IoT is all about sharing data and is getting a lot of attention lately from every consumer electronics manufacturer, but it is also being scrutinized for security concerns. In order for IoT to succeed as a widely adopted standard, it must comply with 3 different market barriers: price, compatibility and security. Since price and compatibility are decisions… Read More »
Drone Hacking Taken To New Heights
Hacking Over the Internet, Wirelessly, and From the AirHacking is achieved in many forms. One might think of hackers breaking into computer networks remotely over the internet to shut down critical infrastructure. This has been proven out with the Stuxnet hacking of Iran’s nuclear reactor where it suffered a major blow when the U.S. and Israel… Read More »
FBI Bobbing for Apple Customer Privacy
The other night, I was asked to give my brief comments on NBC regarding this security encryption legal fiasco that has pitted Apple against the FBI. I was only given a few seconds to comment so I wanted to elaborate more on some details here. Since this story is about technical security and privacy as much as… Read More »
IoT Hackers Are Just High-Tech Cat Burglars
Keeping our families and homes safe is essential in this uncertain world we live in. I often find myself double checking my deadbolt, alarm, and lights before I leave home. Yes, I am one of those paranoid home owners that put the alarm stickers on every window, and of course, I make sure no newspapers… Read More »
Mobile Advertisers’ Supercookies Invade Your Holiday Shopping
Cookies make web browsing convenient by saving our user names and passwords as well as other unique identifiers about us from one web session to the next. Cookies are also a treat for marketers as they uniquely identify visitors and when combined with web traffic logs, provide advertisers your focused browsing habits and specific buying… Read More »
Taking Steps to Beat the Ticking Identity Theft Clock
Identity theft occurs when a cyber criminal compromises private data such as your social security number, credit card, or even your name without your permission and uses it to commit fraud. It always begins with a data security breach of some kind but can end in ruin for your credit score, bank account, healthcare, and… Read More »
Law Enforcement Must “Immediately Destroy” Collateral Data Collected
Privacy advocates recently won a victory against the unrestricted use of “stingray” cell-site emulators. On November 9th, Illinois judge Iain D. Johnston ruled law enforcement agencies must take steps to minimize the impact on innocent bystanders caught up in the stingray surveillance dragnet and that law enforcement must “immediately destroy” collateral data collected. So how is… Read More »
Why Are So Many Prison Calls Being Recorded and Stored?
On November 11th an anonymous hacker leaked records of more than 70 million calls stolen from Securus Technologies. Securus provides phone service to land line phones in jails and prisons across the country, covering 1.2 million inmates. The Intercept examined 37 gigabytes of leaked data and found it consisted of databases that included the prisoners’… Read More »
- « Previous Page
- 1
- …
- 10
- 11
- 12
- 13
- 14
- …
- 22
- Next Page »