The Silk Road and NSA spying may be old news, but The Onion Router (Tor) continues to generate interest among Internet users seeking online anonymity. Tor isn’t all upside, though. As I found out, you pay a price for privacy
Silk Road Raising Questions About Government Spying (Again)
It’s a case that’s captured everyone’s attention — pirates, drug trafficking, hit men, government intrigue. By now, few people haven’t heard about Silk Road, run by the now notorious Dread Pirate Roberts, a pseudonym from the film “The Princess Bride.” It’s an interesting next chapter to perhaps the biggest news story of 2013 — Edward Snowden’s revelations about NSA cyber snooping
5 Top Targets for Today’s Hackers
Black Hat USA bills itself as “the show that sets the benchmark for all other security conferences.” While most conferences tend to over-promote themselves, given the activity at this year’s show, that actually might be something of an understatement. From the defense of government surveillance delivered by NSA Director General Keith Alexander to briefings on the coming “cryptopocalypse” and the risks associated with embedded devices and the Internet of Things, Black Hat reminds us that a little bit of paranoia is warranted in today’s connected world.
Your Net Worth Is Online – And Less Safe Than Ever
The Black Hat USA 2013 conference, which kicks off tomorrow in Las Vegas, brings together the brightest minds in IT security each year — those who are responsible for perpetrating and protecting against the latest hacks and vulnerabilities. And not a second too soon, since every week seems to usher in another security catastrophe. This week’s shocker was the outing of a hole in mobile device SIM cards, by Karsten Nohl, the founder of Security Research Labs in Berlin
Security Gaffes You Might Have Missed So Far This Year
If you can believe it, 2013 is already halfway over. With summer here, businesses everywhere are feeling the heat in their IT organizations – as they fight a growing array of security concerns, threatening their profitability and reputation alike.
Could Your Jewelry Stop Hackers?
Google has been talking about an innovative idea to replace passwords with jewelry — that’s right, jewelry. Actually, the enabling technology could be hidden in jewelry, such as a ring , which would perform secure cryptographic transactions that would obviate the need for the user to enter a password.
Are your IT polices strong enough to protect the data from thefts?
Have you ever heard of a saying “The more you sweat in training, the less you bleed in the battlefield”. What is it has to do with IT?
Beware: Hackers in your car, TV and light-bulbs?
We all know we should be careful transacting online, but are you thinking about cyber-security when you’re watching TV or driving your car? If you’re like me, those flashy new products at last week’s CES show probably got you dreaming about upgrading some of your old-school gadgets. The trend today is moving away from stand-alone devices to futuristic “connected” devices, those that can talk to the cloud or even interact with your other systems and appliances.
Talk to ME Tuesday: Advice about Investing in Security Management
ManageEngine continues our weekly blog series called Talk to ME Tuesday. Each week we discuss interesting topics from the world of technology with you, the people that live and breathe it everyday. People are spending more money in security management, said Andrew Hay, Senior Analyst for 451 Research . Hay believes that the rise in reporting of high profile breaches has made more people think about investing in overall security management rather than just having firewalls or intrusion detection systems.