-
HIPAA audits and what you need to consider to keep your organization compliant
HIPAA has long been a regulation which has been confusing, in many aspects requiring a legal degree to understand the complexity and exactly how to become and remain complaint.HIPAA was enacted in 1996, and it has taken twenty years for it to become the elephant in the room it is today.The regulation has become more sophisticated based on the overwhelming increase in data breaches with the medical industry experiencing the greatest impact.
-
-
NRC asked to shut down Indian Point nuclear plant
Located twenty-six miles from New York City, in the right weather conditions a radiation release at Indian Point nuclear power plant could reach Times Square in as little as ninety minutes, making evacuation of New York City impossible and rendering the area uninhabitable for a long time. Critics of the agiing plant say that the disappearance and disintegration of more than 1 in 4 critical bolts holding the Indian Point nuclear reactor cooling system together is far more serious than owner, Entergy, admits.
-
-
Appalachian coal ash rich in rare earth elements
In the wake of a 2014 coal ash spill into North Carolina’s Dan River from a ruptured Duke Energy drainage pipe, the question of what to do with the nation’s aging retention ponds and future coal ash waste has been a highly contested topic. A study of the content of rare earth elements in U.S. coal ashes shows that coal mined from the Appalachian Mountains could be the proverbial golden goose for hard-to-find materials critical to clean energy and other emerging technologies.
-
-
Changing climate threatens World Heritage, tourism sites
Climate change is fast becoming one of the most significant risks for World Heritage sites across the globe. Many World Heritage sites, designated for their global significance and universal value to humankind, are major tourist destinations. Some are among the most iconic places on Earth.
-
-
It’s easier to defend against ransomware than you might think
Ransomware – malicious software that sneaks onto your computer, encrypts your data so you can’t access it and demands payment for unlocking the information – has become an emerging cyberthreat. Several reports in the past few years document the diversity of ransomware attacks and their increasingly sophisticated methods. Unfortunately, the use of advanced cryptosystems in modern ransomware families has made recovering victims’ files almost impossible without paying the ransom. However, it is easier to defend against ransomware than to fight off other types of cyberthreats, such as hackers gaining unauthorized entry to company data and stealing secret information.
-
-
What Machiavelli can teach us about cybercrime and e-commerce security
Online poker offers new insights into the mind-set of scheming Machiavellians, researchers have found. The researchers show that the card betting game can be used as a novel way to better understand the psychology of strategic deception. The research is part of a broader project looking at break-through research on deception, a basic problem at the heart of cybercrime affecting sectors such as e-commerce and financial services, to deepen our fundamental understanding of how deception works particularly in online settings.
-
-
Study probes impact of terror on business travelers, managers
A joint study of terror’s impact on business travelers and business travel managers revealed surprising results, especially with regard to traveler fears and anxiety. Among other findings, the study found that 31 percent of business travelers worry that a reluctance to travel could hurt their career, and that 6 percent would not feel comfortable expressing their concerns to upper management.
-
-
Update on earthquakes: Newest results from Oklahoma Commission look “encouraging”
The Oklahoma Corporation Commission (OCC), the regulatory agency overseeing the state’s oil and gas industry, now has data that may suggest their directives to owners of production and induction wells have successfully contributed to a decline in seismic activity in the most volatile areas prone to earthquakes.Scientists at the Oklahoma Geological Survey (OGS) continue to remind the public that there are a wide variety of unanswered questions about immediate and long-term remedies even with the new directives in place.
-
-
How Israel became a cybersecurity superpower
Israel’s rise as one of the world’s leaders in cybersecurity has been boosted by cooperation between the military, government, education, and private sectors, a level of partnership unmatched in the Western world. Israel’s cybersecurity sector is now worth half a billion dollars annually — second only to the United States.
-
-
Italian police cannot unlock Bari terrorist iPhone
The Italian security services have been unable to unlock the Apple iPhone 6 plus of a suspect member of a terrorist ring in the city of Bari. Analysts say the development will likely result in another stand-off between Apple and a government fighting terrorism, similar to the stand-off between Apple and the U.S. government over the iPhone used by the San Bernardino terrorists.
-
-
CBP MSC vehicle contracts to Telephonic appear problematic
According to federal government documents, problematic contract inconsistencies predominate in yet another CBP surveillance technology program. The CBP contract in question calls for the production of Multiple Surveillance Capability (MSC) vehicles. Unfortunately, the unintended consequences of these documented problematic delays in the CBP and Office of Technology Innovation and Assessment (OTIA) acquisition process with Telephonics MSC vehicle contracts have serious ramifications. Equally troubling is that CBP MSC contract delays from 2010 to 2015 mirror SBInet delays from 2006 to 2011. These contract delays with Telephonics MSC vehicles, a surveillance technology already in place in other countries, continues to create a U.S.-Mexican border far less secure or safe than it should or has to be.
-
-
Cybersecurity’s weakest link: humans
There is a common thread that connects many of the recent hacks which captured the headlines. They all employed generic – or what is now considered “old school” – phishing attacks which typically took the form of the infamous “Nigerian prince” type e-mails, trying to trick recipients into responding with some personal financial information. “Spearphishing” attacks are similar but far more vicious. They seek to persuade victims to click on a hyperlink or an attachment that usually deploys software (called “malware”) allowing attackers access to the user’s computer or even to an entire corporate network. Yes, people are the weakest links in cybersecurity. But they don’t have to be. With smarter, individualized training, we could convert many of these weak links into strong detectors – and in doing so, significantly strengthen cybersecurity.
-
-
Climate-driven water scarcity could reduce economic growth by up to 6%: World Bank
Water scarcity, exacerbated by climate change, could cost some regions up to 6 percent of their GDP, spur migration, and spark conflict, according to a new World Bank report released the other day. The report says the combined effects of growing populations, rising incomes, and expanding cities will see demand for water rising exponentially, while supply becomes more erratic and uncertain.
-
-
FBI does not know how the $1m iPhone hack works
The FBI does not know how the hack which was used to unlock the San Bernardino terrorist’s iPhone 5C works, even though the agency paid about $1 million for the technique. The identity of the hackers who sold the technique to the agency is a closely guarded secret, and the FBI director himself does not know who they are.
-
-
ISIS runs fish farms, car dealerships to compensate for lost oil revenues
The U.S.-led coalition’s air strike have crippled the ISIS oil-smuggling-based economy, forcing the organization to rely on fish farming and car dealing as alternative money generating resources, a new report has revealed. In order to close a yawning gap in the organization’s once-lucrative $2.9 billion oil trading scheme, ISIS has now increasingly turned to other revenue streams.
-
More headlines
The long view
Need for National Information Clearinghouse for Cybercrime Data, Categorization of Cybercrimes: Report
There is an acute need for the U.S. to address its lack of overall governance and coordination of cybercrime statistics. A new report recommends that relevant federal agencies create or designate a national information clearinghouse to draw information from multiple sources of cybercrime data and establish connections to assist in criminal investigations.
Trying to “Bring Back” Manufacturing Jobs Is a Fool’s Errand
Advocates of recent populist policies like to focus on the supposed demise of manufacturing that occurred after the 1970s, but that focus is misleading. The populists’ bleak economic narrative ignores the truth that the service sector has always been a major driver of America’s success, for decades, even more so than manufacturing. Trying to “bring back” manufacturing jobs, through harmful tariffs or other industrial policies, is destined to end badly for Americans. It makes about as much sense as trying to “bring back” all those farm jobs we had before the 1870s.
The Potential Impact of Seabed Mining on Critical Mineral Supply Chains and Global Geopolitics
The potential emergence of a seabed mining industry has important ramifications for the diversification of critical mineral supply chains, revenues for developing nations with substantial terrestrial mining sectors, and global geopolitics.