ITsecurity
twitter facebook rss

Privacy Shield, and the FBI Vs Apple

Posted by Kevin on March 9, 2016

Why does the European Commission continue to insist that Privacy Shield will protect European data from unauthorized US government access when anyone with half a brain cell knows it won’t? Here’s an example, somewhat abstracted from a report in Bloomberg. The FBI (you might possibly have already heard about this) is demanding that Apple develop […]

Apple Vs FBI: a rather cynical PR exercise

Posted by Kevin on March 2, 2016

A court has ordered Apple to unlock the iPhone used by the San Bernadino terrorist, Syed Rizwan Farook. Apple has so far declined to do this, and is appealing the decision – an appeal it seems willing to take all the way to the Supreme Court. The media has responded: this is Apple Vs FBI. […]

San Bernardino: what does the security industry think?

Posted by David Harley on February 19, 2016

David Harley photo

While Apple’s head is above the parapet over the San Bernardino forensic issue, the security industry (mostly) offers subdued support.

Applesauce, The Apple FBI Backdoor

Posted by Martin Zinaich on February 19, 2016

The Apple FBI Backdoor While the FBI has been after Apple to create a backdoor to iOS, this recent episode stems from the December attacked of Syed Rizwan Farook who killed 14. Farook had expressed support for the Islamic State on a Facebook page and there are still many questions about whom the shooter might […]

Apple stands to defend customer’s Privacy

Posted by Tara Taubman-Bassirian on February 18, 2016

Apple is defending the customer’s right to Privacy against the FBI’s Security arguments. On Tuesday, a judge in California ordered Apple to help the FBI break into the phone of San Bernardino shooter Syed Farook. The FBI claims, based on the All Writs Judiciary Act of 1789,  to have the right to force Apple to write a software […]

Targeted phishing: the $17m sting

Posted by David Harley on February 9, 2015

A very effective piece of social engineering as targeted phishing has been reported by Omaha.com. Over a few days in 2014, it seems that the corporate controller at commodities trader Scoular transferred three large payments adding up to $17.2 million to Shanghai Pudong Development Bank, to be held on behalf of a company called Dadi Co. Ltd. Keith McMurtry […]

Comey says ‘Do as I say, not as I do’

Posted by Kevin on January 16, 2015

“Your decision to grant anonymity to a spokesperson for Al Qaeda in the Arabian Peninsula so he could clarify the role of his group in assassinating innocents, including a wounded police officer, and distinguish it from the assassination of other innocents in Paris in the name of another group of terrorists, is both mystifying and […]

Has the Tor takedown begun?

Posted by Kevin on December 22, 2014

Three days ago the TOR Project blog warned, The Tor Project has learned that there may be an attempt to incapacitate our network in the next few days through the seizure of specialized servers in the network called directory authorities. Possible upcoming attempts to disable the Tor network There has been some suggestion that this […]

Does the Sony hack provide a clue on how governments keep their own malware off the radar?

Posted by Kevin on December 4, 2014

On Tuesday, Reuters published an exclusive report on a new FBI alert about destructive malware. The Reuters report was low on facts but high on conjecture (much of which is quite possibly true). Have you wondered, however, why a report on a document that the reporter has seen should be so low on facts? [It […]

ITsecurity Daily News: 10/16/2014

Posted by Kevin on October 16, 2014

The ITsecurity daily security briefing: Thursday, October 16, 2014. If you find this security briefing useful, please spread the word via social media. If you have any comments or recommendations, please email kevtownsend at gmail dot com. NEWS ONLY TODAY News Papers/Reports WebThings Events M&A Alerts News New York Times nytimes.com Page Design XSS Vulnerability […]