- Saving Science
- Google (Waymo) technology misappropriation claim against Uber
- Ominous Trend in Cyberattacks by Foreign Powers
- Those ‘verification codes’ (for two-factor authentication) sent to your mobile phone via text messaging are vulnerable……….
- Cyber Risk – where to begin for small & mid-size firms
Category Archives: Uncategorized
“I believe one of the greatest dangers in modern society is the possible resurgence and expansion of the ideas of thought control; such ideas as Hitler had, and Stalin in his time, or in the Catholic religion in the … Continue reading
If you are intrigued by technology ‘whodunits’ there is an epic drama unfolding over alleged misappropriation of self-driving vehicle technology. Waymo, the self-driving vehicle unit of Google parent Alphabet, has filed a legal complaint against Uber Technologies for trade secret misappropriation … Continue reading
There has been a dangerous escalation in the impact of cyberattacks over the last several years attributed to foreign state actors and their proxies. Attacks from these actors are termed Advanced Persistent Threats (APTs): highly competent, well funded and organized … Continue reading
Those ‘verification codes’ (for two-factor authentication) sent to your mobile phone via text messaging are vulnerable……….
There are known vulnerabilities in mobile phone networks that enable eavesdropping of voice and SMS (text) communications. What has changed: NIST issued a DRAFT publication that is now explicitly warning of this vulnerability (NIST Pub 800-63B, Sec. 188.8.131.52. Out of Band Verifiers). Also, … Continue reading
Visiongain estimates that the 2015 worldwide spend on cybersecurity solutions at $75.4B. Gartnerestimates project that spend to exceed $100B in 2018. Despite the continuing investment there is no evidence that a precipitous drop in the number of cyber incidents, nor … Continue reading
Apple’s development of the iTunes & iPod was brilliantly conceived and executed. It remains a classic example of exploiting technology to effect discontinuities in a consumer market that had remained unchanged for decades. It has been a precipitous fall from … Continue reading
An excerpt from the Administration Strategy on Mitigating the Theft of U.S. Trade Secrets (Executive Office of the President of the United States, February 2013) states: “foreign competitors of U.S. corporations, some with ties to foreign governments, have increased their … Continue reading