Category Archives: Uncategorized

Saving Science

  “I believe one of the greatest dangers in modern society is the possible resurgence and expansion of the ideas of thought control; such ideas as Hitler had, and Stalin in his time, or in the Catholic religion in the … Continue reading

Posted in Uncategorized | Leave a comment

Google (Waymo) technology misappropriation claim against Uber

If you are intrigued by technology ‘whodunits’ there is an epic drama unfolding over alleged misappropriation of self-driving vehicle technology. Waymo, the self-driving vehicle unit of Google parent Alphabet, has filed a legal complaint against Uber Technologies for trade secret misappropriation … Continue reading

Posted in Uncategorized | Leave a comment

Ominous Trend in Cyberattacks by Foreign Powers

There has been a dangerous escalation in the impact of cyberattacks over the last several years attributed to foreign state actors and their proxies. Attacks from these actors are termed Advanced Persistent Threats (APTs): highly competent, well funded and organized … Continue reading

Posted in Uncategorized | Leave a comment

Those ‘verification codes’ (for two-factor authentication) sent to your mobile phone via text messaging are vulnerable……….

There are known vulnerabilities in mobile phone networks that enable eavesdropping of voice and SMS (text) communications. What has changed:  NIST issued a DRAFT publication that is now explicitly warning of this vulnerability (NIST Pub 800-63B, Sec. 5.1.3.2. Out of Band Verifiers). Also, … Continue reading

Posted in Uncategorized | Leave a comment

Cyber Risk – where to begin for small & mid-size firms

Visiongain estimates that the 2015 worldwide spend on cybersecurity solutions at $75.4B. Gartnerestimates project that spend to exceed $100B in 2018. Despite the continuing investment there is no evidence that a precipitous drop in the number of cyber incidents, nor … Continue reading

Posted in Cyber Risk, Uncategorized | Leave a comment

Carefully Consider an Apple Music Subscription before signing-up….

Apple’s development of the iTunes & iPod was brilliantly conceived and executed. It remains a classic example of exploiting technology to effect discontinuities in a consumer market that had remained unchanged for decades. It has been a precipitous fall from … Continue reading

Posted in Uncategorized | Leave a comment

Defending against trade secret theft

An excerpt from the Administration Strategy on Mitigating the Theft of U.S. Trade Secrets (Executive Office of the President of the United States, February 2013) states: “foreign competitors of U.S. corporations, some with ties to foreign governments, have increased their … Continue reading

Posted in Uncategorized | Leave a comment