Do you get the feeling someone's not telling us the whole story here? How do you lose a hard drive? Do you mean someone physically removed them from the machines? Were they stored somewhere and then disappeared? Did someone simply misplace them? Here’s what the company CEO, Michael Neidorff, says. “While we don't believe this … Continue reading Health Insurer, Centene, Loses Six Hard Drives with the Personal Information of 1 Million Clients
We are all unique individuals. We have unique fingerprints, unique voice patterns, and unique eyes. Cyber security experts realized long ago that if they could use these unique features to identify a person who wanted to use a specific, protected device or service, then that user would be protected from fraud. In other words, criminals … Continue reading The End of Biometric Authentication?
No, this is not the latest installment in the Lord of the Rings saga. It’s about the fight between the US government and the developers of the Tor browser - the browser that keeps users anonymous while browsing online. You see, the government looks at Tor as an evil that must be controlled to maintain … Continue reading The Battle for Tor
Last year, I compiled the predictions of 5 big security firms to see what major themes were popular. As I reported in my last post, the firms did well enough, and I gave them a ‘B’ rating. For 2016, I am doing the same. I compiled the predictions from the same 5 firms; Trend Micro … Continue reading An Assessment of the Six Main Cyber Security Predictions for 2016
Around this time every year, security firms offer up their predictions for the year ahead. However, rarely do we see how those predictions actually turned out. One year ago, I looked at the predictions of five of these firms and sifted out the main themes that emerged. I also made my own predictions. The five companies whose … Continue reading How Good Were the Experts at Predicting the Cyber Attacks of 2015?