According to a lawsuit (main article behind paywall), “a Miami-based food vendor and its supplier have been misrepresenting their squid as octopus in an effort to boost profits.” Powered by WPeMatico
Month: June 2017
The 16th Workshop on Economics and Information Security was this week. Ross Anderson liveblogged the talks. Powered by WPeMatico
Fortune magazine just published a good article about Google’s Project Zero, which finds and publishes exploits in other companies’ software products. I have mixed feeling about it. The project does great work, and the Internet has benefited enormously from these efforts. But as long as it is embedded inside Google, it has to deal with … Read More “Good Article About Google’s Project Zero” »
Really good article about the women who worked at Bletchley Park during World War II, breaking German Enigma-encrypted messages. Powered by WPeMatico
Websites are sending information prematurely: …we discovered NaviStone’s code on sites run by Acurian, Quicken Loans, a continuing education center, a clothing store for plus-sized women, and a host of other retailers. Using Javascript, those sites were transmitting information from people as soon as they typed or auto-filled it into an online form. That way, … Read More “Websites Grabbing User-Form Data Before It’s Submitted” »
The Girl Scouts are going to be offering 18 merit badges in cybersecurity, to scouts as young as five years old. Powered by WPeMatico
This is good. Powered by WPeMatico
Apple is fighting its own battle against leakers, using people and tactics from the NSA. According to the hour-long presentation, Apple’s Global Security team employs an undisclosed number of investigators around the world to prevent information from reaching competitors, counterfeiters, and the press, as well as hunt down the source when leaks do occur. Some … Read More “Fighting Leakers at Apple” »
Sad story of someone whose computer became owned by a griefer: The trouble began last year when he noticed strange things happening: files went missing from his computer; his Facebook picture was changed; and texts from his daughter didn’t reach him or arrived changed. “Nobody believed me,” says Gary. “My wife and my brother thought … Read More “Separating the Paranoid from the Hacked” »