- Saving Science
- Google (Waymo) technology misappropriation claim against Uber
- Ominous Trend in Cyberattacks by Foreign Powers
- Those ‘verification codes’ (for two-factor authentication) sent to your mobile phone via text messaging are vulnerable……….
- Cyber Risk – where to begin for small & mid-size firms
Author Archives: Don
“I believe one of the greatest dangers in modern society is the possible resurgence and expansion of the ideas of thought control; such ideas as Hitler had, and Stalin in his time, or in the Catholic religion in the … Continue reading
If you are intrigued by technology ‘whodunits’ there is an epic drama unfolding over alleged misappropriation of self-driving vehicle technology. Waymo, the self-driving vehicle unit of Google parent Alphabet, has filed a legal complaint against Uber Technologies for trade secret misappropriation … Continue reading
There has been a dangerous escalation in the impact of cyberattacks over the last several years attributed to foreign state actors and their proxies. Attacks from these actors are termed Advanced Persistent Threats (APTs): highly competent, well funded and organized … Continue reading
Those ‘verification codes’ (for two-factor authentication) sent to your mobile phone via text messaging are vulnerable……….
There are known vulnerabilities in mobile phone networks that enable eavesdropping of voice and SMS (text) communications. What has changed: NIST issued a DRAFT publication that is now explicitly warning of this vulnerability (NIST Pub 800-63B, Sec. 184.108.40.206. Out of Band Verifiers). Also, … Continue reading
Visiongain estimates that the 2015 worldwide spend on cybersecurity solutions at $75.4B. Gartnerestimates project that spend to exceed $100B in 2018. Despite the continuing investment there is no evidence that a precipitous drop in the number of cyber incidents, nor … Continue reading
The European Union Data Protection Directive protects how personal information of EU citizens is collected, used, and retained. It prohibits the transfer of personal information to countries outside the EU that do not have similar standards and policies in place. … Continue reading
For those vested in the integrity of web commerce, there is a must read blog post by Matthew Green, a cryptographer and professor at Johns Hopkins University: http://blog.cryptographyengineering.com/2015/12/on-juniper-backdoor.html If you are too busy, at least read my summary. Juniper Networks recently posted a … Continue reading