Google’s Big Encryption Gamble Of the many recent Google I/O announcements made, a few stood out to this cybersecurity expert. Google announced a new video chat app, a messaging app, and smart home appliance called Duo, Allo and Google Home respectively. All these products are due out this summer and promise to deliver outstanding AI-based… Read More »
Apple’s iPhone Encryption Security Battle is Canary in IoT Coal Mine
Are we doomed to repeat the mistakes of the past? With a little luck, we are. I know that sounds rather pessimistic but in light of the current FBI and Apple battle over encryption security, we are standing at a familiar crossroads. Last time, the U.S. avoided widespread security failure was the ill-proposed Clipper Chip… Read More »
In IoT, More Things = Less Security
With the incremental efficiencies we gain with each new technology, there is also incremental potential for hackers to exploit the newfound vulnerabilities introduced. Fortunately, as the Internet of Things (IoT) advances, so does the knowledge of the many vulnerabilities discovered – many of which are hopefully remedied before they make hacking headlines. So what IoT… Read More »
Feds Want Front and Backdoors To Encryption In Every iPhone
When FBI director was first asked if he had any intentions to force Apple to unlock more than the single iPhone 5C in question, he answered “unlikely to be a trailblazer” for setting a precedent for other cases. But a week later when asked before a congressional panel under oath, he said the judgement on this single iPhone would… Read More »
Encryption is Perfect But iPhone Security is Not
I’m not writing this for the benefit of any criminals or would-be terrorists out there. There are many more law abiding citizens that value their 4th amendment and Bill of Rights right to privacy out there than there are spies, terrorists and criminals looking to exploit security flaws. Now that that disclaimer is out of the way,… Read More »
Drone Hacking Taken To New Heights
Hacking Over the Internet, Wirelessly, and From the AirHacking is achieved in many forms. One might think of hackers breaking into computer networks remotely over the internet to shut down critical infrastructure. This has been proven out with the Stuxnet hacking of Iran’s nuclear reactor where it suffered a major blow when the U.S. and Israel… Read More »
FBI Bobbing for Apple Customer Privacy
The other night, I was asked to give my brief comments on NBC regarding this security encryption legal fiasco that has pitted Apple against the FBI. I was only given a few seconds to comment so I wanted to elaborate more on some details here. Since this story is about technical security and privacy as much as… Read More »
- « Previous Page
- 1
- 2
- 3
- 4
- 5
- …
- 7
- Next Page »