What does the Mandiant report mean?
The skyline of Shanghai, China. (Photo credit: Wikipedia) The past few days have been interesting. Mandiant released a report outlining incredible details about China’s Unit 61398. Most of the cyber...
View ArticleHow to Stop China from Stealing Intellectual Property, Part II
Cover via Amazon Yesterday’s blog resulted in a flurry of activity, mostly offline. For a Sunday a surprising number of people responded to me directly. One phone call reminded me of another option,...
View ArticleChina Women Dating
If you’ve read my blog for a while you know I’ve been to China a few times, conducting research, doing interviews, giving the occasional speech and hopefully discovering what the Chinese are actually...
View ArticlePutting the Privacy Test to Congress
CISPA IS BACK (Photo credit: Mataparda) The Cyber Intelligence Sharing and Protection Act (CISPA) is a proposed law intended to share information between the US government and industry. For years the...
View ArticleCopiers as an Information Warfare Tool
Imagine my horror to read that Xerox Copiers, specifically the Xerox Workcentre 7535 and 7556, using Jbig2, an image compression standard, are unilaterally changing numbers within documents. The...
View Article50+ Years of Innovation
I recently gave a presentation at the DC Campus of Drexel University, at a forum on ‘Cybersecurity in the year 2024′. My good friend, retired USAF Colonel Norman Balchunas, assembled thought leaders,...
View ArticleWearable computing
Ongoing with my “Future Technology” series. Most people seem to be in awe of “wearable computiers”. Simply put, computers are no longer bound to a mainframe, a desktop, a laptop, a notebook, a...
View ArticleWe’re Doomed, Unless…
As I keep telling people, cyber is a great unknown. If anyone tells you they 1 – know what is happening (what we are doing) and 2 – know what we are going to do in the near future and 3 – know what the...
View ArticleFIGHT SMS SPAMMING!
FIGHT SMS SPAMMING! SMS (short message service) or text message spamming is a growing problem. Reports show that people open SMS messages at rates exceedingly higher than junk mail campaigns. Still,...
View ArticleHere’s Why Lawyers Suggest You Stop Using Your Finger to Unlock Your Phone
You are protected against revealing passwords under the Fifth Amendment’s right against self-incrimination, but your biometrics are not. By Will Yakowicz Staff writer, Inc....
View Article
More Pages to Explore .....