iFreePress reports: Just when you thought it was safe to eat at the neighborhood deli, a group of Israeli researchers has announced they’ve figured out how to pull the encryption keys stored on some computers by using items which can be hidden inside pita bread. An update was released at the beginning of the year…
Category: Commentaries and Analyses
Even Behind Closed Doors, Senators Aren’t Getting Their OPM Hack Questions Answered
Kaveh Waddell reports: After weeks of revelations about cyberattacks that may have exposed the personal information of as many as 18 million federal workers, Katherine Archuleta, the director of the Office of Personnel Management, gave senators a classified briefing Tuesday to try to put lawmakers’ questions to rest. But senators from both sides of the…
IE: Data-security breach notifications jumped 50% last year
The Irish Examiner reports: There was a 50% jump in the number of data-security breach notifications to the Data Protection Officer last year compared to 2013. The office also investigated controversies involving PPS numbers at Irish Water and the Department of Education, and engaged with the Department of Communications in relation to Eircode – the…
Wyoming seeks to safeguard student info
Trevor Brown reports: After hearing a report that identified numerous security lapses, Wyoming lawmakers are considering a bill that would require school districts to better protect students’ personal information. A legislative committee was briefed Tuesday on a recent state Department of Audit report that found 42 of the state’s 48 school districts had issues related…
Wearable fitness trackers tested for data leakage and poor security
Graham Cluley writes: Independent IT security testing authority AV-Test.org has put nine different fitness trackers under the microscope, in order to explore how well they are protecting users’ data. At first it may seem peculiar that the organisation, famous for its in-depth tests of anti-virus technology, has turned its attention to fitness trackers. But in…
Experts: Hacking of Astros wasn’t advanced, but team’s computer defenses weren’t either
Evan Drellich reports: Both the offender and victim in professional sports’ first hacking scandal might share one trait: a lack of sophistication. Whoever made their way to private Astros information did not appear to do so with an advanced method of entry or cover-up beyond the capacity of any professional programmer. […] At the same…