The US Supreme Court is deciding a case that will establish whether the police need a warrant to access cell phone location data. This week I signed on to an amicus brief from a wide array of security technologists outlining the technical arguments as why the answer should be yes. Susan Landau summarized our arguments.
A bunch of tech companies also submitted a brief.
from Do the Police Need a Search Warrant to Access Cell Phone Location Data?
Wait… What? Google, Inc. (NasdaqGS: GOOG) has announced the company will commence tracking credit card purc…
from Google Begins Tracking Credit Card Activity
Your daily round-up of some of the other stories in the news
from News in brief: new Bitcoin fork; HBO hacked; China cracks down
Anyone who has taken a computer science or programming class will likely know of Brian Kernighan. He had significant contributions to the development of Unix, and also wrote the AWK and AMPL programming languages. For the last 20 years, he’s been a professor of computer at Princeton University. He is the author of many technical books. When I got his latest book Understanding the Digital World: What You Need to Know about Computers, the Internet, Privacy, and Security (Princeton University Press 978-0691176543), I did a double-take at first, as this is more of an introductory text. …
from Book Review: Understanding the Digital World: What You Need to Know about Computers, the Internet, Privacy, and Security
Bluejacking is back, this time via Apple’s AirDrop technology, allowing strangers to bombard women with ‘dick pics’
from Woman targeted with 120 images on public transport via AirDrop
A typical PeopleSoft system is quite large and complex, so there are a lot of settings, which affect its security. Some of them we have already described. This part of the guideline is focused on specific insecure configurations, which can’t be tied to any other group. There are 4 important areas that should be covered; […]
The post EAS-SEC. Oracle PeopleSoft Security Configuration. Part 6: Insecure settings appeared first on ERPScan.
from EAS-SEC. Oracle PeopleSoft Security Configuration. Part 6: Insecure settings
What do local car dealers, hospitals and banks all have in common? At first glance, not much. However, all of them have become recent hacker targets. Why now when other, much larger corporate entities have traditionally been targets? One word – resources. Their resources, both network and personnel, are stretched thin. With the increased complexity and […]
The post Could Your Local Car Dealer, Bank or Doctor’s Office be Next? appeared first on Radware Blog.
from Could Your Local Car Dealer, Bank or Doctor’s Office be Next?
“You could disable the air bags, the anti-lock brakes, or the door locks, and steal the car,” says researcher.
David Bisson reports.
from Vendor-neutral smart car bug has ‘dangerous’ and ‘even fatal’ consequences
While we are becoming increasingly more reliant on technology and storing our information online, this trend increases the quantity and desire of hackers to try and acquire your sensitive information…
Go on to the site to read the full article
from Top 5 Strategies to Avoid Getting Hacked Online
Uber ‘failed consumers in two key ways’ says FTC after probe into catalogue of privacy concerns
from Uber faces privacy audits every two years until 2037, rules FTC