[Podcast] Hosted Payload Episode 2
The Presumption of Innocence Podcast: Episode 3 - The Science of Modern Digital Forensics
Is the TCPA Unconstitutional? [More With McGlinchey, Ep. 18]
Podcast: Conductive Discussions: Recent FRAND & Trade Secret Enforcement Trends Affecting the Semiconductor Industry
E17: Carpenter Decision Builds Up Privacy from #SCOTUS
Won’t You Be My Neighbor?
A Valuable Discussion About Property Values
The TCPA: Basics, Targeted Industries, and Trends
New Jersey to consider allowing police to search cell phones to combat distracted driving
Instapundit: America's IP Laws Need to be "Pruned Back"
Editor's Note: In a significant study from MIT's CSAIL, researchers have unveiled vulnerabilities in smartphone ambient light sensors, highlighting them as potential channels for privacy breaches. This discovery underscores...more
If, like me, you travel a lot, listen up—the Los Angeles District Attorney’s Office has issued an advisory as part of its fraud education campaign warning travelers not to use free USB charging stations offered in airports,...more
Just weeks after Mexico’s central bank was targeted by hackers who stole $15 million, Chile’s biggest bank, Banco de Chile, announced on May 28, 2018, that it had been struck by a “virus” that affected its workstations,...more
Here’s a great idea offered by the National Cyber Security Alliance and the Better Business Bureau: while you are doing your spring cleaning, don’t forget to do a digital spring cleaning too—that is, your computer, cellphone...more
There is a global malware campaign that is targeting mobile devices across the world. It is called Dark Caracal, which is believed to be sourced in Beirut by the Lebanese General Security Directorate. ...more
When you bring to mind someone “hacking” a computer one of the images that likely comes up is a screen of complex code designed to crack through your security technology. Whereas there is a technological element to every...more
The American Institute of CPAs (AICPA), has released a risk management reporting framework intended to "establish a common, underlying language for Cybersecurity risk management reporting — almost akin to US GAAP or IFRS...more
University of Michigan researchers have discovered that hundreds of applications in Google Play turn Android phones into a server that allow the user to connect the phone directly to a PC and leave open insecure ports...more
A hotel is a personal place, even if you share it with thousands of other people. The very obscurity in a crowd can make you feel anonymous, and the private living space allows for the most private of conversations and...more