|“Turning hijacked computers into cash is still hard work for most computer criminals. They’ve got to trick the infected PC into sending spam, then trick a recipient into buying a useless product — or they have to steal online banking passwords, log onto a victim’s account, bypass the bank’s money transfer fraud controls and so on. It’s much easier to just demand cash directly from infected users — a crime that’s the Internet’s equivalent of kidnapping.”
Bob Sullivan, Give me your money, or your computer gets it
Today’s WhatIs.com Word of the Day is ransomware.
|Meaningful use is more than just the incentives or even the information technology… meaningful use is all about how you’re practicing medicine.
Joseph Fortuna, Providers consider how to overcome EHR meaningful use obstacles
Today’s WhatIs.com Word of the Day is meaningful use.
|Remember the days when you would ‘shake it like a Polaroid picture?’ Dell has introduced a new player in the inkless printer world, a pocket printer called the Dell Wasabi. Any device with PictBridge capability can be used to print out full color prints.
Sarah Meyer, Dell Wasabi review
Today’s WhatIs.com Word of the Day is PictBridge.
|Zeus is the biggest banking Trojan out there. It’s the nastiest, most sophisticated Trojan I’ve ever seen. It’s a money-stealing machine.
Laura Mather, Zeus Trojan hitting banking customers hard
Today’s WhatIs.com Word of the Day is Zeus Trojan toolkit.
|For every single human being punching phone numbers or surfing the net on the T-Mobile network, there could be four machines chirping away quietly, embedded in utility meters, cars, freight containers, medical equipment, wristwatches and even the oversized flashlights carried by cops.
Kevin Fitchard, T-Mobile: M2M connections to outnumber humans 4-to-1
Today’s WhatIs.com Word of the Day is machine-to-machine (M2M).
|In my opinion, it is not necessary to encrypt workstation hard drives, so long as your organization is not subject to any regulations requiring such encryption, no data is deliberately stored on the workstation hard drives and the organization has adequate physical security.|
Today’s WhatIs.com Word of the Day is full disk encryption.
|The idea is to keep all the business rules in one repository, written in a way that business users can quickly grasp and edit as needs change. In this way, business rules act as a coordinating force between process models and data models.|
Today’s WhatIs.com Word of the Day is business rules engine.
|“The Blue Gene supercomputers are an outstanding example of our investment in nuclear security providing the tools to tackle broader national challenges. This machine, which was originally developed to ensure the safety and reliability of our nuclear stockpile without testing, has led to amazing advances in science and discovery.”
NNSA Administrator Thomas D’Agostino, Blue Gene Named Medal of Technology and Innovation Award Winner
Today’s WhatIs.com Word of the Day is Blue Gene.
President Obama recognized IBM and its Blue Gene family of supercomputers with the National Medal of Technology and Innovation, the country’s most prestigious award given to leading innovators for technological achievement…
…Blue Gene systems have helped map the human genome, investigated medical therapies, safeguarded nuclear arsenals, simulated radioactive decay, replicated brain power, flown airplanes, pinpointed tumors, predicted climate trends, and identified fossil fuels – all without the time and money that would have been required to physically complete these tasks.
|“Stop saying cloud, because that doesn’t help. Talk about what you really want. From there, the security needs can be work out.”
Archie Reed, RSA: Cutting Through the Cloud Security Talk
I love this man. He is soooooo right.
|“The attacks to steal credit cards are significant, but the real threat is to intellectual property.”
David Burg, Companies urged to share data breach information
Today’s WhatIs.com Word of the Day is data breach.