The Electronic Communications Privacy Act was written 29 years ago. Before Google. Before Facebook. Even before AOL. The rules that ECPA set up were based on how we worked 29 years ago. While there have been many attempts to change ECPA, including the Electronic Communications Privacy Act Amendments Act of 2015 (ECPAA), none, so far, […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
CNet wrote about a man who was arrested at the Halifax (Canada) airport for refusing to hand over the passcode for his cellphone to the Canadian border agents. Even if you are not paranoid, it should make you think about what gadgets you take across the border. Here are some details of this case. He […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
CSO Online wrote an article on how easy it is to compromise the controls that ISPs and domain registrars have put it place. I will describe it in more detail in a minute, but here is the short version: Businesses are much more concerned about keeping customers happy than they are about keeping customers secure. […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Two more insurance companies, Premera Blue Cross and Lifewise, joined the club that no one wants to be a member of and announced that they were both breached (see here and here). Premera said that 11 million records were hacked and Lifewise lost 250,000. Both said the breaches started in May of last year […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
At least according to Peter Singer, Director of the Center for 21st Century Security and Intelligence at the Brookings Institution. Writing in Fortune, Singer says many things that won’t make him very popular. A sampling: 97% of the Fortune 500 companies have been hacked and likely the other 3% too, they just don’t know it. […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
PC World is reporting that researchers, looking for servers that were susceptible to the FREAK attack, found that some manufacturers have taken a shortcut when it comes to security. First, FREAK is an attack that allows attackers to force a encryption session between a user and a server to use a very weak 512 bit […]
Continue reading →
[DISPLAY_ACURAX_ICONS]