CloudFlare claims government requests for user data are affecting fewer than .017 percent of their two million global customers
SAN FRANCISCO–The security of data being transmitted over the Web relies on a large number of moving parts, from the integrity of the machine sending the data, to the security of the browser, to the implementation of encryption, to the fragility of the certificate authority system. Experts have been spending the best part of the[...]
Automated update services that provide users with security patches and feature enhancements are also a potential hunting ground for intelligence agencies and law enforcement surveillance activity.
SAN FRANCISCO–The Lavabit case, which saw the secure email provider’s owner shut the company down after being forced to hand over to the government the encryption key that protected his users’ data, may seem like an extreme reaction to a unique situation. But, experts say it’s likely that there will be similar situations in the[...]
Dennis Fisher and Mike Mimoso run down the news from day two of the RSA Conference, including the new FBI director’s speech and preview Trusty Con.
The official mobile application for the ongoing RSA Conference contains a half-dozen security vulnerabilities
FBI Director James B. Comey said during his RSA Conference keynote that public-private sector information sharing is crucial to deterring cybercrime.
The privacy officers of Google, Microsoft and Intel Security discussed at RSA Conference 2014 the ongoing need for greater transparency in reporting government requests for data.
It’s only been a few days since Apple fixed the nasty certificate-validation “goto fail” vulnerability in iOS and OSX and now word comes that another bug, one that could allow an attacker to monitor keystrokes on iOS 7 devices without the user being any the wiser, also exists.
Starting a threat modeling system can seem daunting, but the good news is that there’s no one right way to do it, just the right way for a given organization.