The Simple Passphrase Conundrum
…companies who hold the “keys to the castles,” can help by developing technologies that empower us to apply increasingly strong protections while also minimizing the day-to-day hassles of a complicated...
View ArticleOn the iPhone, encryption is essentially free
Apple designed iOS devices so that the hardware that encrypts data is in the path the data travels when it moves from flash storage to the iPhone’s main memory. This means that data can be...
View ArticleA Shark Net for the Insecure
You couldn’t help but read Andrew Auernheimer’s Statement Of Responsibility for his crime of breaking into unsecured API’s on the AT&T website – the iPad Hack – and wonder in what world do we think...
View ArticleThe easiest way to takeover someone’s identity is to go through their paper...
Interesting article from Neerav Bhatt on the different types of information destruction required to keep personal and business identity secure in the 21st CenturyFiled under: Security Tagged: Identity...
View ArticleAlex Stamos Taxonomy of PRISM Possibilities
Following Alex Stamos’ intriguing A Taxonomy of PRISM Possibilities I noted the following path suggested: The PRISM program exists and gathers large amounts of information indiscriminately. The NSA is...
View ArticleA Privacy of iOS Communication
…conversations which take place over iMessage and FaceTime are protected by end-to-end encryption so no one but the sender and receiver can see or read them. Apple cannot decrypt that data. Similarly,...
View ArticleChrome’s insane password security strategy
By using words like ‘confidential information’ and ‘stored in your keychain’, OSX describes the state of your saved password’s current security. It’s the very security Chrome is about to bypass, by...
View ArticleIBM buys Trusteer, gets a lot more than Anti-Virus
What does it say about News Limited’s Business Spectator when they pigeon hole Trusteer as an "anti-virus" company? Some simple journalism, including other sources for the news about IBM’s purchase of...
View ArticleFacebook’s public posting options for teens
Can’t really add much to Danah Boyd’s logical argument: Rather than trying to protect teens from all fears and risks that we can imagine, let’s instead imagine ways of integrating them constructively...
View ArticlePreventing the threat
In his 11 sure signs you’ve been hacked post, Roger Grimes writes Most malicious hacking originates from one of three vectors: unpatched software, running Trojan horse programs, and responding to fake...
View Article