Blog

Identity and Access Management for the 21st Century

When the chief information officer of the Defense Department recently proposed a two-year glide path to eliminating the Common Access Card (CAC) from use on DOD systems, he acknowledged a shift in the federal approach to information technology, and in turn, the practice of identity and access management (IdAM). To be sure, the millions of …

Software updates beamed directly to the car via satellite, Wi-Fi or cellular signal

TIRED of your vehicle and its aging, limited features? Don’t trade it in just yet. Download new software instead. In some cases, that is already possible. And over the next few years, as the already extensive software on modern cars becomes even more feature-rich and upgradeable, manufacturers mean to step up the effort. They plan …

Why identity protection is the next phase in security

Talk to any security expert, and sooner or later the line “It’s not a case of if you are hacked, but when” will be trotted out. It’s a good line because it is true and demonstrates how perimeter-style security has fallen by the wayside. But consider the implicit implications of everyone eventually being breached, not …

Amazon, Apple, Google support Microsoft in legal fight for disclosures of government data access

Technology, media, pharmaceutical and other companies, along with major corporate lobbying groups, filed legal briefs on Friday in support of a Microsoft lawsuit that aims to strike down a law preventing companies from telling customers the government is seeking their data. Friday was the deadline for filing of friend-of-the-court briefs by nonparticipants in the case. …

How Spy Tech Firms Let Governments See Everything on a Smartphone

Want to invisibly spy on 10 iPhone owners without their knowledge? Gather their every keystroke, sound, message and location? That will cost you $650,000, plus a $500,000 setup fee with an Israeli outfit called the NSO Group. You can spy on more people if you would like — just check out the company’s price list. …

Google’s “In-App” Search can now find content inside apps on your mobile phone

More of the content we’re looking for is saved in mobile applications, which is why Google has been working to bring that information to the surface by indexing apps in search. Now, it will do the same thing on your phone, too. The company is introducing a new search mode in its Google app called …

Facebook Is Playing Games With Your Privacy And There’s Nothing You Can Do About It

If you agree to Facebook’s terms and conditions, expect to be transmogrified, horror-movie style, into an unwitting, twitching little guinea pig. Despite all its moves to improve privacy across the site and the numerous furores it’s faced, the company still thinks it’s fine to carry out tests on users, playing games with our notions of …

WhatsApp to share user data with Facebook for ad targeting — here’s how to opt out

Facebook-owned messaging giant WhatsApp has announced a big change to its privacy policy which, once a user accepts its new T&Cs, will see it start to share some user data with its parent company — including for ad-targeting purposes on the latter service. “[B]y coordinating more with Facebook, we’ll be able to do things like track basic metrics about how often people …

Apple issues urgent iPhone software update after attempted hack with most sophisticated spyware ever seen

Apple has issued a global upgrade of its iOS mobile operating system after a botched attempt to break into the iPhone of an Arab activist using hitherto unknown espionage software. The spyware took advantage of three previously undisclosed weaknesses in iOS to take complete control of iPhone devices. An Apple spokesperson said: “We were made …