Google Goes Thermonuclear On Thieves With Methodical Remote
Wipe Option For Stolen Androids
… Google has
presented what could clearly be called a “Nuclear Option” by allowing the
Android operating system to securely
erase every single partition on the device when invoked by a
device’s rightful owner. Recovery partition, boot partition, bootloader — all
would be wiped off the face of the earth with zeroes.
Which partitions are erased would be left up to each
individual manufacturer, but according to Android Police, even external
partitions (i.e. a microSD card) can be included with the “bricking” command.
Nothing startling, but a good summary.
The New Economics of Cybercrime
… According to the
cybersecurity firm Intel Security, the price of a stolen payment-card record
has dropped from $25 in 2011 to
$6 in 2016. “We’re living through an
historic glut of stolen data,” explains Brian Krebs, who writes the blog Krebs on Security. “More supply drives the price way down, and
there’s so much data for sale, we’re sort of having a shortage of buyers at
this point.”
Planning for cyberwar? Is there an inertial navigation App for
smartphones?
US military tests massive GPS jamming weapon over California
The US Federal Aviation Authority (FAA) is warning
aircraft to stay a few hundred miles away from the Naval Air Weapons Station at
China Lake, California, because the military is testing a new gizmo that
disrupts GPS – and may also mess with flight control systems.
The FAA has issued a Notice to Airmen (NOTAM) warning [PDF] that on June 7, GPS readouts will be
unreliable or nonexistent…
… In addition, the FAA is warning pilots flying the Embraer
Phenom 300, one of the world's most popular executive jet aircraft, that the
testing could interfere with flight stability controls and has said extra care
should be taken in the area.
I need to read this a few more
times. As I now understand it, if the
government knows I know the password, I have no Fifth Amendment
protection. But what if the government
only thinks I know the password? Also, I
wonder if my “re-encrypt your encrypted data and add one file that says
everything else is gibberish” technique would work?
The Fifth Amendment limits on forced decryption and applying
the ‘foregone conclusion’ doctrine
The U.S. Court of Appeals for the 3rd Circuit has
a case
pending on the Fifth Amendment limits of forcing a suspect to enter his
password to decrypt a computer. The case
provides an opportunity for the 3rd Circuit to correct an error in
the 11th Circuit’s treatment of the same question, specifically on
how to apply the “foregone conclusion” doctrine to an order requiring
decryption of a storage device.
Given the importance of the issue, I want to explain the
issue, show where the 11th Circuit got it wrong, and explain what I
think the right analysis should be.
Perhaps lawyers are beginning to
understand the technology?
Why legal departments begrudge the cloud
… “One can’t simply go to clients or
the state bar association and say the third party caused a breach, so it’s
really not our responsibility.”
This year’s high-profile breaches at Panamanian law firm Mossack Fonseca and New York-based Cravath Swaine & Moore have raised alert levels even higher.
Law firms and legal departments have
been warned by the Federal Bureau of Investigation that cyber thieves consider
them low-hanging fruit from a risk perspective because of their potential
treasure troves of trade secrets and undisclosed deal information that could be
exploited.
… in fact, many law firms and legal
departments don’t even know how many cloud apps are being used. New cloud apps, such as file-sharing tools
show up almost monthly even daily, creating a whack-a-mole mentality where IT
security staff must shut down unauthorized apps when they pop up.
The average
organization uses 1,154 cloud services to upload 5.6 terabytes of
data each month, according to cloud-access
security broker Skyhigh Networks.
(Related) I’m not (yet) convinced this is a solution,
but it will be something for my Architecture class to kick around.
Egnyte Tackles Data Loss With New Data Governance Solution
Cloud computing remains a problem for many
businesses. While the move to IaaS is gathering
pace, it is still true that most organizations operate a hybrid approach,
combining cloud apps and on-premise data. According
to Egnyte, 85% of apps are now in the cloud, while 85% of data is
still on premises. This creates a huge governance issue as
corporate data moves into and out of cloud applications.
At last someone else has noticed
that the porn industry is an early adaptor.
How Porn Leads People to Upgrade Their Tech
… The pornography industry isn’t
creating new communication technologies, Coopersmith said, nor is it
particularly prescient about what technology is likely to take off. It’s simply taken advantage of new
developments before others, and has enough of a draw that people are willing to
follow it.
Its position on the leading edge of technology comes
partly out of necessity. “There’s a
nimbleness to being in the marginalia,” Barss says. Once technologies and platforms reach
mainstream status, they may become less friendly to adult content, and the
social stigma attached to porn has repeatedly drawn consumers to new, largely
untested technologies that provide better privacy.
Amusing enough to share…
Will Trump Screw Up Everything We Know About Elections?
Another easy screenshot tool.
How to Use YouTube to Record a Video of Your Screen
… the saved video will be available on
your YouTube account where you can change its privacy settings if you want to
share it publicly and can add annotations, subtitles, and more.
A few things to keep in mind when using YouTube to record
a screencast:
·
The quality of the video is not great — the
full-screen experience is a little hazy.
·
If you use YouTube, you won’t have access to
some advanced features you’ll get with other screencasting apps like Quicktime or Screencast-o-matic.
If I incorporate this into my website design class, it won’t
be cheating to use it.
Wix Unveils New Innovation: Websites That Design Themselves
Using AI
… Wix has
developed the world’s first website-building platform that uses artificial
intelligence — what Wix refers to as “Artificial Design Intelligence” (ADI) —
to create a site automatically for you, right in front of your eyes.
No comments:
Post a Comment