Railway Disasters And Their Distracted Operators The February rail crash in Bavaria killing 11 was not an isolated incident. In fact, railway accidents are on the rise for several reasons. Some blame old railways and loose spikes for derailments. Others will point to antiquated safety signaling systems or lack of Positive Train Control (PTC). But the… Read More »
Feds Want Front and Backdoors To Encryption In Every iPhone
When FBI director was first asked if he had any intentions to force Apple to unlock more than the single iPhone 5C in question, he answered “unlikely to be a trailblazer” for setting a precedent for other cases. But a week later when asked before a congressional panel under oath, he said the judgement on this single iPhone would… Read More »
Encryption is Perfect But iPhone Security is Not
I’m not writing this for the benefit of any criminals or would-be terrorists out there. There are many more law abiding citizens that value their 4th amendment and Bill of Rights right to privacy out there than there are spies, terrorists and criminals looking to exploit security flaws. Now that that disclaimer is out of the way,… Read More »
FBI Bobbing for Apple Customer Privacy
The other night, I was asked to give my brief comments on NBC regarding this security encryption legal fiasco that has pitted Apple against the FBI. I was only given a few seconds to comment so I wanted to elaborate more on some details here. Since this story is about technical security and privacy as much as… Read More »
IoT Hackers Are Just High-Tech Cat Burglars
Keeping our families and homes safe is essential in this uncertain world we live in. I often find myself double checking my deadbolt, alarm, and lights before I leave home. Yes, I am one of those paranoid home owners that put the alarm stickers on every window, and of course, I make sure no newspapers… Read More »
Mobile Advertisers’ Supercookies Invade Your Holiday Shopping
Cookies make web browsing convenient by saving our user names and passwords as well as other unique identifiers about us from one web session to the next. Cookies are also a treat for marketers as they uniquely identify visitors and when combined with web traffic logs, provide advertisers your focused browsing habits and specific buying… Read More »
Law Enforcement Must “Immediately Destroy” Collateral Data Collected
Privacy advocates recently won a victory against the unrestricted use of “stingray” cell-site emulators. On November 9th, Illinois judge Iain D. Johnston ruled law enforcement agencies must take steps to minimize the impact on innocent bystanders caught up in the stingray surveillance dragnet and that law enforcement must “immediately destroy” collateral data collected. So how is… Read More »
What’s The Best Way To Steal Credit Info? Hack A Credit Processing Company Like Experian
On October 1st T-Mobile released a statement revealing approximately 15 million existing and potential customers had their personal identification data stolen. The hack was not against T-Mobile itself but against Experian, the company that runs credit verification for postpaid accounts for T-Mobile. What Was Stolen? According to T-Mobile, anyone who submitted a credit application between… Read More »
- « Previous Page
- 1
- 2
- 3
- 4
- …
- 6
- Next Page »