These seminars are always worth attending.
The Privacy Foundation at the University of Denver
Sturm College of Law presents: Privacy Breaches
Friday, November 6, 2015 10AM – 1PM followed by
lunch. Ricketson Law Building, Room 290, 2255 E Evans Avenue Denver,
Colorado 80208
Register online at
http://alumni.du.edu/privacybreaches
or contact Privacy Foundation Administrator Anne Beblavi at
abeblavi@law.du.edu
Seminar, CLE (3 hrs. pending) & Lunch $30
Interesting. Clearly Dow Jones would be an
attractive target, but would anyone investigate a breach of their
systems without contacting them?
Russian
Hackers of Dow Jones Said to Have Sought Trading Tips
A group of Russian hackers infiltrated the servers
of Dow Jones & Co., owner of the Wall Street Journal and several
other news publications, and stole information to trade on before it
became public, according to four people familiar with the matter.
The Federal Bureau of Investigation, Secret
Service and the Securities and Exchange Commission are leading an
investigation of the infiltration, according to the people. The
probe began at least a year ago, one of them said.
Dow Jones, in a statement, said: “Since
Bloomberg published its article, we have worked hard to establish
whether the allegations it contains are correct. To
date, we have been unable to find evidence of any such
investigation.”
… Kelly Langmesser, a spokeswoman for the FBI
New York office, confirmed the office is investigating a breach at
Dow Jones but declined to comment further. Jim Margolin, a spokesman
for the Manhattan U.S. Attorney’s Office, declined to comment.
Peter Carr, a spokesman for the Justice Department’s criminal
division, also declined to comment, as did spokesmen for the Secret
Service and the SEC.
The White House was briefed on the investigation
and the FBI and SEC have
spent months trying to determine exactly how the hackers could profit
from what they took, [I
assume that means used in very subtle ways. The not-so-subtle ways
are obvious. Bob] consulting financial and market experts
among other specialists, the people said.
For my Intro to Computer Security students.
Rosalie F. Donlon reports:
Travelers’ cybersecurity experts have developed common cyber claims scenarios across five industries, as shown in the following pages. The costs add up quickly, often reaching more than $1 million.
For each of the scenarios/industries, Donlon
reports estimates based on the NetDiligence® Data Breach Cost
Calculator and then factors in estimates from Ponemon’s Ponemon’s
2015 Cost of Data Breach Study. You can see the
figures/estimates on PropertyCasualty360.com.
(Ditto) Because what Congress doesn't know can
hurt you!
CRS – The
Internet of Things: Frequently Asked Questions
by Sabrina
I. Pacifici on Oct 16, 2015
CRS – The
Internet of Things: Frequently Asked Questions – Eric A.
Fischer, Senior Specialist in Science and Technology. October 13,
2015.
“Internet of Things” (IoT) refers to networks
of objects that communicate with other objects and with computers
through the Internet. “Things” may include virtually any object
for which remote communication, data collection, or control might be
useful, such as vehicles, appliances, medical devices, electric
grids, transportation infrastructure, manufacturing equipment, or
building systems. In other words, the IoT potentially includes huge
numbers and kinds of interconnected objects. It
is often considered the next major stage in the evolution of
cyberspace. Some observers believe it might even lead to
a world where cyberspace and human space would seem to effectively
merge, with unpredictable but potentially momentous societal and
cultural impacts. Two features makes objects part of the IoT —a
unique identifier and Internet connectivity. Such “smart”
objects each have a unique Internet Protocol (IP) address to identify
the object sending and receiving information. Smart objects can form
systems that communicate among themselves, usually in concert with
computers, allowing automated and remote control of many independent
processes and potentially transforming them into integrated systems.
… Although the full extent and nature of the
IoT’s impacts remain uncertain, economic analyses predict that it
will contribute trillions of dollars to economic growth over the next
decade.
… Security and privacy are often cited as
major issues for the IoT, given the perceived difficulties of
providing adequate cybersecurity for it, the increasing role of smart
objects in controlling components of infrastructure, and the enormous
increase in potential points of attack posed by the proliferation of
such objects. The IoT may also pose increased risks to privacy, with
cyberattacks potentially resulting in exfiltration of identifying or
other sensitive information about an individual. With an increasing
number of IoT objects in use, privacy concerns also include questions
about the ownership, processing, and use of the data they generate.”
This is something to follow, I think.
The U.S. Defense Advanced Research Projects Agency
(DARPA) this week named University of Massachusetts Amherst professor
of computer science Gerome Miklau to lead a 4.5-year, $2.8 million
grant to develop tools and techniques that enable the agency to build
data management systems in which “private data may be used only for
its intended purpose and no other.”
Miklau’s project is part of a national program
dubbed by DARPA “Brandeis” in recognition of the U.S. Supreme
Court Justice who in an 1890 essay expounded on the right to privacy.
… He estimates that UMass Amherst will receive
about $1.2 million, while collaborators Ashwin Machanavajjhala at
Duke University will get about $1.1 million and Michael Hay at
Colgate University approximately $470,000. At
UMass Amherst, the project will support two doctoral students.
… Our team designs systems
that operate between a trusted data collector, for example, a
hospital or the Census Bureau, and a data analyst, so
social and medical scientists and government agencies can use
aggregate data without knowing all about each individual.”
… Methods for protecting private information
fall into two broad categories: filtering data at the source or
trusting the data user to diligently protect it. Both have serious
challenges
… Miklau and colleagues plan to follow a
guideline established by cryptographers nearly a decade ago known as
differential privacy,
which seeks to offer data analysts maximum accuracy in database
queries at the same time providing minimal chance of identifying
individual records. It offers more reliable protection than data
anonymization, he notes.
… To accomplish this, he and colleagues will
add statistical “noise” to query outputs such that the data in
tables and spreadsheets are slightly distorted each time a user
queries them.
Miklau explains, “We are going to deliver
answers to analysts that are statistically close to what would be
delivered if one person has opted out of the database. It’s a
random perturbation, like flipping a coin every time you ask a
question. The answer then is statistically close, but there is a
randomness that helps protect the individual.”
Interesting. “Quantity has a quality of its
own.”
Appeals
Court Validates Google's Mammoth Books Project
Google won an important legal victory on Friday,
when the Second United States Court of Appeals in New York upheld a
lower court's judgment in its years-long battle with the Authors
Guild over Google Books.
The case "tests the boundaries of fair use,"
Judge Pierre Leval wrote in the appeals court's ruling.
Google's unauthorized digitizing of
copyright-protected works, creation of search functionality, and
displaying of snippets from those works do not constitute
infringement, according to the decision.
That is because the purpose of the copying "is
highly transformative," the public display of text is limited,
and the snippets "do not provide a significant market substitute
for the protected aspects of the originals," the appeals court
ruled.
… "There is a difference between
transforming the text and copying the text for a transformative
purpose," said Matthew Sag, a professor at the Loyola University
Chicago School of
Law.
Are drones a fad similar to the hula-hoop? Will
drones become old hat in six months? Apparently the government
doesn't think so. This will require the FAA to learn new
technologies. And perhaps provide some opportunities for businesses
that identify/track drones or establish geo-fencing.
People will
soon have to register their drones with the federal government
The federal government will soon require owners of
drones to register their devices with the US Department of
Transportation, NBC News reports.
The forthcoming rules stem from concerns about the
airspace that drones share with larger aircraft.
… The Federal Aviation Administration
announced earlier this month that it was also brainstorming
technologies to keep drones out of restricted airspace. One such
method is known as geo-fencing. If a drone has geo-fencing
technology installed, it will automatically shut down the drone if
the craft wanders into an area that's off-limits.
Perspective. The government is buying airwaves to
auction off?
A major New
York TV station could win $900 million — if it goes off the air.
Here’s why.
… WCBS-TV in New York City could win as much
as $900 million for going off the air, a result of its position in
one of the country's busiest markets. Smaller stations such as KAWE
in Minneapolis might receive around $20 million.
The figures represent the maximum amount each
broadcaster could receive for participating in a never-before-tried
auction of wireless airwaves, one that's designed to transfer control
of that invisible real estate to wireless carriers such as AT&T
and T-Mobile. Cellular providers say they need access to more of the
radio spectrum to build out next-generation mobile data networks.
(All wireless data, from TV signals to 4G LTE, ride atop spectrum, a
finite resource.)
Perspective. Easily doable.
Chattanooga
Slays Comcast, Wins Right To Offer 10Gbps Internet For $299/Month
When Google
released its Fiber Internet service five years ago, it was quite
something to behold. While most of us were dealing with modest
broadband speeds (or worse), the big G was offering Internet speeds
that could max out our home
routers.
At 1Gbps, Google was allowing people to both download and upload up
to a theoretical 125MB/s, which is what most hard drives will peak
at. It's still impressive.
Not long after Google began hitting some cities
with gigabit Internet, we began to see a number of other companies
follow suit. Unfortunately, almost all of these are ISPs that focus
on a certain area, so a wider rollout is in most cases unlikely. One
such ISP is Chattanooga's EPB Fiber Optics, which also unveiled 1Gbit
service in 2009 despite
stiff opposition from Comcast.
While ISPs were still in the process of rolling
out 1Gbps services, Comcast
thought it'd be a good guy for once and introduce
2Gbps service. For those who are serious about their Internet
and have the cash to spare, that service would be hard to avoid, even
if it's akin to making a deal with the devil.
Well, that is unless you happen to live in an area
that EPB covers, as it's now one-upped - ahem, five-upped - Comcast
by offering a 10 gigabit service.
Funny the things we think are educational.
Hack
Education Weekly News
… “Every few weeks, it seems, a new
investigation is launched into one of the larger for-profit colleges
in the country,” Inside
Higher Ed reports. And yet… And yet: the US Department of
Education just announced it will allow federal
financial aid to be used for “alternative education providers,”
including MOOCs and coding bootcamps. Although the Obama
Administration has cracked down on for-profit universities, it seems
more than happy to fund a new revenue stream for for-profits: the
outsourcing of instruction to tech startups. Ted Mitchell, Under
Secretary of Education and former venture capitalist at New School
Venture Fund, announced the pilot program. More
via Edsurge. Meanwhile, as
The New York Times observes, “For-Profit Colleges Accused of
Fraud Still Receive U.S. Funds.”
… California governor Jerry Brown signed
a bill that abolishes the state’s high school exit exam and
will award diplomas to thousands who failed the exam as far back as
2004 but had completed all their high school classes. [Because
showing up is enough? Bob]
… Barbara Byrd-Bennett, the former head of
Chicago Public Schools pled
guilty for “her role in a scheme to steer $23 million in no-bid
contracts to education firms for $2.3 million in bribes and
kickbacks.” She will serve 7.5 years in jail. More of the
contracts she approved during her tenure are now under
scrutiny.
I don't have any “nutritionally challenged”
students in my spreadsheet class. I don't think I do anyway.
How to
Build Perfect Meals with The IIFYM Calculator and Excel
Tracking the nutrition in your food has been
pretty easy for some time now. But being able to design
meals that meet your nutrition intake targets has always been a
little tougher.
In this article you’ll quickly learn exactly how
you can do this using a pre-made Excel spreadsheet and a free online
calculator.
Tools for Math teachers, tutors and students.
5 Online
Calculators to Improve Your Basic Math Skills
Humor, with a grain of truth. Ask a narcissist?
(Infographic)
Take a
Better Selfie With the Help of Famous Politicians
No comments:
Post a Comment