Menu

Blog

Archive for the ‘security’ category: Page 122

Feb 4, 2016

U.S. To Rework Arms Control Rule on Exporting Hacker Tools

Posted by in categories: cybercrime/malcode, security

US Hacker Tools treated like weapons in US arms deals with other countries — why not; the true war is really in Cyber.


The government is rewriting a proposal under arms control rules from 20 years ago to make it simpler to export tools related to surveillance and hacking software, since they are used for network security.

Read more

Feb 4, 2016

Are you covered? Emerging issues for health care providers under cyber risk insurance

Posted by in categories: biotech/medical, health, law, policy, security

Tough to be a doctor these days — Could be bad news for Providers with limited or no Cyber Risk Coverage.


Providers are focusing on cybersecurity with increased urgency. Cyberattacks on health-care organizations reached an all-time high in 2015 and aren’t expected to slow down in 2016, Harry Greenspun, director for Deloitte’s Center for Health Solutions, told Bloomberg BNA. One element of a comprehensive strategy to address data security is customized cyber risk insurance. Recent case law supports standing for class action litigants alleging future injuries, which may not be covered by some policy forms. We urge providers to review their cyber risk coverage with the increasing risks and this new case law in mind.

Specifically, it is critical that cyber risk insurance is designed to both: adequately mitigate future harm to those whose private information is compromised as a result of a data breach; and satisfy the full array of damages sought by such third parties, including damages for future injuries resulting from the anticipated improper use of data. These considerations are increasingly important because the policies available in today’s market are not standardized. While many absorb some of the costs associated with notification and fraud monitoring, existing forms may not protect against damages sought for susceptibility to identity theft.

Continue reading “Are you covered? Emerging issues for health care providers under cyber risk insurance” »

Feb 4, 2016

NSA Plans to ‘Act Now’ to Ensure Quantum Computers Can’t Break Encryption

Posted by in categories: computing, encryption, information science, privacy, quantum physics, security

Another article just came out today providing additional content on the Quantum Computing threat and it did reference the article that I had published. Glad that folks are working on this.


The NSA is worried about quantum computers. It warns that it “must act now” to ensure that encryption systems can’t be broken wide open by the new super-fast hardware.

In a document outlining common concerns about the effects that quantum computing may have on national security and encryption of sensitive data, the NSA warns that “public-key algorithms… are all vulnerable to attack by a sufficiently large quantum computer.”

Continue reading “NSA Plans to ‘Act Now’ to Ensure Quantum Computers Can’t Break Encryption” »

Feb 3, 2016

NSA Says it “Must Act Now” Against the Quantum Computing Threat

Posted by in categories: computing, encryption, privacy, quantum physics, security

NSA states it must act now against the “Quantum Computing Threat” due to hackers can possess the technology. I wrote about this on Jan 10th. Glad someone finally is taking action.


The National Security Agency is worried that quantum computers will neutralize our best encryption – but doesn’t yet know what to do about that problem.

Read more

Jan 31, 2016

Quantum computing near and disruptive, warns academic at Davos

Posted by in categories: business, computing, internet, quantum physics, robotics/AI, satellites, security, singularity

True points and many that I have been sharing on Quantum around its own potential to change everything that we know about technology (devices, internet & networking in general, wireless and satellites, AI, advancements in biotech, security, big data, and singularity itself). The author also highlights many of the same concerns that I have shared around hackers on Quantum breaking through the older digitized platforms and networks; therefore, many companies and governments are exposed as well as consumers who have not adopted Quantum.

Although the author speculates we’re less than 10 yrs for Quantum to be seen in the everyday usage; I believe we’re within 7 yrs.


Within four years quantum computers will have the beating of conventional computers and that will produce a dramatic change in both the technology landscape and in business, according to Professor Jeremy O’Brien from Bristol University.

Read more

Jan 30, 2016

Connected Medical Devices Are Sick with Vulnerabilities, According to New Research

Posted by in categories: biotech/medical, internet, life extension, nanotechnology, Ray Kurzweil, security, wearables

This is not good especially as we look at those aspirations for more nanobots to connect us to the cloud plus Mr. Kurzweil’s desire to live forever.


Medical device manufacturers are struggling to safeguard their newly connected designs from current and emerging security threats.

Natick, MA (PRWEB) January 29, 2016.

Continue reading “Connected Medical Devices Are Sick with Vulnerabilities, According to New Research” »

Jan 30, 2016

FDA Guidelines Target IoT Medical Device Security

Posted by in categories: biotech/medical, computing, health, internet, security

Could the FDA crush IoT opportunities in Healthcare?


The U.S. Food and Drug Administration last week took a step toward addressing the threat the Internet of Things poses to patients and their data by releasing some proposed guidelines for managing cybersecurity in medical devices.

“A growing number of medical devices are designed to be networked to facilitate patient care. Networked medical devices, like other networked computer systems, incorporate software that may be vulnerable to cybersecurity threats,” the FDA says in its proposal.

Continue reading “FDA Guidelines Target IoT Medical Device Security” »

Jan 30, 2016

Cyco.net Inc. Signs $20 Million Equity Line of Credit with Cornell Capital Partners

Posted by in categories: internet, quantum physics, security

This is sad in a way; especially as you see the large gap that still remains in Cyber Security v. hackers. 2015 was not a stellar year for security against hackers. Quantum does offer hope for many in finally getting a handle on Cyber Security; however, that may be even 7 years away before main street is able to leverage an operational Quantum Internet and/ or platform.

However, tech companies & proven Cyber talent need to strategically come together under a broader cyber program (beyond just the US Government and special interest groups; or a couple of venture partnerships) to resolve Cyber Security once and for all. Granted there has been some attempts for companies and industry talent to cross collaborate & address the Cyber Threat challenges for a while now. And, myself and others from big tech have worked together on “special programs to address the Cyber Threat Challenges.” Unfortunately, it hasn’t been enough; we need something more on a larger scale.

https://lnkd.in/bRzqQNf

Continue reading “Cyco.net Inc. Signs $20 Million Equity Line of Credit with Cornell Capital Partners” »

Jan 29, 2016

USENIX Enigma 2016 — Why Is Usable Security Hard, and What Should We Do about it?

Posted by in category: security

Adrienne Porter Felt, Staff Software Engineer, Google Chrome.

Everyone wants to build software that’s both usable and secure, yet the world is full of software that falters at this intersection. How does this happen? I experienced the disconnect firsthand, when the Chrome security team redid Chrome’s security UI to conform to best practices for usable security. In the process, we learned how hard it is to actually adhere to oft-cited wisdom about usable security when faced with real-world constraints and priorities. With a set of case studies, I’ll illustrate the limitations we encountered when trying to apply common wisdom to a browser with more than a billion users—and discuss what has actually worked for us in practice, which might work for other practitioners too.

Continue reading “USENIX Enigma 2016 — Why Is Usable Security Hard, and What Should We Do about it?” »

Jan 29, 2016

USENIX Enigma 2016 — NSA TAO Chief on Disrupting Nation State Hackers

Posted by in categories: habitats, privacy, security

Rob Joyce, Chief, Tailored Access Operations, National Security Agency.

From his role as the Chief of NSA’s Tailored Access Operation, home of the hackers at NSA, Mr. Joyce will talk about the security practices and capabilities that most effectively frustrate people seeking to exploit networks.

Continue reading “USENIX Enigma 2016 — NSA TAO Chief on Disrupting Nation State Hackers” »