Last week there were multiple reports that Petah Tekvah, Israel based Cellebrite could unlock any iPhone up to and including the iPhone X running the most current version of the Apple OS, but you had to send the phone to them along with a check for $1,500, per phone. This week there is a report […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
I am always skeptical about these lawsuits. One issue is usually “standing”, but in this case, I don’t think this will be an issue. Often, if the party being sued thinks they are going to lose, they tend to settle, quietly, with no precedent from a court decision. In this case, I predict this one […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
The twins bugs of Meltdown and Spectre are a once in a career event for security pros. Most bugs are found quickly – these have been around for 20+ years. Most bugs affect one hardware platform like Intel or AMD or are not related to any specific hardware device. Spectre affects every modern computing processor […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Tech Crunch is reporting that Intel told customers about the Meltdown and Spectre flaws before the public announcement, but they did not tell the U.S. Government about it. Most of the time, it is the other way around. The U.S. Government knows about a flaw but doesn’t tell the company who can do something about […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
UPDATE: Google’s Project Zero released information about the flaw and attacks as reports and speculation escalated (see here). Reporters, including this one, are just learning the details of this. An FAQ about the attack, which says that it affects Intel, AMD and ARM processors is available here. It does, they say, affect every microprocessor […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
In what is an unusual move by the FBI and DHS, CERT released a security bulletin saying that attackers were going after government entities and critical infrastructure and had been doing so at least since May. They said this is a multi-stage attack, going after low security and small networks and then moving inside those […]
Continue reading →
[DISPLAY_ACURAX_ICONS]