You are here
Home > Author: Peter Glock

Australian industry groups issue wish list of encryption law changes

Worth following as a rehearsal for legislation currently being drafted in other jurisdictions...: [...] "The legislation shows a blatant disregard for and misunderstanding of how the Internet works, how online encryption operates and is used to secure millions of legitimate communications every day, and will almost certainly not prevent a single act of terrorism, child abuse or other serious crime that couldn't have been prevented otherwise," Information Technology Professio

Here’s a Story Where Picking the Right Font Was Never More Important: eDiscovery Trends

Great piece of forensic examination. Oh, and don't use Comic Sans...ever: [...] Here’s the problem: the farm declaration, dated 2004, was written in Calibri, while the cottage declaration, dated 1995, was written in Cambria. Per Ars Technica, Cambria was designed no earlier than 2004, while Calibri was designed between 2002 and 2004; both only became widely available in 2007. [...]

Even if you’re off social media, your friends could be ruining your privacy

Fallback Image

You could always get rid of your friends?... You don't have to post anything for social networks to learn about you. Your friends are doing all the work already. A new study from researchers at the University of Vermont and the University of Adelaide found that they could predict a person's posts on social media with 95 percent accuracy -- even if they never had an account to begin with. The scientists got all the information they needed from a person's friends, using po...

Mystery still surrounds hack of PHP PEAR website

Fallback Image

Time to check your PHP installation...: [...] However, last week, the PHP PEAR website --located at was taken down and its homepage replaced with a short message announcing a security breach. According to the message, the PEAR team said they've found that the official website had been hosting a "tainted go-pear.phar" file --which is the main PHP PEAR executable. "If you have downloaded this go-pear.phar in the past six months, you should get a new copy o

Hacked Nest Cam convinces family that US is being attacked by North Korea

Fallback Image

This has some merit. Unfortunately, many people struggle with setting up and using 2FA so it's up to us to educate and make the process simpler...: [...] This isn't the first time Nest's cameras have been infiltrated by outsiders. In December, a hacker took over the camera of a man in Arizona to warn him of security vulnerabilities. In another case last month, a hacker told a couple through the device he'd kidnap their child. Security experts have been warning for years t

Is the Right to be Forgotten National, European or Worldwide? The Advocate General Issues an Opinion in the Google Case

Read the full article to understand potential impacts for Worldwide privacy...: On January 10, 2019, Advocate General Szpunar issued his much awaited opinion in the Google case that was referred to the European Court of Justice by the French “Conseil d’Etat”, the highest administrative court of the country.  The Conseil d’Etat basically asked the European Court of Justice to follow-up on its Google Spain decision: is the right to be forgotten – i.e., the right of individuals

Privacy and Data Security 2018 Year in Review

A good time to take a breather and reflect on 2018...: In many ways, it was the year of data privacy. In this article, we identify five of the biggest trends in privacy and data security, including the mammoth European Union General Data Protection Regulation (GDPR) taking effect, the hurried passage of... By: Manatt, Phelps & Phillips, LLP

Clever Smartphone Malware Concealment Technique

This is clever: Malicious apps hosted in the Google Play market are trying a clever trick to avoid detection -- they monitor the motion-sensor input of an infected device before installing a powerful banking trojan to make sure it doesn't load on emulators researchers use to detect attacks. The thinking behind the monitoring is that sensors in real end-user devices will record motion as people use them. By contrast, emulators used by security researchers­ -- and possibly

The Government’s Secret UFO Program Funded Research on Wormholes and Extra Dimensions

No, it's not April 1st... The Department of Defense funded research on wormholes, invisibility cloaking, and “the manipulation of extra dimensions” under its shadowy Advanced Aerospace Threat Identification Program, first described in 2017 by the New York Times and the Washington Post. On Wednesday, the Defense Intelligence Agency released a list of 38 research titles pursued by the program in response to a Freedom of Information Act (FOIA) request by Steven Aftergood,

4 strategies for your IT wearables policy

It was bad enough when users started using their own smartphones...: Without a formal plan or policy, wearables may introduce your company to a security breach​. [...] Below are four wearables strategies IT and end users should consider when formalizing plans or policies. 1. Identify present and future wearables use cases Several compelling wearables use cases exist such as using wearables to monitor patients, equipping building inspectors with wearable glasses that