such as Orbitz, Kayak, and Expedia a whole lot more complicated.

… So from Google's perspective, this is a user-friendly deal that will simply allow it to offer a better service. It also doesn't hurt that if Google turns into the predominant online destination for travel search, revenue from ads placed next to those search results will add to Google's already lucrative search advertising business.

But there are dozens of other sites that already offer these services by licensing ITA's software, including Google archrival Microsoft's Bing search engine and travel-oriented sites like the ones described above. So why didn't Google simply license the software as well? CEO Eric Schmidt said Google considered that, but concluded it would be unable to do the "deep integration" with search results and innovation in travel search that it desired without merging Google's technology and ITA's.



For your Computer Security manager or anyone who would like to understand what can be done to secure your computers.

http://techcrunch.com/2010/07/01/ibm-acquires-enterprise-data-security-software-company-bigfix/?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+Techcrunch+%28TechCrunch%29

IBM Acquires Enterprise Data Security Software Company BigFix

IBM is making another acquisition today, buying up computer security software company BigFix. Terms of the deal were not disclosed.

BigFix security software identifies all of a company’s PCs, laptops, server and then monitors and flags IT administrators when devices are not in compliance with corporate IT security standards. BigFix’s software promises to make security fixes across at least 500,000 machines in a matter of minutes.



Worth reading.

http://www.bespacific.com/mt/archives/024623.html

July 01, 2010

New GAO Reports: Implementing Cloud Computing,

  • Information Security: Governmentwide Guidance Needed to Assist Agencies in Implementing Cloud Computing, GAO-10-855T, July 01, 2010

  • Biosurveillance: Efforts to Develop a National Biosurveillance Capability Need a National Strategy and a Designated Leader, GAO-10-645, June 30, 2010

  • Information Security: Federal Guidance Needed to Address Control Issues with Implementing Cloud Computing, GAO-10-513, May 27, 2010



An interesting title. One would assume this incorporates responsibilities for protecting privacy and securing data... Will they be able to spend any money, since Obama is suspending many IT projects.

http://www.bespacific.com/mt/archives/024626.html

July 01, 2010

FCC Launches Data Innovation Initiative

News release: "The Federal Communications Commission today launched the Data Innovation Initiative, the agency’s latest action to modernize and streamline how it collects, uses, and disseminates data. With this launch, the FCC continues the changes that were made as part of a comprehensive reform effort that is improving the agency’s fact-based, data-driven decision-making. To lead the Data Innovation Initiative, FCC Chairman Julius Genachowski today established a new, cross-bureau data team, led by the agency’s first-ever Chief Data Officer... The launch of the Data Innovation Initiative, the appointment of the data team, and the release of the public notices follows other data innovations recently launched at the FCC, which include improving the search on ECFS, making more information machine-readable at www.reboot.fcc.gov/data, tools that allow consumers to test the performance of their broadband connections that can be found at www.broadband.gov, an interactive Spectrum Dashboard, and collaboration with the NTIA to produce a National Broadband Map."



definitely NSFW, but funny!

http://techcrunch.com/2010/07/01/best-buy-iphone-4-evo-4g/?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+Techcrunch+%28TechCrunch%29

Best Buy Trying To Fire Employee Over Those Hilarious EVO Versus iPhone Videos



They will find I live in Lynchberg, Tennessee. (Do people still drink water?)

http://science.slashdot.org/story/10/07/01/1815204/Things-You-Drink-Can-Be-Used-To-Track-You?from=rss&utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+Slashdot%2Fslashdot+%28Slashdot%29

Things You Drink Can Be Used To Track You

Posted by timothy on Thursday July 01, @02:40PM

sciencehabit writes with an intriguing story about the potential of figuring out where people have been by examining their hair:

"That's because water molecules differ slightly in their isotope ratios depending on the minerals at their source. Researchers found that water samples from 33 cities across the United State could be reliably traced back to their origin based on their isotope ratios. And because the human body breaks down water's constituent atoms of hydrogen and oxygen to construct the proteins that make hair cells, those cells can preserve the record of a person's travels. Such information could help prosecutors place a suspect at the scene of a crime, or prove the innocence of the accused."

Or frame someone by slipping them water from every country on the terrorist watchlist.



Links to Georgetown U. Interesting statistics!

http://www.docuticker.com/?p=36837

Help Wanted: Projections of Jobs and Education Requirements Through 2018

[Here's Colorado: http://www9.georgetown.edu/grad/gppi/hpi/cew/pdfs/colorado.pdf



Try the free version first! If it is all you need, STOP! If not, you have narrowed your search to the specific features you require.

http://www.makeuseof.com/tag/the-5-best-most-reliable-surces-to-download-freeware-programs/

The 5+ Best Sources To Download Freeware Programs

The good news is that there are thousands of software developed everyday that do most of what commercial software does, but for free!



Used with care, this can be powerful.

http://www.makeuseof.com/tag/how-to-make-a-visual-resume-with-powerpoint-in-3-steps-stand-out-from-the-crowd/

How to Make a Visual Resume with PowerPoint in 3 Steps & Stand Out from the Crowd



It's here so you better learn how to live with it...

http://www.makeuseof.com/tag/7-great-completelyfree-ebooks-social-media-read/

7 Great Completely Free eBooks on Social Media You Have to Read



Start your geeks young!

http://www.makeuseof.com/tag/5-computer-games-toddlers/

5 Best Computer Games for Toddlers



Once you find a new book, link to your local library and put it on hold. Simple!

http://www.freetech4teachers.com/2010/07/your-next-read-book-recommendations.html?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+freetech4teachers%2FcGEY+%28Free+Technology+for+Teachers%29

Your Next Read - Book Recommendations

Your Next Read is a neat little site that provides you with a web of book recommendations based on the authors and books you already like.

No comments: