720-891-1663

Hand Over Your Phone If You Are In An Accident!

In the “what could go wrong with this” department, New York lawmakers are considering a piece of legislation that would require drivers who are involved in an accident to submit their phone to roadside testing to determine if they were using their device prior to crashing the vehicle.  License, registration, proof of insurance and phone, […]

Continue reading → [DISPLAY_ACURAX_ICONS]

Federal Government Employees Don’t Trust Agency Cyber Security

I guess it should not come as a big surprise as there are more hacks and breaches, but the degree of lost confidence by federal government employees in the last two years is still staggering. Dell conducted a survey of federal government employees in 2014 and again this year and the numbers are amazing. In […]

Continue reading → [DISPLAY_ACURAX_ICONS]

Researchers Discover Flaws That Allow Eavesdropping Of Cell Calls

Signalling System 7 or SS7 has long known to be vulnerable to hackers.  SS7 is the control system protocol that telephone companies use to route and transfer calls between companies and, in the cellular world, between towers. Since SS7 was designed in the early 1980s, no one was terribly concerned about security.  Hackers – or […]

Continue reading → [DISPLAY_ACURAX_ICONS]

Researchers Crack Short URLs – Find Sensitive Data

I have never been a fan of shortened URLs like http://bity.ly/1cxcx66u , but mostly for security reasons.  If I click on that link, I have no idea what web site I am going to – whether it is malware laced or contains inappropriate content.  Now there is another reason – privacy. Researchers at Cornell Tech, […]

Continue reading → [DISPLAY_ACURAX_ICONS]

Congress Working Hard To Kill American Software and Hardware Business

UPDATE:  This is bill is apparently worse than I thought. The Register says that a petition calling for the bill to be withdrawn has gathered 43,000 signatures in less than 24 hours. Other comments include that the bill is so poorly written that it would outlaw the NSA’s encryption, unless they add a backdoor to […]

Continue reading → [DISPLAY_ACURAX_ICONS]