An
interesting case study. Does “leaking” this information help the
investigation?
…
Federal authorities investigating the attack at JPMorgan
are increasingly confident that a criminal case will be filed against
the hackers in the coming months, said people briefed on the
investigation. Law enforcement officials believe that several of the
suspects are “gettable,” meaning that they live in a country with
which the United States has an extradition treaty. That would not
include countries like Russia.
Indictments and arrests would be a notable victory for the Federal
Bureau of Investigation and Preet
Bharara, the United States attorney in Manhattan. In contrast,
there have been no criminal charges in a December 2013 breach
at Target, where payment card data for 40 million customers was
stolen, along with the personal information of 70 million customers,
or in the major attacks against eBay
and Home
Depot involving hundreds of millions more customers last year.
…
The JPMorgan case is advancing quickly partly because the
attack was not nearly as sophisticated as initially believed,
[Suggesting that
JPMorgan was not nearly as secure as we believed? Bob]
and law enforcement authorities were able to identify at least some
suspects early on, said the people briefed on the matter, who spoke
on the condition they not be named because they were not authorized
to discuss the case. Law enforcement officials also made the
investigation a top priority given that the Department of Homeland
Security has declared the banking system critical infrastructure,
requiring additional protection from digital attacks.
… The intensifying hunt for the JPMorgan hackers comes as the
bank, which has said it spends about $250 million a year on digital
security and plans on
doubling that in the future, [Because
our vast security efforts were only half-vast? Bob]
wrestles every day with securing its vast global network.
…
The bank now also conducts a “routine review” to make sure that
high security access is justified for a particular person. [Another
“Best Practice” recently adopted? Bob]
The
first question will be “What are they hiding?” I'm sure
“sufficient” analysis of admissions data would reveal bias (or at
least favoritism)
Joseph
Pomianowski reports:
You just got lawyered.
That was the takeaway from Yale Law School Dean Robert Post’s
annual “State of the School” address last Tuesday. In frank
terms, he explained that students who requested access to their
educational records under the Family Education Rights and Privacy Act
(FERPA) would no longer be receiving the fat file they expected. To
avoid being forced to hand over a wide range of documents in response
to a flood of recent student requests, the school had decided to
destroy its student admissions evaluation records along with any
notations made by the career development office in individual student
files.
Read
more on The
New Republic.
Is
this sufficient? Should any organization that allows users to post
data have a clear set of guidelines?
Facebook
revamps its takedown guidelines
Facebook
is providing the public with more information about what material is
banned on the social network.
Its
revamped community standards now include a separate section on
"dangerous organisations" and give more details about what
types of nudity it allows to be posted.
…
The new guide will replace the old one on the firm's
website, and will be sent to users who complain about others'
posts.
I
guess it depends on what your definition of “is” is... This is
either not Hillary's fault...
The
Plot Thins on the Clinton Email 'Scandal'
(Related)
Or it is typical Hillary.
James
Carville Inadvertently Admits Hillary Clinton Used Private Email to
Avoid Accountabilty and Oversight
(Related)
Was it really simpler? Looks like a lot more work to me. Granted
the Clintons have “minions” to do the work, but I doubt we will
ever know what work that was.
How
to Set Up a Clinton-Style Home Email Server
Responding
to mounting
questions, Hillary Clinton—the former US secretary of state and
a presumptive presidential candidate—said this week that she “opted
for convenience” by
using a personal email account instead of her official one.
But
let’s be real: There’s
absolutely nothing convenient about setting up a private email
server, as Clinton says she did in her Chappaqua, New
York, home. And security experts say her system may have had
vulnerabilities that could have exposed correspondence to hackers and
government snooping.
Setting
up a server is no simple task. “It’s a pretty big job to
maintain a server like that and make sure it’s properly
configured,” says Peter Firstbrook, an internet security researcher
at Gartner. Firstbrook says such an endeavor is “highly unusual.”
He has not heard of any companies whose executives had set up
personal servers for work emails, let alone government officials.
…
For a personal server would to be airtight, it would need to be
constantly monitored and updated.
“To
say it wasn’t compromised is to say, ‘I don’t know it was
compromised,’” Stewart Baker, a former Department of Homeland
Security assistant secretary, told
Politico.
Firstbrook
said that there is sophisticated auditing software out there that
would allow the Clintons to see exactly who had read their emails and
when, but it’s unclear whether they used it.
Vladimir
is increasingly sounding crazy.
Vladimir
Putin says Russia was preparing to use nuclear weapons 'if necessary'
and blames US for Ukraine crisis
Why
bother analyzing your “Big Data” if you don't use the results?
People
Who Use Firefox or Chrome Are Better Employees
…
in the world of Big Data, everything means something. Cornerstone
OnDemand, a company that sells software that helps employers recruit
and retain workers, analyzed data on about 50,000 people who took its
45-minute online job assessment (which is like a thorough personality
test) and then were successfully hired at a firm using its software.
These candidates ended up working customer-service and sales jobs for
companies in industries such as telecommunications, retail, and
hospitality.
Cornerstone’s
researchers found that people who took the test on a non-default
browser, such as Firefox or Chrome, ended up staying at their jobs
about 15 percent longer than those who stuck with Safari or Internet
Explorer. They performed better on the job as well. (These
statistics were roughly the same for both Mac and PC users.)
…
Why would a company care about something so seemingly trivial as the
browser a candidate chooses to use? Call centers are estimated to
suffer from a turnover rate of about
45 percent annually, and it can cost thousands of dollars to hire
new employees. Because of that, companies are eager to find any
proxy for talent and dedication that they can.
That
said, Housman notes that
browser choice isn’t something that Cornerstone’s clients
consider when hiring—that’d be seen as too intrusive.
For
my Excel students.
Mini
Excel Tutorial: Use Boolean Logic to Process Complex Data
No comments:
Post a Comment