The limits of encryption
The latest WikiLeaks revelations included a reminder that there are revealing things that just can’t be encrypted.
The latest WikiLeaks revelations included a reminder that there are revealing things that just can’t be encrypted.
The sphere of privacy continues to shrink.
The threats posed by IoT devices are real and have to be addressed with structural changes.
Your efforts at raising security awareness could be making users feel that it’s pointless to try to protect themselves.
New reports last week highlighted some novel ways for information to get into the wrong hands.
A centralized approach that governs how apps interact and what they are allowed to do is essential.
Seeing all your Google activity in one place can be eye-opening, and having the ability to delete any of it carries some far-reaching implications.
Eroding trust is a lot easier than restoring it.
What is hard to understand is why LinkedIn didn’t feel the need to force password changes until four years after the breach.
The decision from a case involving a company’s method of presenting its terms and conditions is otherwise fairly meaningless.
Restrictions are abhorrent and a draft bill in the Senate is overly broad and ambiguous. But if Congress insists on restrictions, let's add some critical limits.
There are many reasons not to pay ransom to regain access to your data. Let’s opt for the selfish one.
Cyberthieves prey on human nature for even more profit.
As the encryption argument takes center stage in the ongoing Apple vs. the U.S. Government squabbles, a very important—and potentially destructive—change is taking place in security strategy.
And there’s no way the negotiators didn’t know that.