Category: privacy

Hacking is in the news nearly every day and people constantly reach out to ask me if their information is safe. Are they at risk? What can they do to be more protected? Should they get a VPN or use Tor?

The best thing to do is to start simply. Begin with your passwords. Do you have good passwords on your accounts?

Once again, everybody is talking about China. On Feb. 19, Mandiant, an American security company issued a startling report — the result of a six-year investigation — that makes the claim that the United Sates is in a cyber war with a 12-story building in Shanghai. The private security analyst concluded that the building is home of China’s stealth cyber war division, the People’s Liberation Army Unit 61398.

If this sounds like the movie, War Games, make no mistake – this is real. According to Mandiant, for the last seven years, Chinese hackers have stolen data from at least 141 companies across 20 major industries, including critical infrastructure sectors like energy and telecommunications. At least 115 of the companies were in the United States. Sen. Dianne Feinstein (D-CA) chairwoman of the Senate Intelligence Committee said classified intelligence documents support Mandiant’s claim.

Last year, we proclaimed this the Era of Big Data, and, in light of the dramatic events of the last few weeks, we thought it was an appropriate time to consider what’s happened since. In order to understand this from the inside, we invited a leading big data expert, Brian Greenberg, VP of Technology Operations at Total Attorneys and Founder of General System Dynamics, to help us parse fact from fiction or fantasy.

I recently had the privilege to speak at the Chicago Bar Association where they hosted a seminar and panel; Introduction To Cloud Computing and the Virtual Office which included an overview of the technical aspects of cloud technology as well as insights from practitioners operating out of the “virtual” office.  For my session, I presented a technical overview […]

Last month, EFF filed proposals with the Copyright Office seeking DMCA exemptions to cover mobile phone ‘unlocking’ (allowing the phone to be used on any carrier’s network) and ‘jailbreaking’ (allowing the phone to run any software). Carriers like MetroPCS and Pocket Communications have also asked for an unlocking exemption, but the Copyright Office needs to […]

Year-end 2008, Darknet Assumptions = True: “ 2008 was another tough year for proponents of digital rights management (DRM). As we have pointed out in years past, the infamous Darknet assumptions — three big reasons that DRM copy protection will never work, as set forth in 2002 by a team of Microsoft engineers — continue […]