As the self imposed (by the E.U.) deadline (for coming up with a replacement for Safe harbor) of January 31st looms near, we don’t really know what is going to happen. My guess is not much, but stay tuned. The background is that when the European Court Of Justice struck down Safe Harbor last year, […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
The Examiner reported about 4 health care data breaches on the 20th. See if you can find a common element. Information on 21,000 California Blue Shield customers, including health care info, was compromised when a vendor call center employee was socially engineered, their login information compromised and their customer data stolen. Last week Montana’s New […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
As the folk music group Peter, Paul and Mary wrote in 1962 – about a completely different subject – When Will They Ever Learn? It appears that, for software companies, the answer is a big question mark. First Juniper got caught with a hard coded back door of unknown origins in their routers and firewalls. Then Cisco […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
There is an article in Cyber Security Docket talking about the SEC’s new strategy of issuing subpoenas for electronic storage devices or ESDs. Rather than asking for documents, they are asking for devices. Without getting into a legal argument about whether the Securities Exchange Act of 1934 (almost a century old) contemplated thumb drives or […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
The National Highway Traffic Safety Administration (NHTSA) put on a forum yesterday to discuss cyber security and cars. The conclusion of the author of the article on the subject is that cars will never be secure. I don’t know if I am THAT pessimistic, but it is certainly a difficult problem because of conflicting requirements […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
If you have followed me for any time, you know that I often say that you can pick security or convenience, but not both. Here is another example of that. WiFi Protected Setup was a mechanism created by the manufacturers because users were having too much trouble setting up WiFi connections, which reduces sales. In […]
Continue reading →
[DISPLAY_ACURAX_ICONS]