Skip to content

{ Monthly Archives } September 2013

Tweetsplanation: Paw Prints and the iPhone 5s

Look, a cat’s paw print can unlock an iPhone 5s. The Tweet: Seems silly, right? But there are some practical considerations of why this might be important. First, the technology to identify an individual animal via a paw print could be useful in animal control, in wildlife management. What if you could place these senors […]

Tweetsplanation: The NSA and Crypto

The Tweet: The Explanation: If one starts with the assumption that the NSA wants to actually compromise encryption mechanisms in some technical way, as opposed to legally compromising them, then the secrecy of those mechanisms is key. It’s not *the* key however. As long as there are cryptographically inclined persons who also subscribe to open […]

Pre-nomaly Detection: Generating Change to Identify Non-Conformance

It was recently reported that Belgacom, Belgium’s primary telecom company, discovered a compromise that had been present for years. It reminded me of the Nortel compromise that was discovered a while back. The fact is that we’ve seen an increase in these kinds of discoveries. Details on how exactly the compromise was found are hard […]

BYOD: Bring Your Old Dilemmas

Yay for lists! Here’s a list of four security issues around BYOD besides malware that you should worry about. Let me summarize: 1. Lost and Stolen Phones 2. Insecure Communications 3. Leaving the Walled Garden (uh, this is malware) 4. Vulnerable Development Frameworks Ignoring the fact for the moment that issue number 3 (jailbroken phones […]

Could PRISM Improve Enterprise Security Response?

While we’re all up in arms about the unwarranted data collection that the NSA has been performing, and the potential issues around privacy and legality of the PRISM program, one intrepid reportert stopped to ask the question of how much this is costing the US Taxpayers. “The program was expected to cost $278 million in […]