Articles

Internet Service Providers and Your Privacy

Last year, a heated national debate came to a satisfactory end when the Federal Communications Commission reinstated net neutrality rules without destroying the Internet.  When the rule was overturned the year before, one of the ways the agency could impose it again, according to the court, was to make net neutrality less like common-carrier regulations,… Read More

That’s Not Dell Calling

There’s some sort of shadiness going on over at Dell.  Several users in recent weeks have reported being contacted by people claiming to be Dell technicians, who say they have found a problem with the customer’s computer and offer to fix it.  Ordinarily, the best response to this is just to hang up the phone. … Read More

U.S. counter ‘intelligence’ on backdoor encryption

Teen hacker is at it again.  If you recall, back in October, the email account of indignant CIA director John Brennan was infiltrated.  The culprit claimed to be a high school student (or several), and, merely posing as a Verizon technician, he was able to gain access to Brennan’s personal information, and take control of… Read More

Data Security 2015 – Year in Review

Not everyone goes for the whole New Year’s Resolution thing, but in lieu of springing for a new gym membership, organizations worldwide might want to consider making a concerted effort in 2016 to improve their IT security practices.  The divide between what affects only data and what affects the physical world has been blurring in… Read More

Retailers put profits ahead of security

When Target experienced its major data breach during the holiday 2013 season, it suffered extensive financial and reputational damage.  Having firsthand experience like this tends to put things in perspective, which makes it unsurprising that, out of 48 major retailers surveyed by Consumer World, Target is one of the only 11 who have ubiquitously enabled… Read More

A short time from now, on a server not so far away…

If you join the Rebel Alliance, you will, at some point, probably be shot at by Stormtroopers.  Now, as is the case with the approximately 19.6 billion threats that Cisco blocks each day, most of these attacks will likely miss, but the ones that hit their target will hurt.  Likewise, if a company collects data… Read More

Washington’s Encryption Debate

Many of the headlines recently have centered on the VTech breach, and the ongoing investigation into the intrusion that revealed information on more than 5 million accounts, including disturbingly personal data on thousands of kids.  So perhaps a little under the radar might slip the new White House request, in response to a petition that… Read More

Passing the Data Security Act

When you have a Senate that in one fell swoop votes both to defund a women’s health clinic, and to allow terrorists of all walks of life to continue to murder American citizens with minimal obstruction, it’s nice to see a politician do something that’s actually in the interests of the people he represents.  Cyber… Read More

VTech’s Security Negligence

As it turns out, when I was a little ankle-biter, I had a sort of talking toy phone.  You know, the kind a kid can pretend to make a call on, and have some garbled, digital ‘90s voice answer back.  Not that I had any idea at the time, a couple of decades ago, but… Read More

Encryption Under Siege?

As so often happens, tragedy leads to the five stages of grief, and it’s a natural element of the ‘anger’ phase to find a scapegoat for all those seething emotions.  Especially now, since those responsible for last week’s Paris attacks, the fecal stains of humanity, have reportedly been given the quick deaths that were far… Read More

Top