Electronics made in China are often less expensive than products sold by western companies such as Cisco and Juniper. But there may be a cost associated with that price. The Chinese security firm Boyusec is working with the Chinese Ministry of State Security intelligence service in conducting cyber espionage, according to the Pentagon. This would […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Earlier this month the folks at Cisco were sent into a frenzy when Wikileaks disclosed Cisco exploits in their Vault 7 CIA tool data dump. Wikileaks disclosed that the CIA had been hacking Cisco Internet switches for over a year to eavesdrop on users, but didn’t disclose how. Wikileaks and a number of the tech […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Last year the FCC proposed a rule requiring Internet Providers to get your permission before selling your data. The rule was set to go into effect in April. The large ISPs – AT&T, Verizon, Comcast and others – didn’t like this rule since it affected their revenue. They said that Facebook and Google didn’t need […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Security researchers have figured out three different ways to disable Nest Security Cameras (Nest is part of Google). As of a few days ago, Google said they were working on patches and would push them out shortly. But it speaks to the more general problem of wireless security. In the Nest situation, there are three […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Bloomberg published a brief on the issue of border searches that was written for them by the international law firm of Morrison Foerster on the subject of border searches. Given that lawyers wrote the piece, their concern is about protecting attorney-client confidential information at the border, but the subject applies to everyone. According to Customs […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Ransomware, as I have said in past talks and blog posts is really nasty stuff. And it was morphing. First came vanilla ransomware. We encrypt your files, you pay the ransom, we give you the key to decrypt it (usually) and most of the time (but not always) the decryption process works as described. There […]
Continue reading →
[DISPLAY_ACURAX_ICONS]