Three years ago, former President Trump tweeted this image along with a denial of the U.S.’ involvement with a launch accident involving Iran’s Safir SLV rocket. Now, this image has been officially declassified so why are Pentagon and intelligence officials so disturbed? Trump’s controversial handling of classified documents is nothing new. When his Mar-a-Lago home… Read More »
Someone brought Trump to Apple’s encryption fight
Another terrorist investigation, another request for encrypted data off a suspect’s phone. This time the requests center around the dead Pensacola shooter’s iPhone possibly containing information about the planning, events and co-conspirators but is that all that’s really going on here? The FBI wants the iPhone unlocked and now so does Trump. Last time Apple… Read More »
Breaking Encryption Also Breaks Society
After months of resistance from tech companies, the Australian government has just made good on their threats to pass anti-encryption legislation. This new legislation not only arms law enforcement agents with more surveillance power but also disarms tech companies in their efforts to provide better privacy and security to their customers. But does it stop… Read More »
Hoarding Vulnerabilities Makes Me ‘WannaCry’
Hoarding is when an individual has difficulty parting with or discarding possessions regardless of their value. But most hoarders eventually have their day of reckoning when their world implodes and their behavior affects not just themselves, but family and friends. Hoarding security vulnerabilities has similar parallels but on a scale affecting potentially billions of innocent users. In a… Read More »
There’s Only 1 Way To Secure Trump’s Phone
There’s Only 1 Way To Secure Trump’s Phone Smartphone security is a fairly binary process these days. Whether you’re sporting an iPhone, Android or even Blackberry or Windows smartphone, any security expert will tell you that none are 100% secure. This might not be an issue for most of us but what about the leader of the… Read More »
Can Pokemon and Security Co-exist?
Can Pokemon and Security Co-exist? Pokemon Go is the digital scavenger hunt we all wanted growing up and now kids and adults alike are experiencing that and getting some exercise as well. So what’s the harm? Like any massively successful online game, Pokemon Go involves millions of players and their data. This is no different… Read More »
Is Hacktivist Disruption Enough For Change?
I recently attended an exclusive roundtable discussion with The Verge for a event hosted by Story, a retail concept store with ever changing themes located in midtown Manhattan. Story re-invents itself about every two months and this time around it’s all about hacking including an interactive exhibit hosted by USA Network’s hit TV show Mr. Robot. The exhibit includes everything from vintage Atari arcade… Read More »
Top Security Features Apple Announced at WWDC
Top Security Features Apple Announced at WWDC Amidst hundreds of new iOS, watchOS, tvOS and macOS features announced, it was the security ones that told Apple’s story best to me. Apple’s narrative as the security and privacy-focused company continues to solidify. In the same way that Google cannot suddenly stop tracking our search and email… Read More »
- 1
- 2
- 3
- 4
- Next Page »