http://www.nj.com/entertainment/tv/index.ssf/2015/03/csi_cyber_review_patricia_arquette_cbs.html By Vicki Hyman NJ Advance Media for NJ.com March 04, 2015 Thank goodness Patricia Arquette just won an Oscar, because otherwise I’d really have nothing to say about “CSI: Cyber.” The newest “CSI” franchise, which debuts on CBS tonight at 10 p.m., is about the FBI’s cyber crime division, comes with all the series’ high-tech visual flourishes and stars “Boyhood” star Arquette, who, um, just won an Oscar. Yeah. Oh! This time, the Who theme song is “I Can See For Miles.” I’m not saying “CSI: Cyber” isn’t worth watching. I’m just saying there’s not a heck of a lot to say about it. (The original flavor “CSI” is still plugging away after 15 years, while the Miami and New York franchises lasted 10 and 9 seasons, respectively. The latest entry is a bit different in that there’s a lot of people peering at computer screens instead of into microscopes. […]
http://www.scmp.com/news/china/article/1697491/tough-security-tests-banks-foreign-suppliers Reuters in Beijing and San Francisco 01 February, 2015 Draft Chinese government regulations would force overseas technology vendors to meet stringent security tests before they can sell to China’s banks, an acceleration of efforts to curb the country’s reliance on foreign technology that has drawn a sharp response from US business groups. But a translation of the proposed rules shows its immediate impact on foreign firms may not be as tough as feared. The draft shows the regulation would initially focus on types of hardware and software where domestic suppliers already have a strong market position compared with their foreign rivals. Western companies say the rules have not yet been formally adopted and some said they believed Beijing would retreat on some of the most onerous ideas, including demanding that firms’ proprietary source code be reviewable. Chinese leaders are to review the plan next week, US tech industry sources said. […]
http://www.csoonline.com/article/2877972/security-leadership/3-things-csos-can-learn-from-cpos.html By Maria Korolov CSO Jan 29, 2015 The role of the CSO and CIO has been changing dramatically as technology becomes more and more vital to business strategies. Sometimes, it can be hard to keep up. Amol Joshi, SVP of business development at Redwood City, Calif.-based Ivalua Inc., suggests that CSOs and CIOs can pick up a few tricks from Chief Procurement Officers. 1. Create and use contract templates Many CIOs and CSOs are faced with the responsibility of creating or reviewing contracts with outsourcers, contractors, part-time help, software vendors, data centers, cloud services providers and other vendors and suppliers. CPOs have been doing this for a long time, and one trick that the use is create a library of clauses that they can put into a contract when needed. These clauses have to be kept up to date, Joshi said. For example, cloud SLAs evolve all the time, as do compliance requirements. […]
Please note: The following is not an endorsement of the specific referenced products or solutions, these are examples of ways that users can better protect themselves online. The effectiveness of these solutions varies widely. Used in combination with each other can provide significant added protection to your internet usage.
Additional Disclaimer: There is no such thing as 100% secure, so don’t misconstrue or misinterpret this guidance to be some sort of guarantee of safety online.
Top 5 Home User Protection Measures
1. First and foremost, you must install a NON-FREE Anti-Virus Suite. Prefer anti-virus software that has been tested. The following sites are good for reviewing the test results of Antivirus Detection Rates:
2. Ensure you are using a Browser Plugin to evaluate the security of websites you go to and if possible use Anti-Spam features of your Anti-Virus software. Some examples of browser plugins are: McAfee Site Advisor, Avira Browser Safety, Norton Browser Protection
3. Load up on some software and system exploit prevention, regularly change your website passwords and select passwords based on website category such as financial, entertainment and miscellaneous. Some examples of Anti-Exploit browser and software protection are: Microsoft EMET, Malwarebytes Anti-Exploit Premium
4. Use a DNS service to help block malicious websites BEFORE your computer has a chance to connect to them. Some examples are
5. The last step is a personal training thing that I advise any user online to do. Treat every single link on a web page as suspicious, never click on emailed links, it is best to browse to the specific website manually without clicking. Never open attachments that you do not first scan with your Anti-Virus software first and never ever open attachments from random people where you are not expecting an attachment. Whenever a web page claims that you must update your software and to “click here” to do so, you should be suspicious of it, unless of course you are purposely browsing to your computer manufacturer’s website, graphics card software website or some official Microsoft or Adobe website for updates to your software.
http://www.sfgate.com/movies/article/Blackhat-review-Michael-Mann-movie-bombs-6016040.php By Mick LaSalle SFGate.com January 15, 2015 You ever see a garbage truck unload? It backs up slowly and stops, the back door drops, and a cascade of wet, smelly junk comes rolling and tumbling out. Releasing a movie in January is something like that. Aside from the 2014 releases going wide following Oscar-qualifying runs in Los Angeles, what makes it into theaters in January is generally pretty raw merchandise. So the January release of “Blackhat,” the latest film from a major American director, Michael Mann (“Heat,” “The Last of the Mohicans”) was a real mystery. And it remained a mystery until about 10 or 15 minutes into the film, when the mental image returned, of that garbage truck backing up very slowly … “Blackhat” is a film about cybercrime that is, at first, difficult to follow, and later, perfectly clear and preposterous. A hacker or a team of hackers causes a Chinese nuclear reactor to blow, and China and the United States team up to stop them before they can strike again. That means springing from prison the one genius hacker smart enough to beat the hackers at their own game. He’s played by Chris Hemsworth, because that’s what computer geniuses look like in the movies. Mann suffocates “Blackhat” with style. The trouble starts in the opening scene, in which he shows how the Remote Access Trojan makes its way from the hackers to the nuclear reactor. He does this by having the camera go below the floor and then zip along miles of cable and, of course, we have no idea what we’re looking at, and it’s not particularly interesting. […]
http://money.cnn.com/2015/01/12/technology/security/obama-privacy-law/index.html By Jose Pagliery CNNMoney January 12, 2015 In a State of the Union preview, President Obama on Monday demanded quicker confessions from companies that lose your data as well as better privacy for students. One proposed law would give a company 30 days to let you know if your personal information
http://www.japantimes.co.jp/news/2015/01/13/asia-pacific/s-korea-nuclear-hack-ups-aging-reactor-risks/ Reuters Jan 13, 2015 SEOUL – The hacking of South Korea’s nuclear operator means the country’s second-oldest reactor may be shut permanently due to safety concerns, said several nuclear watchdog commissioners, raising the risk that other aging reactors may also be closed. “The operator failed to prevent it (the hack) and they don’t know how much data has been leaked. If the old reactor is still allowed to continue to run, it will just hike risks,” said Kim Hye-jung, one of nine commissioners who will this month review an application to restart the Wolsong No. 1 reactor. The future of Wolsong No. 1, shut in 2012 after reaching its 30-year life span, is seen as critical to the fate of other reactors, including the oldest, Kori No. 1, which had its life span extended by 10 years to 2017. Nuclear power accounts for about a third of South Korea’s electricity supply. More nuclear closures would boost fuel imports, which had soared since late 2012 after some reactor closures forced Asia’s fourth-largest economy to replace nuclear power with liquefied natural gas and thermal coal. […]
http://online.wsj.com/articles/sony-pictures-hack-reveals-more-data-than-previously-believed-1417734425 By BEN FRITZ and DANNY YADRON The Wall Street Journal Dec. 4, 2014 The hack at Sony Pictures Entertainment revealed far more personal information than previously believed, including the Social Security numbers of more than 47,000 current and former employees along with Hollywood celebrities like Sylvester Stallone. An analysis of 33,000 Sony documents by data-security firm Identity Finder LLC found personal data, including salaries and home addresses, posted online for people who stopped working at Sony Pictures as far back as 2000 and one who started in 1955. The hack and subsequent posting by a group calling itself Guardians of Peace illustrate the risks large companies like Sony take by amassing years of digital records on employees and customers on machines connected to the Internet. Much of the data analyzed by Identity Finder was stored in Microsoft Excel files without password protection. The documents, reviewed by The Wall Street Journal, also contain the Social Security numbers or taxpayer-identification numbers of thousands of freelancers, including actors who appeared in movies and TV shows produced by the Sony Corp.-owned studio, one of Hollywood’s largest. Among them are Mr. Stallone, director Judd Apatow and Australian actress Rebel Wilson. Representatives for the three stars declined to comment. […]