Quantcast
Channel: Computer Security – To Inform is to Influence
Browsing latest articles
Browse All 21 View Live

Image may be NSFW.
Clik here to view.

What does the Mandiant report mean?

The skyline of Shanghai, China. (Photo credit: Wikipedia) The past few days have been interesting.  Mandiant released a report outlining incredible details about China’s Unit 61398.   Most of the cyber...

View Article



Image may be NSFW.
Clik here to view.

How to Stop China from Stealing Intellectual Property, Part II

Cover via Amazon Yesterday’s blog resulted in a flurry of activity, mostly offline.  For a Sunday a surprising number of people responded to me directly. One phone call reminded me of another option,...

View Article

Image may be NSFW.
Clik here to view.

China Women Dating

If you’ve read my blog for a while you know I’ve been to China a few times, conducting research, doing interviews, giving the occasional speech and hopefully discovering what the Chinese are actually...

View Article

Image may be NSFW.
Clik here to view.

Putting the Privacy Test to Congress

CISPA IS BACK (Photo credit: Mataparda) The Cyber Intelligence Sharing and Protection Act (CISPA) is a proposed law intended to share information between the US government and industry. For years the...

View Article

Image may be NSFW.
Clik here to view.

Copiers as an Information Warfare Tool

Imagine my horror to read that Xerox Copiers, specifically the Xerox Workcentre 7535 and 7556, using  Jbig2, an image compression standard, are unilaterally changing numbers within documents.    The...

View Article


Image may be NSFW.
Clik here to view.

50+ Years of Innovation

I recently gave a presentation at the DC Campus of Drexel University, at a forum on ‘Cybersecurity in the year 2024′.  My good friend, retired USAF Colonel Norman Balchunas, assembled thought leaders,...

View Article

Image may be NSFW.
Clik here to view.

Wearable computing

Ongoing with my “Future Technology” series.   Most people seem to be in awe of “wearable computiers”.  Simply put, computers are no longer bound to a mainframe, a desktop, a laptop, a notebook, a...

View Article

Image may be NSFW.
Clik here to view.

We’re Doomed, Unless…

As I keep telling people, cyber is a great unknown. If anyone tells you they 1 – know what is happening (what we are doing) and 2 – know what we are going to do in the near future and 3 – know what the...

View Article


Image may be NSFW.
Clik here to view.

FIGHT SMS SPAMMING!

FIGHT SMS SPAMMING! SMS (short message service) or text message spamming is a growing problem. Reports show that people open SMS messages at rates exceedingly higher than junk mail campaigns. Still,...

View Article


Image may be NSFW.
Clik here to view.

Here’s Why Lawyers Suggest You Stop Using Your Finger to Unlock Your Phone

You are protected against revealing passwords under the Fifth Amendment’s right against self-incrimination, but your biometrics are not. By Will Yakowicz Staff writer, Inc....

View Article
Browsing latest articles
Browse All 21 View Live




Latest Images