IT Security

Predictive Profiling of Mobile Apps

Recently it was reported that a popular and supposedly secure communication app known as “ToTok” had been exposed to be a tool used to spy on its users by the United Arab Emirates Intelligence Service. It is probably not the first nor the last time a government agency infiltrates or publishes public technologies such as…

Read More

The Method to the Madness of Criminal Intent

Late in the summer of 2015, open source news reporting indicated that Chinese hackers may have been to blame for the breach of information at USIS, which is the major U.S. contractor for security background investigations for the U.S. Government. Initial estimates indicate that the cyber security hacking included more than 25,000 private records. Investigators…

Read More

Can ICANN?

Last week folks at the office were freaking out because various internet sites were either down, or working sporadically and email was stuck in everyone’s outbox. After a couple hours of troubleshooting and name calling it appeared the problem was due to a DNS (Domain Name Server) DDoS (Distributed Denial of Service) attack on a…

Read More

Enabling Bullies?

Regarding abuse via social media, is it the tool or the intent that poses the larger problem?   The question is being asked because of new social media apps that offer users anonymity. One such app new to the market is “blindspot.” Its sales pitch is: Don’t you ever wish you could say what’s on…

Read More

Hacking the Head

As far as we know, the emails on Hillary’s personal computer were not hacked. Just subpoenaed. And debated. But the emails on the personal computer of the Director of the Central Intelligence Agency, John Brennan, were hacked.   The alleged hackers were part of a group known as CWA, or “Crackas With Attitude.” Reports differ…

Read More

Android Injured

Android users beware: security firm Zimperium zLabs issued a warning about a vulnerability it uncovered in April, what may be the worst Android security vulnerability to date. Hackers send an android user a text message with a picture or video attachment. The phone user does not necessarily have to open the message for the malware…

Read More