ShatterDOC Original Material

Wednesday, December 31, 2014

By late 2012, the NSA was cracking 10 million https connections a day | TechCrunch

German news outlet Spiegel published a story about the NSA’s ability to crack encrypted forms of communication, exposing the agency’s routine interception of SSL/TLS, which are used by web servers to transmit sensitive information. The report also exposed the fact that the agency has the ability to decrypt a virtual private network.

And from those 10M * 2 years * 265 days per year intercepts the NSA has prevented exactly zero, zip, nada, not one terrorist attack. Gosh! I feel so much safer - well congress apparently feels safer from us!

Hospitals Are Getting Hacked More Frequently | MIT Technology Review

Cybercriminals are increasingly targeting the computer networks of hospitals—one recently announced theft involved data from 4.5 million people who had received treatment from Community Health Systems (CHS), a company that runs more than 200 hospitals. Malware attacks are on the rise in many industries, but researchers from the security firm Websense say the rate at which attacks on hospitals has grown during the past year is unparalleled.

Data security is often lax within health-care facilities, and hackers are targeting systems that store troves of valuable personal information held in electronic medical records, according to the Websense researchers, who say they’ve observed a 600 percent increase in attacks on hospitals over the past 10 months.


And the feds have made it worse with ObamaCare security issues. 

For an amusing experience ask your healthcare provider how they secure your information.

Cybersecurity Hindsight And A Look Ahead At 2015

This year we witnessed a series of high-profile security breaches, from the aftermath of the Target and Home Depot fiascoes, to a number of attacks on other national retailers, including Michaels, Goodwill and Neiman Marcus. Then there was the massive breach at JP Morgan Chase, which compromised personal information of more than 83 million households and businesses, and finally over 100 terabytes of internal files and films recently stolen from Sony.

Nobody was safe in 2014. 

And it will only get worse in 2015...

Thursday, December 4, 2014

Feds Invoke “All Writs Act” To Compel Apple To Decrypt Smartphones

Feds Invoke "All Writs Act" To Compel Apple To Decrypt Smartphones
"Privacy advocates were probably over the moon when they heard Apple and Google's new encryption methods which is basically where neither company has the tools to decrypt a user's smartphone and access its data, unless of course the data is stored in the cloud either in iCloud or Google Drive."

Clearly, however you choose to protect your data, trusting encryption to a third party is just an invitation to the feds to re-purpose ancient laws to strip you of your rights and privacy. 

Take control! Encrypt YOUR data yourself BEFORE trusting it to a third party.

Thanks DrT


Fwd: Edward Snowden’s Privacy Tips: “Get Rid Of Dropbox,” Avoid Facebook And Google | TechCrunch


Edward Snowden's Privacy Tips: "Get Rid Of Dropbox," Avoid Facebook And Google | TechCrunch
"According to Edward Snowden, people who care about their privacy should stay away from popular consumer Internet services like Dropbox, Facebook, and Google."


Snowden said "When you say, 'I have nothing to hide,' you're saying, 'I don't care about this right.' You're saying, 'I don't have this right, because I've got to the point where I have to justify it.' The way rights work is, the government has to justify its intrusion into your rights."

Not that we're fond of Snowden, but he does have a point. And if you want to use commercial cloud services then you should consider ShatterDOC. Protect your data yourself before it leaves your computer.
Thanks DrT



Surveillance court judge to Yahoo lawyer: What people don’t know can’t hurt you

Surveillance court judge to Yahoo lawyer: What people don't know can't hurt you
VENTUREBEAT | NOVEMBER 19, 2014
"On June 19, 2008, Yahoo lawyers appeared before the U.S. Foreign Intelligence Surveillance Court of Review, a three-judge panel that convened in Providence, R.I. Yahoo wanted to contest the growing volume of requests it was getting to let federal officials monitor its users’ email and other digital communications.
Not surprisingly, the court ruled against Yahoo."

Now this is really frightening. A secret federal judge tells a US company that hiding information from their customers is OK because uninformed customers won't sue them!
Ignorance is bliss defense.

Thanks DrT


The Data Factory: 12 Essential Facts on Enterprise Cloud Usage & Risk

The Data Factory: 12 Essential Facts on Enterprise Cloud Usage & Risk
CLOUD SECURITY ALLIANCE | NOVEMBER 4, 2014
By Kamal Shah, VP of Products and Marketing
"Between headlines from the latest stories on data breaches and the hottest new apps on the block, it’s easy to be captivated with what people are saying, blogging, and tweeting about the state of cloud adoption and security. But let’s face it: It’s hard to separate the hype from the truth, and stories about security can range from hyperbolic to accurately frightening."


BLOG Team

Mobile and Cloud: BFFs 4Ever

Mobile and Cloud: BFFs 4Ever
CLOUD SECURITY ALLIANCE | OCTOBER 29, 2014
By Krishna Narayanaswamy, Chief Scientist, Netskope 

October 29, 2014 

Netskope Cloud Report - October 2014"We released the Netskope Cloud Report for October today. In it, we analyze the aggregated, anonymized data collected from tens of billions of events across millions of users in the Netskope Active Platform, and highlight key findings about cloud app usage in enterprise as seen in the Netskope Active Platform. This includes our count of enterprise cloud apps (579) and percent that are enterprise-ready (88.7 percent), as well as top apps, activities, and policy violations. But what was really interesting about this quarter’s findings is the level of cloud app activity occurring on mobile devices."

A New Path to Better Cybersecurity

A New Path to Better Cybersecurity
DISCOVER MAGAZINE | NOVEMBER 26, 2014
Hackers breached the computer systems of major retailers this year. What can be done?

May require subscription
BlogTeam


BBC News - FBI warns of destructive malware use by hackers

BBC News - FBI warns of destructive malware use by hackers

Google’s new security tools to track and protect online life

Google's new security tools to track and protect online life

ANDROID COMMUNITY | NOVEMBER 25, 2014
"With most of us spending our lives online and a lot of that spent on Google- related sites like Gmail, YouTube, etc, it's only right that the tech company should be concerned about security and protecting your online life. That is why they have released two new security tools that will help users, not just IT managers, track their online life and at the same time help keep it secure."
http://androidcommunity.com/googles-new-security-tools-to-track-and-protect-online-life-20141125/?utm_medium=referral&utm_source=shatterdoc.com

On-the-other-hand, securing your stuff should be a concern of yours.


About That Enterprise File-Sharing Study

About That Enterprise File-Sharing Study
TECHCRUNCH | NOVEMBER 28, 2014
"Earlier this week, TechCrunch published commentary on a report concerning the current popularity of various enterprise cloud file sync and share  products, a group of services usually shortened to the acronym 'EFSS.'

Dropbox was far and away the leader, finding a home within nearly 45 percent of responding enterprise IT pros' businesses. Microsoft's OneDrive had over 25 percent penetration, Google Drive had nearly 25 percent and Box had just under 15 percent.

Smaller players — Amazon, Hightail, SAP Docs, Egnyte, and so forth — each had less than 10 percent apiece."

BUT, the real news in this report is that less than 18% of users are actually PAYING for the service. Is it any wonder then that security is less than ideal? No wonder you need a security product like ShatterDOC!
BLOG Team

'Sophisticated' Regin spyware found

'Sophisticated' Regin spyware found
BBC NEWS | NOVEMBER 24, 2014
An "extremely complex" and "stealthy" spying program has been stealing data from ISPs, energy companies, airlines and research-and-development labs, a...

Are YOU unprotected?
Thanks Mark


Lessons from Apple iCloud Data Leak

Lessons from Apple iCloud Data Leak
CLOUD SECURITY ALLIANCE | NOVEMBER 19, 2014
By Paul Skokowski, Chief Marketing Officer, Accellion
"The theft of celebrity photos from Apple iCloud is a stark reminder of the need to think twice before storing data. For many people using a Mac the default behavior is to automatically back up and save data to iCloud. It’s wonderfully appealing and convenient and seamlessly integrates into practically everything you do on the Mac.  In fact it is so easy most people don’t think twice about what they are storing and that is where the problem begins."


Thanks Mark