Anyone remember the CONE OF SILENCE from the old TV series “Get Smart”? Here is a picture to remind you. The idea was that no one can eavesdrop on conversations inside the cone of silence. Today, with Amazon Echos and similar devices everywhere, some people would like to bring back the cone of silence. Ben […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Note: If you didn’t know that I am against crypto backdoors before, let me just tell you up front, because that fact will be clear by the end. The world works in the most mysterious ways. The FBI has been trying to get phone makers (Apple especially) to install crypto backdoors into iPhones for them […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Feds Say 4 Chinese Hackers Took Down Equifax The Department of Justice indicted 4 members of the Chinese People Liberation Army, saying that they were responsible for detecting the fact that Equifax did not patch their some of their servers and thus were easily hackable. This, of course, means that the hack did not require […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
In one case, the answer is probably. If I want to delete one of my blog posts, I can probably do that. But not if someone copied it. Which I can’t control. Then they can upload it again. I can send a DCMA take-down notice to the hosting provider, which they might ignore if they […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
While this should not come as much of a surprise, it is interesting none the less. The Edison email app, one of the top 100 productivity apps on the Apple app store, scrapes user’s email inboxes and sells the data. This information came from a confidential J.P. Morgan presentation to investors who use the data […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
While I have reported about software supply chain attacks in the past, they have all been one-off and in some cases highly targeted attacks. The FBI has issued a warning about ongoing, large scale, software supply chain attacks. The attackers are using the Kwampirs malware to install a Remote Access Trojan or RAT. The FBI […]
Continue reading →
[DISPLAY_ACURAX_ICONS]