I have written several items about cell site simulators or Stingrays. Dirtboxes are stingray-like devices hung from an airplane that DoJ agencies use to capture tens of thousands of cell phones as they fly over hundreds of miles. I said early on that it was going to be years before the crap hit the fan, […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
In a somewhat bizarre case, a Goldman Sachs programmer has been convicted for the second time of stealing software that he developed for Goldman (see Wired article). The first conviction was overturned and the second may be nullified by the judge. Sergey Aleynikov was convicted in 2011 on espionage and theft of trade secret charges. […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
LinkedIn has a service called a LinkedIn Reference Search that allows someone to search for people who worked at the same companies that you did at the same time you did. While LI does not give employers direct access to those people who worked with you, they do “recommend” that prospective employers use the LinkedIn […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
McGuire Woods (McGuire Woods Firm Profile) writing this week says that cyber risk due diligence is an important part of the merger and acquisition process. In fact, they say, that failure to address these issues during due diligence could expose both buyers and sellers to a litany of adverse consequences (Cyber due diligence important during […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Ars Technica reported about yet another case where prosecutors dropped charges against 4 suspects who robbed 7 people, including one who needed 18 stitches, rather than disclose information about the use of a Harris Stingray. Or at least that’s what we think. The cops told the press that is was not related to “technology” (preferring […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Everyone talks about “The Internet Of Things” (IoT), whether it is a web accessible security camera or your internet connected refrigerator that tells you when you are low on milk. Recently, a stalker talked to a nanny while she changed the baby’s diaper. We have also seen home routers with vulnerabilities that allow a hacker […]
Continue reading →
[DISPLAY_ACURAX_ICONS]