Your Phone, Now with More NSA
From the Intercept: With these stolen encryption keys, intelligence agencies can monitor mobile communications without seeking or receiving approval from telecom companies and foreign governments. Possessing the keys also sidesteps the need to get a warrant or a wiretap, while leaving no trace on the wireless provider’s network that the communications were intercepted. Apparently no […]
Lenovo Computers Have Been Compromised by Crapware
Know why PCs are usually cheaper than Macs? For one thing, because they come loaded with crapware that makes the offsets the PC manufacturer’s costs. Sometimes, that just makes your computer run slower. Sometimes, it exposes you to all manner of malicious intrusion. If you have a Lenovo computer, here are Lenovo’s instructions for removing […]
Lawyer Ignores Numerous Red Flags, Loses $289K to Phishers
The bank, if you want to know, declined to cover the loss.
Has the NSA Hacked Your Hard Drive? (Probably)
"[T]he program would give the NSA unprecedented access to the world's computers, even when disconnected from the larger web."
“Secure” Sites Are Actually Less Secure
Not only should you ignore security seals, but you might want to hesitate before doing business with websites that use them.
Keep Your Data Safe While Skyping, Chatting, and Using Your Smartphone
We now use our smartphones not only to make phone calls but to email, surf the web, and store data. Keeping that data safe is just as important as keeping the data on your desktop safe.
How to Improve Your Passwords
In this TED talk, Lorrie Faith Cranor, a researcher at Carnegie Mellon University, breaks down the common mistakes that users make with passwords.
Doing Our Small Part to Secure the Web
As of yesterday, we made a small but significant change to Lawyerist.com by securing the site with SSL.
Social Engineering May Be a Greater Threat to Client Files Than “Hackers”
After reading super-hacker Kevin Mitnick‘s book, Ghost in the Wires, about his escapades leading up to his imprisonment for hacking, what struck me was how much of his “hacking” was really social engineering. Quite often, Mitnick just called someone on the phone and asked them for what he needed, up to and including root account […]
Facebook Goes on the Offense on Passwords
It's pretty awesome that Facebook is doing this, and I hope more companies will follow suit.
Q: Doesn’t My Password Protect My Computer?
A: No. There are basically two “doors” to your computer. Your password only protects one.
Dropbox Wasn’t Hacked, but You Should Probably Change Your Password
Dropbox says the login information being passed around are actually from other services for which the users used the same usernames and passwords.
The Government Can Still Get Plenty of Information from Apple
As I pointed out last week, the new iOS security features are great, but they are hardly a panacea.
How the Government Might Circumvent iOS 8 Security
Orin Kerr points out that the government might not be willing to accept a scenario where Apple cannot respond to government warrants.
Apple: “it’s not technically feasible for us to respond to government warrants”
Starting with iOS 8, according to Apple’s newly-updated privacy statement your photos, messages and attachments, email, contacts, call history, iTunes content, notes, and reminders are “placed under the protection of your passcode.”