Loading

Securing Tiffany’s Move

Story of how Tiffany & Company moved all of its inventory from one store to another. Short summary: careful auditing and a lot of police.Read more: schneier.com

Critical Windows Vulnerability Discovered by NSA

Yesterday's Microsoft Windows patches included a fix for a critical vulnerability in the system's crypto library. A spoofing vulnerability exists in the way Windows CryptoAPI (Crypt32.dll) validates Elliptic Curve Cryptography (ECC) certificates. An attacker could…

Your ISO 27701 questions answered

We recently hosted a webinar on ISO 27701, the new standard in the ISO 27000 series that helps organisations understand their privacy requirements. Understandably, many viewers had questions at the end of the presentation. After…

5G Security

The security risks inherent in Chinese-made 5G networking equipment are easy to understand. Because the companies that make the equipment are subservient to the Chinese government, they could be forced to include backdoors in the…

Travelex says it won’t pay ransom to crooks…

While most of us spent New Year’s Eve celebrating, the IT department at Travelex was grappling with a ransomware virus that was spreading through its systems. Almost two weeks on, the currency exchange service is…

Artificial Personas and Public Discourse

Presidential-campaign season is officially, officially, upon us now, which means it's time to confront the weird and insidious ways in which technology is warping politics. One of the biggest threats on the horizon: Artificial personas…

Loading