Friday, June 26, 2015

Would that I was as confident.
CBR reports:
A new survey has revealed that 61% of energy security professionals believe their organisation could detect a critical system breach within 24 hours.
94% of executives agreed that their organisation is a target for cyber criminals, with 86% of respondents saying that they could detect a breach in less than one week.
49% of respondents believe their organisation could detect a cyberattack within 24 hours, while just 3% said it would take more than a month to identify it.
Read more on CBR.
For some, it’s all confident statements until there’s a “sophisticated” attack by “state actors.”
[From the article:
These levels of confidence notwithstanding, Mandiant’s M-Trends 2015 report has revealed that the average time required to detect an advanced persistent threat on a corporate network is 205 days. Additionally, in the 2015 Data Breach Investigations Report, whose key takeaways can be found here, Verizon reported that two-thirds of targeted attacks generally took months to detect.
This apparent gap in understanding is especially significant given an analysis earlier this year that found that the United States’ power grid experiences targeted attacks, both digital and physical in nature, every four days.

There's money to be made, but I find what they say about Contracts most interesting.
John Danaher writes:
You have probably noticed it already. There is a strange logic at the heart of the modern tech industry. The goal of many new tech startups is not to produce products or services for which consumers are willing to pay. Instead, the goal is create a digital platform or hub that will capture information from as many users as possible — to grab as many ‘eyeballs’ as you can. This information can then be analysed, repackaged and monetised in various ways. The appetite for this information-capture and analysis seems to be insatiable, with ever increasing volumes of information being extracted and analysed from an ever-expanding array of data-monitoring technologies.
The famous Harvard business theorist Shoshana Zuboff refers to this phenomenon as surveillance capitalism and she believes that it has its own internal ‘logic’ that we need to carefully and critically assess.

(Related) I doubt we'll see anyone talk about a similar here, Again, too much money.

Strange, but apparently Gawker thinks there is evidence (that they don't already have?) that will help them defend the lawsuit. Perhaps one of my lawyer friends could explain what that could be.
AP reports:
A federal judge has ordered the FBI to turn over evidence related to professional wrestler Hulk Hogan’s sex tape.
Gawker sued the FBI after it refused a Freedom of Information Act request for the evidence, which could find its way into Hogan’s invasion of privacy suit against the gossip site. Hogan sued Gawker after it published parts of the sex tape in 2012.
Read more on Tampa Bay Tribune.

Worth a try? For a passing grade, my students' policies should include at least what this automated tool does.
Now you have no excuse not to have a privacy policy for your web site or business. The Office of the Privacy Commissioner of New Zealand has launched Priv-o-matic (I kid you not about the name!):
Get your privacy statement sorted. It takes five minutes.
All you’ll need is a good understanding of your business.
If you’ve been procrastinating, try using this free tool. There are also tips provided for NZ entities that non-NZ entities may also find informative.

Perhaps a preview of how the Internet of (Annoying) Things will work. Imagine messages that “Alert” you to the fact that you will need an oil change in a mere 250 mile, the lint filter in you dryer needs to be cleared, there is a bulb out on your Christmas tree, etc., etc. and so forth.
Chevrolet Adds Theft Alarm Feature: Now Your Car Can Text You If It's Being Stolen
… One of the company's newest offerings is a safety feature that notifies owners in the unlikely event that their vehicles are being stolen. It's already available for Buick, Cadillac, and GMC models, and it's now available on Chevrolet vehicles, too.
The feature is called "Theft Alarm Notification".
… If you're an OnStar subscriber, you can opt-in to Theft Alarm Notification and select how you'd like to be notified when a would-be thief triggers your car alarm. You can choose to receive a text message, email, or phone call.

… The five largest publicly traded health insurance companies (UnitedHealth, Anthem,1 Aetna, Humana and Cigna) — all of which were party to an amicus brief in support of the subsidies filed by America’s Health Insurance Plans, a trade group for insurance companies — rose an average of 1 percent over their opening prices by 11 a.m. Thursday. The bounce started at approximately 10:10 a.m., right when SCOTUSblog first announced the Supreme Court’s decision.
That rise amounted to a $3 billion increase in the combined market capitalization of the five companies. And that figure underestimates the decision’s real benefit to these companies.

Another interesting toy. Forward Looking InfraRed is the technology used in heat seeking missiles. What could possibly go wrong?
New FLIR One Thermal Imaging Accessory Launched for Android and iOS
… The highlight of the FLIR One accessory is that it transforms a mobile device to into a thermal imager that with infrared can show heat images and measures temperature.
… The FLIR One can be attached to the Micro-USB connector for Android or to a Lightning connector for iOS devices. The new FLIR One is powered by an internal battery and features a Lepton thermal camera core, which is four times the resolution of the previous version.
The company claims that the FLIR One can show temperature variations of less than a tenth of a degree.

A bit of an overreaction? Even in an appropriate context, it's politically incorrect. Pretend the Civil War never happened? (Digest Item #2)
Apple Pulls American Civil War Games
Apple has pulled all games from the App Store which feature the Confederate flag. This means any and all games concerning the American Civil War have disappeared, with Apple telling affected developers this is because their game “includes images of the confederate flag used in offensive and mean-spirited ways.”
This is in response to the racially motivated mass murder at the Emanuel African Methodist Episcopal Church on June 17th. In the aftermath of the killing and the debate that ensued, retailers banned sales of the Confederate flag. However, Apple is going one step further and trying to rewrite history.
In order to have their games reinstated to the App Store, Apple is asking developers to remove all traces of the Confederate flag. Thus ignoring the fact that, as unsavory as it may be, the Confederate flag is a part of history. We can only imagine Apple would remove Hitler from the movie Downfall if it had its way.

I have students who read. Two of them!
Three Tools to Help Students Find Books to Read This Summer
… The Book Seer is a neat book recommendation engine that I discovered few years ago through Kristen Swanson's Teachers as Technology Trailblazers blog. The Book Seer is very easy to use. To get a book recommendation just type in the title and author of a book that you've recently read and the Book Seer will spit out a list of related titles and authors that you might enjoy.
Your Next Read is a neat little site that provides you with a web of book recommendations based on the authors and books you already like. … Click on any of the books appearing in the web to create another new web.
Your Next Read 2Titles takes a slightly different approach to making book recommendations. On 2Titles you answer a series of eight questions about your personality and interests before answering questions about books you've previously read.

Strange promotion, but a Coke for the troops is worth a click.
Every Click is a Coke for the Troops

Maybe, sometimes, there isn't an App for that, possibly.
Make your own app with these DIY services
Appy Pie prides itself on being simple and easy to use—hence their tagline, “make an app, as easy as pie.” Their code-free drag-and-drop app builder is easy to navigate (and supported with helpful pop-ups, video tutorials, and a live chat box), and even a complete tech newbie will be able to create a professional-looking app in a few hours.
Como makes app-making even easier than Appy Pie does. Como is very similar to Appy Pie, but with one major (possibly game-changing) difference—in the second step of Como’s app-building process, they ask you to input your Facebook page or website URL, and then they pull your existing content and info to create a template for your app.
GoodBarber is all about sexy mobile apps—heck, even their splash page is a minimalist rainbow blend of watercolors and text. While Appy Pie offers up a few generic stock photos, and Como gives you four or five basic themes, GoodBarber has an entire theme library, complete with custom fonts and high-resolution stock photos from Unsplash (a free stock photo library).

(Related) Don't make your App too good. Dilbert shows us why...

No comments: