When your Internet connected baby monitor fails you probably whine. You may complain to the manufacturer or the store where you bought it. Or, you may just buy a new one. But if that IoT device is your car, well, that could be a bit more complicated. If you buy a used car and the […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Bloomberg published a brief on the issue of border searches that was written for them by the international law firm of Morrison Foerster on the subject of border searches. Given that lawyers wrote the piece, their concern is about protecting attorney-client confidential information at the border, but the subject applies to everyone. According to Customs […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
The U.S. and Britain announced new restrictions on carry on electronics this week. While this has been considered many times before, it is now being implemented, but only from a limited number of airports and a limited number of airlines. The U.S. and British lists are different – of course. I will only talk about […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
We think of a virtual machine as a way to isolate one system from another and, in general, it works well. But not always. Pwn2Own is a hacking contest that is part of the CanSecWest security conference in Vancouver, BC, Canada. This year researchers who were members of Qihoo 360’s security team figured out a […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
A U.S. citizen of Ethiopian heritage was hacked a few years ago by the Ethiopian government here in the U.S. The victim, who goes by the pseudonym of Mr. Kidane to protect his family here and in Ethiopia, is being represented by the EFF, the Jones Day law firm and the law firm Robins Kaplan. […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Earlier this month I wrote about Stewart International Airport in New York leaving a backup drive exposed to the Internet without a password or encryption, exposing extremely sensitive information (see post here). Now it has been revealed that an unnamed DoD officer, possibly a Lt. Colonel, had a backup drive with thousands of sensitive documents exposed […]
Continue reading →
[DISPLAY_ACURAX_ICONS]