LinkedIn has a service called a LinkedIn Reference Search that allows someone to search for people who worked at the same companies that you did at the same time you did. While LI does not give employers direct access to those people who worked with you, they do “recommend” that prospective employers use the LinkedIn […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
McGuire Woods (McGuire Woods Firm Profile) writing this week says that cyber risk due diligence is an important part of the merger and acquisition process. In fact, they say, that failure to address these issues during due diligence could expose both buyers and sellers to a litany of adverse consequences (Cyber due diligence important during […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Researchers at the RSA conference this week disclosed an interesting iOS hack that would allow an attacker to put an iPhone into an endless reboot loop with no way for a user to get out of it. The attacker would need to set up a bogus WiFi hotspot near the target iPhone. This hotspot can […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Ars Technica reported about yet another case where prosecutors dropped charges against 4 suspects who robbed 7 people, including one who needed 18 stitches, rather than disclose information about the use of a Harris Stingray. Or at least that’s what we think. The cops told the press that is was not related to “technology” (preferring […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
For those of you who read the security news, you know that this last 12 months has brought an amazing number of SSL bugs to the surface (see a few of my blog posts here and here and here). Now iPhone and iPad users have their turn to deal with an SSL bug. The bug, […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Two articles in Bloomberg BNA today point to some of the reasons. First, a panel at the ABA Business Law Section spring meeting said that boards have a fiduciary obligation to assure a reasonable information technology reporting system for cybersecurity threats and breaches. They said that this can be an issue for some companies because […]
Continue reading →
[DISPLAY_ACURAX_ICONS]