The first rule of crypto club? "Don't invent your own."
Staying on top of the latest in software/hardware security research, vulnerabilities, threats and computer attacks.
Larry Seltzer has long been a recognized expert in technology, with a focus on mobile technology and security in recent years. He was most recently Editorial Director of BYTE, Dark Reading and Network Computing at UBM Tech. Prior to that he spent over a decade consulting and writing on technology subjects, primarily in the area of security. He is the author of three books and thousands of published articles and many more unpublished, private reports. Larry has been Technical Director at several test laboratories where he both directed and ran product testing, with a special interest in test automation. Larry began his career as a Software Engineer at the now-defunct Desktop Software Corporation in Princeton, NJ, on the team that wrote the NPL 4GL query language. He also worked on corporate IT and software development at Chase Econometrics. Larry is a graduate of the University of Pennsylvania with a degree in Public Policy.
Ms. Violet Blue (tinynibbles.com, @violetblue) is a freelance investigative reporter on hacking and cybercrime at Zero Day/ZDNet, CNET and CBS News, as well as a noted sex columnist. She has made regular appearances on CNN and The Oprah Winfrey Show and is regularly interviewed, quoted, and featured in a variety of publications that includes ABC News and the Wall Street Journal. She has authored and edited award-winning, best selling books in eight translations and has been a sex columnist for the San Francisco Chronicle. She has given keynote talks at such conferences as ETech, LeWeb, and the Forbes Brand Leadership Conference, and has given two Tech Talks at Google. In 2010, the London Times named Blue one of “40 bloggers who really count.” Ms. Blue is the author of The Smart Girl's Guide to Privacy. Violet Blue bio courtesy of TTI Vanguard.
Solid-state drives are great for performance, but data security must come first.
Just hours after Conservative's re-election, the UK government pledged to bolster its surveillance efforts. Third time lucky, this time it might actually go through.
The next-generation Android platform is said to double-down on privacy features.
A collection of notable security news items for the week ending May 8, 2015. Covers enterprise, controversies, application and mobile security, malware, reports and more.
China has included a "sovereignty" clause in a new wave of policies designed to tighten IT management.
Court: The NSA program goes beyond what the Patriot Act intended.
A neverending wave of snake oil salesmen proffering faux privacy gadgets are raking in the dough on crowdfunding sites like Kickstarter. If you see these claims, run.
One researcher says the critical flaw is caused by a simple example.html file enclosed by default in plugin packages.
A new bill aims to prevent the government from using a loophole that allows it to snoop on Americans' private data, in spite of the Fourth Amendment.
The computer maker issued a patch to prevent hackers exploiting an update app.
The deal will boost AVG's security services portfolio with new mobile offerings including the popular HideMyAss! proxy service.
The new unit's creation is the response to rising numbers of identity theft through hacking.
Researchers claim that most cyberattackers targeting SAP applications use one of three major cyberattack vectors.
A federal appeals court said citizens have "no expectation of privacy" when a third-party company holds data, such as cell phone records.