Waiting four years to tell your customers and the authorities that your company has suffered a security breach isn’t just sloppy, it seems downright irresponsible to me.
It should have shared the bad news much earlier, and not tried to hide it away four years later on a webpage that few of its customers will ever visit.
Find out more in my article on the Optimal Security blog.
It’s as though you have logged into your computer, and allowed a complete stranger to push you out of your chair and start typing commands on your PC.
Find out more in my article on the Tripwire State of Security blog.
Are you worried about someone looking over your shoulder, reading what is on your screen?
I may have found you the answer. Watch this video, and tell me it isn’t the coolest thing you’ve seen all day.
It is becoming increasingly common to find yourself typing a WiFI password not just into your smartphone, but also your smoke alarm, your fridge, your printer, your baby monitor and maybe even your car. However, are the manufacturers of these internet-enabled devices paying proper care and attention to security and privacy?
Find out more in my article on the Lumension Optimal Security blog.
It looks like Russia is looking for a way to crack down on those who try to hide their activities from law enforcement agencies and government censors.
Read more in my article on the Hot for Security blog.
Shouldn’t Facebook be doing more to secure its Android app for Instagram users?
Read more in my article for the Tripwire State of Security blog.
If intelligence and law enforcement agencies have a genuine need to spy upon some communications then it should not be via a backdoor that could put millions of innocent, law-abiding users at risk.
Read more in my article on the We Live Security blog.
A data forensics expert and jailbreaker has discovered what he claims to be a undocumented “backdoor” in the iOS operating system used on iPhones and iPads that could be exploited by the NSA and other law enforcement agencies.
Read more in my article on the Intego Mac Security blog.
Hackers connected to Hamas claimed responsibility for an attack which interrupted regular programming for some satellite TV viewers in Israeli.
Find out more in this article on the Hot for Security blog.
Google has announced that it is assembling a crack team of researchers, devoted to finding and reporting security holes in widely used software.
Read more in my article on Lumension’s Optimal Security blog.