Revisiting History Sniffing
As some of our readers are well aware, last year many leading browsers finally closed a major privacy hole involving browser history that has been around for more than ten years. Essentially, would-be...
View ArticleHow *not* to secure your mobile phone.
The following events are based on actual facts and actual events. Names have been changed to protect the oblivious. I would like to start off by stating that I take no pity on the individual this story...
View ArticleThese aren’t new ideas
Suppose you want to send a letter to your brother. And let’s suppose it’s got some, oh, maybe potentially embarrassing financial information – he owes you some money and you’re having trouble paying...
View ArticleToo little security, too much security
I’ve had some interesting experiences with two companies recently that I’d like to share. We all do business with companies online: we buy from them, we schedule appointments, we put in support...
View ArticleCertified Social Media Hacker - What happens when your reputation comes under...
Recently, an article came to my attention about social networks being gamed in order to hurt the reputations of competitors and enemies. With all the talk these days of search engine optimization,...
View ArticleHealthcare Industry Under Siege - Increasingly sophisticated cyberattacks are...
photo credit: lydia_shiningbrightly via photopin cc Much of the focus in recent news is on attacks on retailers and the financial industry. It is easy to see the results of these money-motivated...
View Article
More Pages to Explore .....