720-891-1663

Encryption – The Devil Is In The Details – Listen Up Whatsapp and iMessage

Jonathan Zdziarski wrote about an implementation challenge for the security conscious among us.  While Whatsapp does delete the message when you tell it to, it leaves artifacts behind.  Whatsapp and other phone apps use the SQLLite database.  SQLLite, likely to reduce wear in your phone’s memory, doesn’t actually delete the message, but rather just marks […]

Continue reading → [DISPLAY_ACURAX_ICONS]

Data Breach Incident Response: Questions and New Laws

As more and more breaches happen every month, businesses everywhere need to consider what would happen if their company had a breach.  Here is advice from the national law firm of Perkins Coie. Is the breach reportable?  The list of data items which, when compromised, triggers a reportable breach keeps growing.  For example, this year Illinois […]

Continue reading → [DISPLAY_ACURAX_ICONS]

New Vulnerability May Affect Cell Phones, Cell Towers, Routers and Switches

A bug in a software library used in a wide variety of communications products such as cell towers, routers and switches and even the radio chips inside of cell phones was recently announced. The library in questions implements  standard known as ASN.1 and was developed by Objective Systems. While we are all used to, for […]

Continue reading → [DISPLAY_ACURAX_ICONS]