The Department of Defense is probably the largest software development (and hardware development) organization in world but unlike say Microsoft or Cisco, almost all of the development is performed by third parties – the so called defense industrial base or DIB. It is also likely the number one target of nation state hackers since a […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
There is an article in Slate that suggests that we should treat public computers like we treat public restrooms – very cautiously. I had never made that analogy before, but I do like it. Both public restrooms and public computers may harbor germs and viruses. Both may have been frequented in the recent past by […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
It was reported yesterday that there are undocumented services in iOS that allow someone to bypass all of Apple’s security and encryption features. The researcher did not say that either Apple or the NSA were using these features, but…. The researcher, Jonathan Zdziarski, reported his findings at the HOPE/X conference in New York. According to […]
Continue reading →
[DISPLAY_ACURAX_ICONS]