Thursday, February 05, 2015

Could be all 80 million. Probably less.
Anthem Hacked in ‘Sophisticated’ Attack on Customer Data
Anthem Inc., the second biggest U.S. health insurer by market value, said hackers obtained data on tens of millions of current and former customers and employees in a sophisticated attack that has led to a Federal Bureau of Investigation probe.
… “As soon as we learned about the attack, we immediately made every effort to close the security vulnerability, contacted the FBI and began fully cooperating with their investigation,” Anthem said. The Indianapolis-based company, formerly known as WellPoint, didn’t provide information on how the breach occurred or when it was discovered. [I think this is a mistake Bob]
… What is known is that the malicious software used to infiltrate the network and steal data was customized, which can be a sign of an advanced attacker, and is a variant of a known family of hacking tools, De Souza said. What’s rare in this case is that Anthem discovered the breach itself, instead of being alerted to it by a third party such as a bank or a credit-card company, De Souza said.


“We found DNA at the scene and this guy's got DNA so he's guilty!”
Denver police DNA mistake frees man after two months in jail on sex-assault charge
… According to a statement released by Denver police, the initial investigation indicated that Hale's DNA matched DNA directly related to the assault.
… Hale's DNA was found at the scene, police said, but the DNA evidence did not implicate him in the sexual assault.


Ha! I knew lawyers were anti-social! But seriously, if you want to be secure/private, you have to control access. If you can gain access to my private data without my knowledge and consent, it was never private in the first place!
Jason C. Gavejian writes:
As we previously reported, sending a ”friend” request to access information on an individual’s Facebook page that is not publicly available may have serious ethical implications. Specifically, the New Jersey Office of Attorney Ethics (OAE) alleges John Robertelli and Gabriel Adamo violated the Rules of Professional Conduct, including those governing communications with represented parties, when they caused a paralegal to “friend” the plaintiff in a personal injury case so they could access information on the plaintiff’s Facebook page.

(Related) As long as we're talking about Privacy... (Maybe Facebook users aren't intellectuals?)
Neil Schoenherr writes:
In our increasingly digital world, the balance between privacy and free speech is tenuous, at best.
But we often overlook the important ways in which privacy is necessary to protect our cherished civil liberties of freedom of speech, thought and belief, says Neil M. Richards, JD, a privacy law expert at Washington University in St. Louis and author of the new book, “Intellectual Privacy: Rethinking Civil Liberties in the Digital Age,” published Feb. 2 by Oxford University Press.

(Related) Facebook no longer has privacy.
Social Network Privacy Social Networking facebook in re Facebook
EPIC – With New Policy Changes, Facebook Tracks Users Across the Web: “Over the objections of consumer privacy organizations, Facebook has implemented policy changes that allow the company to track users across the web without consent. The Dutch data protection commissioner launched an investigation after the original announcement. This week the a German privacy agency announced a similar investigation. Last year, EPIC and a coalition of consumer privacy groups urged the FTC to halt Facebook’s plan to collect web-browsing information from its users. Facebook is already under a 20 year consent decree for changing users’ privacy settings. The consent decree resulted from complaints brought by EPIC and others in 2009 and 2010.”


I would have thought this was obvious. You know what you want, here it is piled up with no effort required on your part and no hint that you were in your target's system (because you were not!)
Glenn Greenwald reports:
The U.S., U.K. and Canadian governments characterize hackers as a criminal menace, warn of the threats they allegedly pose to critical infrastructure, and aggressively prosecute them, but they are also secretly exploiting their information and expertise, according to top secret documents.
In some cases, the surveillance agencies are obtaining the content of emails by monitoring hackers as they breach email accounts, often without notifying the hacking victims of these breaches. “Hackers are stealing the emails of some of our targets… by collecting the hackers’ ‘take,’ we . . . get access to the emails themselves,” reads one top secret 2010 National Security Agency document.
[…]
GCHQ created a program called LOVELY HORSE to monitor and index public discussion by hackers on Twitter and other social media.
Read more on The Intercept.


Interesting. Let's give special attention to anyone using an App like this. Clearly they have something to hide! My Ethical Hackers know how to fake “touch detected” coordinates.
This App Actually Lets You Send Screenshot-Proof Messages And Photos
Confide, an app that launched in January 2014 as a way to send confidential texts, just added the ability to send documents and photos.
Here’s how Confide protects your messages from being saved via screenshot: You can only view tiny pieces of the words, photo or document that you receive. In order to see a message sent to you, you have to push down on your screen with your finger. Only the portion under your finger is visible. Once you’ve read the message, it disappears completely.
… Confide, which is free on Android and iOS devices, was able to completely disable in-app screenshots for Android users.


Imagine all the fans who could not get tickets to the next World Cup sending their drones instead. Clouds of hundreds of drones swarming to the ball.
Patt Morrison reports:
Hard cases, said a long-ago Supreme Court justice, make bad law. The startling outliers shouldn’t be the yardstick for crafting routine criminal law. When a tipsy off-duty employee of the National Geospatial-Intelligence Agency lost control of his friend’s drone last month and smashed it onto the White House lawn, the cry went up for more drone regulation. But the incident was an oddity; the real legal questions about drone regulation have to do with privacy, policing, commerce and other uses. Ryan Calo, a law professor at the University of Washington, specializes in robotics. The White House drone flew right onto his radar.
Read more on Los Angeles Times.


Five simple rules.
CDT Letter on Body Cameras to the Task Force on 21st Century Policing
“The Center for Democracy & Technology (CDT) provided recommendations related to body-worn cameras in response to the Task Force on 21st Century Policing consideration of the issue and request for public comment. With use of body cameras rapidly expanding across the country2 and federal legislation being offered for nationwide use, CDT is pleased to see the Task Force addressing this important new technology, and its impact on privacy and civil liberties.”


Even though oil prices have jumped, analysts say they will go lower.
http://www.cnbc.com/id/102399810?__source=google|editorspicks|&par=google&google_editors_picks=true
Oil heading for $30, currency war coming: Analysts
… "I still believe we're going to go to that $30 to $33 area, which is the low point from the financial crisis in 2008, 2009. What you saw over the past several days was technical in nature, a short squeeze. This volatility is a little crazy and I think that $30 target is a downside target is for technicians that are in this market," the founding partner of Again Capital said in a "Squawk Box" interview.


Perspective. There is a reason why they call it Big Data. Can no one do Math (or proof read)?
77 Open Source Storage Applications
As the volume of digital data continues to grow, storage becomes a bigger and bigger problem for both home users and organizations. According to the latest Digital Universe study by IDC, 4.4 zettabytes (4.4 billion terrabytes) of digital information existed in 2013, and the amount of data is doubling every two years. That means by the end of 2015, there will be 8.8 zettabytes in our world, and by 2010, there will be 44 zettabytes, enough to fill a stack of tablets stretching to the moon and back six times.


Tools for social media managers?
5 Social Media Tools That Will Make You Look like the Boss
… keeping on top of all the ever-expanding social media tools can be a full-time job in itself. How do you know if your posts are being seen by the right people? How do you know if you are hanging out with the right people? Here are 5 social media tools that will make you look like the Boss.


Another discussion starter for my Data Management class?
Your Data Should Be Faster, Not Just Bigger
It’s universally acknowledged that Big Data is now a fact of life, but while large enterprises have spent heavily on managing large volumes and disparate varieties of data for analytical purposes, they have devoted far less to managing high velocity data. That’s a problem, because high velocity data provides the basis for real-time interaction and often serves as an early-warning system for potential problems and systemic malfunctions.

No comments: