Crunch time for Apple as it prepares for face-off with FBI

Crunch time for Apple as it prepares for face-off with FBI By Sam Thielman New York and Danny Yadron San Francisco What might happens at this week’s congressional hearing as the iPhone maker continues to defy last month’s court order over phone encryption? On Tuesday,…

Apple Must Forever Threat Model Against Itself

Apple Must Forever Threat Model Against Itself By Michael Mimoso The ongoing dispute between the FBI and Apple has brought out the fact that Apple must be part of its own threat model going forward. February 25, 2016 at 07:45PM via Threatpost | The first…

Metadata Tools of the Trade

Metadata Tools of the Trade By (Dr. Neal Krawetz) Evaluating metadata requires more than just loading a picture and pushing a button. While there are lots of tools that display metadata, they do not all display the same things, and there are a few things…

Wearable Warning: IEEE Highlights Top Security Risks For Fitness Trackers

Wearable Warning: IEEE Highlights Top Security Risks For Fitness Trackers By thomas An IEEE report exposes vulnerabilities in wearables such as fitness trackers, which are susceptible to a number of attacks. February 17, 2016 at 07:31PM via Threatpost | The first stop for security news…

Everything you need to know about the Apple versus FBI case

Everything you need to know about the Apple versus FBI case By Troy Hunt (noreply@blogger.com) Some days, the news is dominated by a single security story and not just in the tech news either, but today the consumer news is all about Apple’s message to…

ALERT: UK Government Consultation on Further Anti-Porn Law

ALERT: UK Government Consultation on Further Anti-Porn Law By Jerry Barnett When attacks on civil liberties are announced by governments, they are usually sold under the guise of “tackling terrorism” or “protecting children”. Today, we have an example of the latter. The UK government today…

It’s not about this 5c

It’s not about this 5c By The FBI is trying to compel Apple to break its own iPhone encryption and enable backdoors for law enforcement, ostensibly to decrypt a particular criminal’s iPhone 5c. As iOS security expert @chronic tweeted: I’m fairly sure that if the…

A social engineering Play by Play on Pluralsight with Lars Klint

A social engineering Play by Play on Pluralsight with Lars Klint By Troy Hunt (noreply@blogger.com) The other day, a hacker compromised someone’s email account. It was almost certainly a phishing attack, he probably just sent them over an email claiming to be from the victim’s…