You are protected against revealing passwords under the Fifth Amendment’s right against self-incrimination, but your biometrics are not. By Will Yakowicz Staff writer, Inc. http://www.inc.com/will-yakowicz/why-biometrics-are-bad-for-your-constitutional-rights.html?platform=hootsuite Biometrics might be cool and convenient, but the technology could potentially undermine your legal rights under the Fifth Amendment, which prohibits the government from compelling a witness to testify against… Continue reading Here’s Why Lawyers Suggest You Stop Using Your Finger to Unlock Your Phone
As I keep telling people, cyber is a great unknown. If anyone tells you they 1 – know what is happening (what we are doing) and 2 – know what we are going to do in the near future and 3 – know what the bad guys are going to do in the near or… Continue reading We’re Doomed, Unless…
Ongoing with my “Future Technology” series. Most people seem to be in awe of “wearable computiers”. Simply put, computers are no longer bound to a mainframe, a desktop, a laptop, a notebook, a tablet or smaller computer – they are and will be wearable. We’ve seen versions in TV, in the movies, in science… Continue reading Wearable computing
I recently gave a presentation at the DC Campus of Drexel University, at a forum on ‘Cybersecurity in the year 2024’. My good friend, retired USAF Colonel Norman Balchunas, assembled thought leaders, mainly from the Washington DC area, to discuss cybersecurity, learn more about Drexel University’s various cyber programs and help devise a ‘road ahead’.… Continue reading 50+ Years of Innovation
Imagine my horror to read that Xerox Copiers, specifically the Xerox Workcentre 7535 and 7556, using Jbig2, an image compression standard, are unilaterally changing numbers within documents. The BBC report is here. In a specific example, dimensions in a plan which was copied were changed from 21.11m to 14.13m. To my naturally devious mind this presents… Continue reading Copiers as an Information Warfare Tool
FIGHT SMS SPAMMING! SMS (short message service) or text message spamming is a growing problem. Reports show that people open SMS messages at rates exceedingly higher than junk mail campaigns. Still, many recipients understand spam when they see it, even via a text message. A recent report by Cloudmark notes that more than a third… Continue reading FIGHT SMS SPAMMING!
The Cyber Intelligence Sharing and Protection Act (CISPA) is a proposed law intended to share information between the US government and industry. For years the information security community has sought to build a more comprehensive picture to establish greater situational awareness of how US networks are being attacked and probed and to guage the amount… Continue reading Putting the Privacy Test to Congress