720-891-1663

Former Director Of The NSA Says NO! To Encryption Back Doors

Former NSA director Michael Hayden says that he would not support [FBI] Director [James] Comey’s demands for access, according to a story by Motherboard. This goes against the “wishes” of the current FBi director and head of the NSA.  It is clear to me that if everything is transmitted unencrypted, with weak encryption or with […]

Continue reading → [DISPLAY_ACURAX_ICONS]

OPINION – Why Does Anyone Think PII Can Prove Your Identity?

American Banker ran a piece this morning digesting the Experian breach announced last week.  It said it was good that the breach only compromised 15 million T-Mobile customers instead of the hundreds of millions of customers that probably live in the Experian Decision Analytics service platform and that it only took them two weeks to […]

Continue reading → [DISPLAY_ACURAX_ICONS]

SEC Issues Risk Alert To Advisors and Brokers

Last week the SEC released what they call a Risk Alert to Investment Advisors and Broker-Dealers saying that they were concerned about the protection of client information because of recent attacks and attempted attacks against the financial community. In the alert, they laid out the very particular concerns they have in 6 specific areas and […]

Continue reading → [DISPLAY_ACURAX_ICONS]

Adobe Patchs 23 Flash Flaws – Enough Is Enough

Adobe announced patches yesterday for 23 additional Flash vulnerabilities.  18 of these bugs can be used to run malicious code on the underlying computer. To see what version you are running, go to: WWW.Adobe.com/software/flash/about That web page will give you the version that you are running, the current version that you should be running and […]

Continue reading → [DISPLAY_ACURAX_ICONS]

Follow Up To TSA Master Key Fail

In a classic TSA response, the TSA says that this is no big deal. First, here is what they said in 2003 when they introduced them: TSA official Ken Lauterstein described them as part of the agency’s efforts to develop “practical solutions that contribute toward our goal of providing world-class security and world-class customer service.” Now, […]

Continue reading → [DISPLAY_ACURAX_ICONS]

Why Are Software Development Process Audits Important?

D-Link makes a variety of network equipment, both for home and business users.  They release the software for this equipment, for the most part, as open source software.  This allows techie users to review the code to see if it does anything bad and since the software is useless unless you bought the hardware, there […]

Continue reading → [DISPLAY_ACURAX_ICONS]