443.203.9378
·
[email protected]
·
Mon - Fri 9am-5pm
Free Phone Consultation
443.203.9378
·
[email protected]
·
Mon - Fri 9am-5pm
Free Phone Consultation

Month

August 2010
Police force more suspects to give up crypto keys: Police have expanded their use of powers to force suspects to decrypt files by 50 per cent in the last year, figures released today reveal.… (Via The Register – Public Sector.)
Read More
EGYPT: Cyber war among possible presidential candidates: “Source: Nasry Esmat, Los Angeles Times. Egypt’s political cyber war is intensifying after hackers played havoc with the Facebook page of Gamal Mubarak, the son of President Hosni Mubarak and a possible presidential contender in 2011. The role of cyberspace politics is expected to grow through 2011. Statistics...
Read More
Below, are pictures, my abstract, and slides from my talk at Def Con 18. DEF CON 18This paper argues that the current rules of war are adequate for addressing the unique issues that are encountered as a result of conducting and defending against cyber warfare. The author begins by giving a survey of the laws...
Read More
Korea trying to put cyber security on G20 agenda: “Source: Kim Tong-hyung, The Korea TimesKorea is attempting to present computer security as a topic of discussion for the Group of 20 meetings in Seoul later this year. However, the talks for establishing an international body for combating cybercrimes seem to be discouraged. The Korea Communications...
Read More
EFF Wins New Legal Protections for Video Artists, Cell Phone Jailbreakers, and Unlockers: “Via: EFF: The Electronic Frontier Foundation (EFF) won three critical exemptions to the Digital Millennium Copyright Act (DMCA) anticircumvention provisions today, carving out new legal protections for consumers who modify their cell phones and artists who remix videos — people who, until...
Read More
Hacker Spoofs Cell Phone Tower to Intercept Calls: “Via: Wired: A security researcher created a cell phone base station that tricks cell phones into routing their outbound calls through his device, allowing someone to intercept even encrypted calls in the clear. The device tricks the phones into disabling encryption and records call details and content...
Read More
Feds Admit Storing Checkpoint Body Scan Images: “Via: Wired: For the last few years, federal agencies have defended body scanning by insisting that all images will be discarded as soon as they’re viewed. The Transportation Security Administration claimed last summer, for instance, that “scanned images cannot be stored or recorded.” Now it turns out that...
Read More