security

Your Phone, Now with More NSA

From the Intercept: With these stolen encryption keys, intelligence agencies can monitor mobile communications without seeking or receiving approval from telecom companies and foreign governments. Possessing the keys also sidesteps the need to get a warrant or a wiretap, while leaving no trace on the wireless provider’s network that the communications were intercepted. Apparently no […]

Lenovo Computers Have Been Compromised by Crapware

Know why PCs are usually cheaper than Macs? For one thing, because they come loaded with crapware that makes the offsets the PC manufacturer’s costs. Sometimes, that just makes your computer run slower. Sometimes, it exposes you to all manner of malicious intrusion. If you have a Lenovo computer, here are Lenovo’s instructions for removing […]

Lawyer Ignores Numerous Red Flags, Loses $289K to Phishers

The bank, if you want to know, declined to cover the loss.

59283574

Has the NSA Hacked Your Hard Drive? (Probably)

"[T]he program would give the NSA unprecedented access to the world's computers, even when disconnected from the larger web."

secure-shopping-badge

“Secure” Sites Are Actually Less Secure

Not only should you ignore security seals, but you might want to hesitate before doing business with websites that use them.

shutterstock_221931859

Keep Your Data Safe While Skyping, Chatting, and Using Your Smartphone

We now use our smartphones not only to make phone calls but to email, surf the web, and store data. Keeping that data safe is just as important as keeping the data on your desktop safe.

password-symbols

How to Improve Your Passwords

In this TED talk, Lorrie Faith Cranor, a researcher at Carnegie Mellon University, breaks down the common mistakes that users make with passwords.

lawyerist-https

Doing Our Small Part to Secure the Web

As of yesterday, we made a small but significant change to Lawyerist.com by securing the site with SSL.

shutterstock_123618874

Social Engineering May Be a Greater Threat to Client Files Than “Hackers”

After reading super-hacker Kevin Mitnick‘s book, Ghost in the Wires, about his escapades leading up to his imprisonment for hacking, what struck me was how much of his “hacking” was really social engineering. Quite often, Mitnick just called someone on the phone and asked them for what he needed, up to and including root account […]

Facebook_icon_2013

Facebook Goes on the Offense on Passwords

It's pretty awesome that Facebook is doing this, and I hope more companies will follow suit.

hippies-back-door

Q: Doesn’t My Password Protect My Computer?

A: No. There are basically two “doors” to your computer. Your password only protects one.

dropbox-logo

Dropbox Wasn’t Hacked, but You Should Probably Change Your Password

Dropbox says the login information being passed around are actually from other services for which the users used the same usernames and passwords.

shutterstock_126802760

The Government Can Still Get Plenty of Information from Apple

As I pointed out last week, the new iOS security features are great, but they are hardly a panacea.

shutterstock_124103410

How the Government Might Circumvent iOS 8 Security

Orin Kerr points out that the government might not be willing to accept a scenario where Apple cannot respond to government warrants.

shutterstock_197941145

Apple: “it’s not technically feasible for us to respond to government warrants”

Starting with iOS 8, according to Apple’s newly-updated privacy statement your photos, messages and attachments, email, contacts, call history, iTunes content, notes, and reminders are “placed under the protection of your passcode.”