Data Breaches: Someone Else’s Problem

INT. SECURE VAULT — NIGHT An impenetrable vault.  Walls 3 feet thick.  Smoke reveals laser motion sensors and heat sensors.  A biometric iris scanner restricts access.  Television monitors show every angle of the room.  Dozens of heavily armed GUARDS await the alarm that will spring them into action.  Our HERO has to break in.  His…

Details

iWatch Out

Sometimes a technology comes out that is so radical, so new, so innovative that it transforms society, disrupts business processes, and creates new industries in ways we can hardly have imagined. Tuesday, September 9, 2014, with the announcement of the new Apple iPhone and iWatch will not be one of those days. Or will it?…

Details

A Few Quick (Legal) Lessons From The iCloud Nude (Very Attractive) Celebrity Hack

So a bunch of (very attractive) female celebrities’ iCloud accounts were reportedly hacked, and naked pictures of these (very attractive) celebrities were stolen from their accounts. The hackers then either apparently sold pictures of these (very attractive) celebrities, or merely posted pictures of these (very attractive) celebrities online.  A bunch of social, security, and ultimately…

Details

“Bad Theater” – Is Security Just a Perception Game

I recently read an article in Wired about problems with a particular airport security body scanner. Apparently, semi-clever attackers can conceal guns, knives and explosives in a way that makes them virtually undetected by the now-discussed Rapiscan detector previously deployed at thousands of airports, and currently deployed at courthouses and other places near you. That…

Details

Google is Turning Your Emails Over to the Feds

How would you feel if your email provider were routinely reading your e-mails, looking for illegal content, and then turning over the contents of your e-mail to law enforcement agencies anywhere in the world? Well, guess what. They are. Right now, though only to a somewhat limited extent, but enough so that the U.S. government…

Details