• Top-Rated Password Manager for Personal Business Use 1Password California Consumer Privacy Act CCPA

    Updated: 2024-12-08 09:40:16
    Skip to Main Content Empower teams . Maintain visibility . Extended Access Management is here . Explore XAM Every sign-in , secure 1Password is so much more than a password . manager View plans Talk to sales Security and productivity wrapped into one 150,000 businesses trust 1Password Protection for all – from enterprises to individuals Why people trust 1Password The most used enterprise password . manager Rated best password manager by Wired Millions of customers rely on 1Password for password security 206 return on investment according to Forrester Research 4.7 customer satisfaction rating on Trustpilot A reputation for fast , reliable , and transparent customer support The most used enterprise password . manager Rated best password manager by Wired Millions of customers rely on

  • 1 Password Manager Vault App with Single-Sign On MFA Solutions LastPass img-icon-footer-facebook img

    Updated: 2024-12-08 09:40:15
    Skip to Content Products By plan Business 20 off Designed for businesses of all sizes , from small startups to . enterprises Teams 30 off For single teams just getting started with password . management Families 50 off Premium password management for family or group of 6 . people Personal 50 off Multi-device password management and sharing for 1 . person Compare plans Why LastPass See why you or your business needs a password manager Try Business free Free LastPass Business trial , no credit card . required Try Personal free Free LastPass Premium trial , no credit card . required Features Password management Password management Save and autofill Password generator Password sharing Dark web monitoring Passwordless vault login All personal features Administrative User management Multifactor

  • The Privacy Blog

    Updated: 2024-12-08 09:40:15
    The Privacy Blog Blog About Contact Search Navigation Blog About Contact Search Do you use any of the worst passwords of 2016 January 25, 2017 by lance in Passwords It is time to talk about passwords again . They are like the seatbelts of the security world . There are many more exciting security tools but few are as important to keeping you safe from the risks you encounter day to . day Splash Data recently released their list of the most common passwords from 2016 based on over five million stolen and leaked . credentials Clearly things have improved and password requirements and gotten more stringent because the winner is no longer 1234, which has dropped to 11. It is now 123456 Second place goes to that perennial favorite “password” and we see12345 in third . place Rather than

  • The Privacy Blog

    Updated: 2024-12-08 09:40:14
    The Privacy Blog Blog About Contact Search Navigation Blog About Contact Search Do you use any of the worst passwords of 2016 January 25, 2017 by lance in Passwords It is time to talk about passwords again . They are like the seatbelts of the security world . There are many more exciting security tools but few are as important to keeping you safe from the risks you encounter day to . day Splash Data recently released their list of the most common passwords from 2016 based on over five million stolen and leaked . credentials Clearly things have improved and password requirements and gotten more stringent because the winner is no longer 1234, which has dropped to 11. It is now 123456 Second place goes to that perennial favorite “password” and we see12345 in third . place Rather than

  • Your Android phone may be passing your texts to China The Privacy Blog

    Updated: 2024-12-08 09:40:14
    The Privacy Blog Blog About Contact Search Navigation Blog About Contact Search Your Android phone may be passing your texts to China November 15, 2016 by lance in Surveillance Security firm Kryptowire discovered that at least hundreds of thousands of Android phones in the US are configured to automatically send all text messages , call logs , location information , contact lists and more to servers in China every 72 hours . This is all invisible to the end . user In the US , the dangerous software , made by Adups , is known to be on 120,000 phones made by BLU Products . The software appears to have been designed primarily for the Chinese market and impacts in the US may have been unintentional . Adups provides the software to ZTE and Huawei , two of the largest phone makers in the . world

  • The Privacy Blog

    Updated: 2024-12-08 09:40:14
    The Privacy Blog Blog About Contact Search Navigation Blog About Contact Search Your Android phone may be passing your texts to China November 15, 2016 by lance in Surveillance Security firm Kryptowire discovered that at least hundreds of thousands of Android phones in the US are configured to automatically send all text messages , call logs , location information , contact lists and more to servers in China every 72 hours . This is all invisible to the end . user In the US , the dangerous software , made by Adups , is known to be on 120,000 phones made by BLU Products . The software appears to have been designed primarily for the Chinese market and impacts in the US may have been unintentional . Adups provides the software to ZTE and Huawei , two of the largest phone makers in the . world

  • The Privacy Blog

    Updated: 2024-12-08 09:40:12
    The Privacy Blog Blog About Contact Search Navigation Blog About Contact Search Your Android phone may be passing your texts to China November 15, 2016 by lance in Surveillance Security firm Kryptowire discovered that at least hundreds of thousands of Android phones in the US are configured to automatically send all text messages , call logs , location information , contact lists and more to servers in China every 72 hours . This is all invisible to the end . user In the US , the dangerous software , made by Adups , is known to be on 120,000 phones made by BLU Products . The software appears to have been designed primarily for the Chinese market and impacts in the US may have been unintentional . Adups provides the software to ZTE and Huawei , two of the largest phone makers in the . world

  • The Privacy Blog

    Updated: 2024-12-08 09:40:11
    The Privacy Blog Blog About Contact Search Navigation Blog About Contact Search Your Android phone may be passing your texts to China November 15, 2016 by lance in Surveillance Security firm Kryptowire discovered that at least hundreds of thousands of Android phones in the US are configured to automatically send all text messages , call logs , location information , contact lists and more to servers in China every 72 hours . This is all invisible to the end . user In the US , the dangerous software , made by Adups , is known to be on 120,000 phones made by BLU Products . The software appears to have been designed primarily for the Chinese market and impacts in the US may have been unintentional . Adups provides the software to ZTE and Huawei , two of the largest phone makers in the . world

  • The Privacy Blog

    Updated: 2024-12-08 09:40:11
    The Privacy Blog Blog About Contact Search Navigation Blog About Contact Search Your Android phone may be passing your texts to China November 15, 2016 by lance in Surveillance Security firm Kryptowire discovered that at least hundreds of thousands of Android phones in the US are configured to automatically send all text messages , call logs , location information , contact lists and more to servers in China every 72 hours . This is all invisible to the end . user In the US , the dangerous software , made by Adups , is known to be on 120,000 phones made by BLU Products . The software appears to have been designed primarily for the Chinese market and impacts in the US may have been unintentional . Adups provides the software to ZTE and Huawei , two of the largest phone makers in the . world

  • The Privacy Blog

    Updated: 2024-12-08 09:40:11
    The Privacy Blog Blog About Contact Search Navigation Blog About Contact Search Your Android phone may be passing your texts to China November 15, 2016 by lance in Surveillance Security firm Kryptowire discovered that at least hundreds of thousands of Android phones in the US are configured to automatically send all text messages , call logs , location information , contact lists and more to servers in China every 72 hours . This is all invisible to the end . user In the US , the dangerous software , made by Adups , is known to be on 120,000 phones made by BLU Products . The software appears to have been designed primarily for the Chinese market and impacts in the US may have been unintentional . Adups provides the software to ZTE and Huawei , two of the largest phone makers in the . world

  • Your Android phone may be passing your texts to China The Privacy Blog

    Updated: 2024-12-08 09:40:10
    The Privacy Blog Blog About Contact Search Navigation Blog About Contact Search Your Android phone may be passing your texts to China November 15, 2016 by lance in Surveillance Security firm Kryptowire discovered that at least hundreds of thousands of Android phones in the US are configured to automatically send all text messages , call logs , location information , contact lists and more to servers in China every 72 hours . This is all invisible to the end . user In the US , the dangerous software , made by Adups , is known to be on 120,000 phones made by BLU Products . The software appears to have been designed primarily for the Chinese market and impacts in the US may have been unintentional . Adups provides the software to ZTE and Huawei , two of the largest phone makers in the . world

  • How was the Internet of Things able to take down the Internet with a DDoS The Privacy Blog

    Updated: 2024-12-08 09:40:10
    The Privacy Blog Blog About Contact Search Navigation Blog About Contact Search How was the Internet of Things able to take down the Internet with a DDoS October 24, 2016 by lance in hacking On October 21st , a large number of websites , including some of the biggest names , were knocked off the Internet by a massive distributed denial-of-service DDoS attack . A DDoS attack occurs when thousands to millions of devices send traffic to a target , completely overloading its servers or Internet connection . The recent  attack targeted a company called DYN , a DNS service provider for thousands of companies . DNS translates the name of an Internet host like theprivacyblog.com and converts it to an IP address like 52.204.10.149. Your computer then uses this to do the actual communicating . By

  • The Privacy Blog

    Updated: 2024-12-08 09:40:08
    The Privacy Blog Blog About Contact Search Navigation Blog About Contact Search How was the Internet of Things able to take down the Internet with a DDoS October 24, 2016 by lance in hacking On October 21st , a large number of websites , including some of the biggest names , were knocked off the Internet by a massive distributed denial-of-service DDoS attack . A DDoS attack occurs when thousands to millions of devices send traffic to a target , completely overloading its servers or Internet connection . The recent  attack targeted a company called DYN , a DNS service provider for thousands of companies . DNS translates the name of an Internet host like theprivacyblog.com and converts it to an IP address like 52.204.10.149. Your computer then uses this to do the actual communicating . By

  • The Privacy Blog

    Updated: 2024-12-08 09:40:07
    The Privacy Blog Blog About Contact Search Navigation Blog About Contact Search How was the Internet of Things able to take down the Internet with a DDoS October 24, 2016 by lance in hacking On October 21st , a large number of websites , including some of the biggest names , were knocked off the Internet by a massive distributed denial-of-service DDoS attack . A DDoS attack occurs when thousands to millions of devices send traffic to a target , completely overloading its servers or Internet connection . The recent  attack targeted a company called DYN , a DNS service provider for thousands of companies . DNS translates the name of an Internet host like theprivacyblog.com and converts it to an IP address like 52.204.10.149. Your computer then uses this to do the actual communicating . By

  • The Privacy Blog

    Updated: 2024-12-08 09:40:07
    The Privacy Blog Blog About Contact Search Navigation Blog About Contact Search How was the Internet of Things able to take down the Internet with a DDoS October 24, 2016 by lance in hacking On October 21st , a large number of websites , including some of the biggest names , were knocked off the Internet by a massive distributed denial-of-service DDoS attack . A DDoS attack occurs when thousands to millions of devices send traffic to a target , completely overloading its servers or Internet connection . The recent  attack targeted a company called DYN , a DNS service provider for thousands of companies . DNS translates the name of an Internet host like theprivacyblog.com and converts it to an IP address like 52.204.10.149. Your computer then uses this to do the actual communicating . By

  • The Privacy Blog

    Updated: 2024-12-08 09:40:07
    The Privacy Blog Blog About Contact Search Navigation Blog About Contact Search How was the Internet of Things able to take down the Internet with a DDoS October 24, 2016 by lance in hacking On October 21st , a large number of websites , including some of the biggest names , were knocked off the Internet by a massive distributed denial-of-service DDoS attack . A DDoS attack occurs when thousands to millions of devices send traffic to a target , completely overloading its servers or Internet connection . The recent  attack targeted a company called DYN , a DNS service provider for thousands of companies . DNS translates the name of an Internet host like theprivacyblog.com and converts it to an IP address like 52.204.10.149. Your computer then uses this to do the actual communicating . By

  • How was the Internet of Things able to take down the Internet with a DDoS The Privacy Blog

    Updated: 2024-12-08 09:40:06
    The Privacy Blog Blog About Contact Search Navigation Blog About Contact Search How was the Internet of Things able to take down the Internet with a DDoS October 24, 2016 by lance in hacking On October 21st , a large number of websites , including some of the biggest names , were knocked off the Internet by a massive distributed denial-of-service DDoS attack . A DDoS attack occurs when thousands to millions of devices send traffic to a target , completely overloading its servers or Internet connection . The recent  attack targeted a company called DYN , a DNS service provider for thousands of companies . DNS translates the name of an Internet host like theprivacyblog.com and converts it to an IP address like 52.204.10.149. Your computer then uses this to do the actual communicating . By

  • The Privacy Blog

    Updated: 2024-12-08 09:40:06
    The Privacy Blog Blog About Contact Search Navigation Blog About Contact Search So many reasons to never buy a D-Link router October 03, 2016 by lance in Stupidity vulnerability If you care at all about security and privacy , a recent security analysis of the D-Link DWR-932 B LTE router will make your head . explode Researcher Pierre Kim found an amazing set of security vulnerabilities that should embarrass a first year . developer First , by default you and SSH and Telnet yes Telnet into the router using the root or admin accounts . These accounts have preset passwords of “admin” and “1234” respectively . People , you should never set up fixed accounts like this , and if you do don†t use trivial passwords Of course it gets worse . There is also a backdoor on the routers . If

  • The Privacy Blog

    Updated: 2024-12-08 09:40:05
    The Privacy Blog Blog About Contact Search Navigation Blog About Contact Search So many reasons to never buy a D-Link router October 03, 2016 by lance in Stupidity vulnerability If you care at all about security and privacy , a recent security analysis of the D-Link DWR-932 B LTE router will make your head . explode Researcher Pierre Kim found an amazing set of security vulnerabilities that should embarrass a first year . developer First , by default you and SSH and Telnet yes Telnet into the router using the root or admin accounts . These accounts have preset passwords of “admin” and “1234” respectively . People , you should never set up fixed accounts like this , and if you do don†t use trivial passwords Of course it gets worse . There is also a backdoor on the routers . If

  • Macs are not safe from Bears The Privacy Blog

    Updated: 2024-12-08 09:40:04
    The Privacy Blog Blog About Contact Search Navigation Blog About Contact Search Macs are not safe from Bears September 27, 2016 by lance in malware Mac users have long had an unwarranted level of confidence about their immunity to malware and hackers . Palo Alto Networks†recently discovered some Mac malware in the wild , which I hope will make us Mac users pay more attention to security . The malware , which targets mostly the aerospace industry , appears to be from an APT group they call “Fancy . Bear” The malware is a trojan executable designed to look and act like a PDF file . It is being used in highly targeted attacks where the apparent content of the file is something that the recipient was expecting to . receive These kinds of attacks typically start with the nation state

  • The Privacy Blog

    Updated: 2024-12-08 09:40:04
    The Privacy Blog Blog About Contact Search Navigation Blog About Contact Search Macs are not safe from Bears September 27, 2016 by lance in malware Mac users have long had an unwarranted level of confidence about their immunity to malware and hackers . Palo Alto Networks†recently discovered some Mac malware in the wild , which I hope will make us Mac users pay more attention to security . The malware , which targets mostly the aerospace industry , appears to be from an APT group they call “Fancy . Bear” The malware is a trojan executable designed to look and act like a PDF file . It is being used in highly targeted attacks where the apparent content of the file is something that the recipient was expecting to . receive These kinds of attacks typically start with the nation state

  • The Privacy Blog

    Updated: 2024-12-08 09:40:04
    The Privacy Blog Blog About Contact Search Navigation Blog About Contact Search Macs are not safe from Bears September 27, 2016 by lance in malware Mac users have long had an unwarranted level of confidence about their immunity to malware and hackers . Palo Alto Networks†recently discovered some Mac malware in the wild , which I hope will make us Mac users pay more attention to security . The malware , which targets mostly the aerospace industry , appears to be from an APT group they call “Fancy . Bear” The malware is a trojan executable designed to look and act like a PDF file . It is being used in highly targeted attacks where the apparent content of the file is something that the recipient was expecting to . receive These kinds of attacks typically start with the nation state

  • The Privacy Blog

    Updated: 2024-12-08 09:40:03
    The Privacy Blog Blog About Contact Search Navigation Blog About Contact Search Macs are not safe from Bears September 27, 2016 by lance in malware Mac users have long had an unwarranted level of confidence about their immunity to malware and hackers . Palo Alto Networks†recently discovered some Mac malware in the wild , which I hope will make us Mac users pay more attention to security . The malware , which targets mostly the aerospace industry , appears to be from an APT group they call “Fancy . Bear” The malware is a trojan executable designed to look and act like a PDF file . It is being used in highly targeted attacks where the apparent content of the file is something that the recipient was expecting to . receive These kinds of attacks typically start with the nation state

  • The Privacy Blog

    Updated: 2024-12-08 09:40:03
    The Privacy Blog Blog About Contact Search Navigation Blog About Contact Search Macs are not safe from Bears September 27, 2016 by lance in malware Mac users have long had an unwarranted level of confidence about their immunity to malware and hackers . Palo Alto Networks†recently discovered some Mac malware in the wild , which I hope will make us Mac users pay more attention to security . The malware , which targets mostly the aerospace industry , appears to be from an APT group they call “Fancy . Bear” The malware is a trojan executable designed to look and act like a PDF file . It is being used in highly targeted attacks where the apparent content of the file is something that the recipient was expecting to . receive These kinds of attacks typically start with the nation state

  • Macs are not safe from Bears The Privacy Blog

    Updated: 2024-12-08 09:40:02
    The Privacy Blog Blog About Contact Search Navigation Blog About Contact Search Macs are not safe from Bears September 27, 2016 by lance in malware Mac users have long had an unwarranted level of confidence about their immunity to malware and hackers . Palo Alto Networks†recently discovered some Mac malware in the wild , which I hope will make us Mac users pay more attention to security . The malware , which targets mostly the aerospace industry , appears to be from an APT group they call “Fancy . Bear” The malware is a trojan executable designed to look and act like a PDF file . It is being used in highly targeted attacks where the apparent content of the file is something that the recipient was expecting to . receive These kinds of attacks typically start with the nation state

  • Gary McGraw interviews me on The Silver Bullet Security Podcast The Privacy Blog

    Updated: 2024-12-08 09:40:02
    The Privacy Blog Blog About Contact Search Navigation Blog About Contact Search Gary McGraw interviews me on The Silver Bullet Security Podcast July 28, 2016 by lance in Uncategorized I had a great time talking with Gary about privacy , anonymity , security , Cypherpunks , WikiLeaks , and more . Check it out Show 124 : Lance Cottrell Discusses Anonymity and Privacy Cigital July 28, 2016 lance interview Podcast Uncategorized Newer Older Privacy Policy

  • The Privacy Blog

    Updated: 2024-12-08 09:40:02
    The Privacy Blog Blog About Contact Search Navigation Blog About Contact Search Gary McGraw interviews me on The Silver Bullet Security Podcast July 28, 2016 by lance in Uncategorized I had a great time talking with Gary about privacy , anonymity , security , Cypherpunks , WikiLeaks , and more . Check it out Show 124 : Lance Cottrell Discusses Anonymity and Privacy Cigital July 28, 2016 lance interview Podcast Uncategorized Comment The Big Hack , or maybe not . — The Social Network Station August 11, 2014 by lance in Interview Security Breaches The Big Hack , or maybe not . — The Social Network Station On Friday I was asked to come on The Social Network Show to talk about the fact and questions surrounding the theft of over 1 Billion . passwords Lance Cottrell is the Founder and Chief

  • The Privacy Blog

    Updated: 2024-12-08 09:40:01
    The Privacy Blog Blog About Contact Search Navigation Blog About Contact Search Gary McGraw interviews me on The Silver Bullet Security Podcast July 28, 2016 by lance in Uncategorized I had a great time talking with Gary about privacy , anonymity , security , Cypherpunks , WikiLeaks , and more . Check it out Show 124 : Lance Cottrell Discusses Anonymity and Privacy Cigital July 28, 2016 lance interview Podcast Uncategorized Comment What Hand Sanitizer Can Teach Us About Cybersecurity April 29, 2015 by lance in Podcast What Hand Sanitizer Can Teach Us About Cybersecurity Lessons learned while trying to stay healthy while walking around the RSA security . conference Read More April 29, 2015 lance cybersecurity hand sanitizer Podcast RSA RSA Conference security vlog Podcast 1 Comment Snipers

  • Gary McGraw interviews me on The Silver Bullet Security Podcast The Privacy Blog

    Updated: 2024-12-08 09:40:01
    The Privacy Blog Blog About Contact Search Navigation Blog About Contact Search Gary McGraw interviews me on The Silver Bullet Security Podcast July 28, 2016 by lance in Uncategorized I had a great time talking with Gary about privacy , anonymity , security , Cypherpunks , WikiLeaks , and more . Check it out Show 124 : Lance Cottrell Discusses Anonymity and Privacy Cigital July 28, 2016 lance interview Podcast Uncategorized Newer Older Privacy Policy

  • Security lessons from Pokemon Go Catch them all The Privacy Blog

    Updated: 2024-12-08 09:40:01
    The Privacy Blog Blog About Contact Search Navigation Blog About Contact Search Security lessons from Pokemon Go Catch them all July 12, 2016 by lance in Location malware When anything big happens on the Internet , the criminals and snoops are not far behind . This time the event is Pokemon Go and there are all kinds of different threats developing in its wake from malware to tracking to physical danger . I you are not familiar with this game yet just look around next time you step outside , it is . everywhere Criminals have jumped quickly on the piecemeal global rollout of the game . Players unwilling to wait for the official release in their countries have been looking for the game on unofficial app stores . A version with the Android trojan DroidJack has been seen which allows the

  • The Privacy Blog

    Updated: 2024-12-08 09:40:01
    The Privacy Blog Blog About Contact Search Navigation Blog About Contact Search Security lessons from Pokemon Go Catch them all July 12, 2016 by lance in Location malware When anything big happens on the Internet , the criminals and snoops are not far behind . This time the event is Pokemon Go and there are all kinds of different threats developing in its wake from malware to tracking to physical danger . I you are not familiar with this game yet just look around next time you step outside , it is . everywhere Criminals have jumped quickly on the piecemeal global rollout of the game . Players unwilling to wait for the official release in their countries have been looking for the game on unofficial app stores . A version with the Android trojan DroidJack has been seen which allows the

  • The Privacy Blog

    Updated: 2024-12-08 09:40:00
    The Privacy Blog Blog About Contact Search Navigation Blog About Contact Search Security lessons from Pokemon Go Catch them all July 12, 2016 by lance in Location malware When anything big happens on the Internet , the criminals and snoops are not far behind . This time the event is Pokemon Go and there are all kinds of different threats developing in its wake from malware to tracking to physical danger . I you are not familiar with this game yet just look around next time you step outside , it is . everywhere Criminals have jumped quickly on the piecemeal global rollout of the game . Players unwilling to wait for the official release in their countries have been looking for the game on unofficial app stores . A version with the Android trojan DroidJack has been seen which allows the

  • The Privacy Blog

    Updated: 2024-12-08 09:40:00
    The Privacy Blog Blog About Contact Search Navigation Blog About Contact Search Security lessons from Pokemon Go Catch them all July 12, 2016 by lance in Location malware When anything big happens on the Internet , the criminals and snoops are not far behind . This time the event is Pokemon Go and there are all kinds of different threats developing in its wake from malware to tracking to physical danger . I you are not familiar with this game yet just look around next time you step outside , it is . everywhere Criminals have jumped quickly on the piecemeal global rollout of the game . Players unwilling to wait for the official release in their countries have been looking for the game on unofficial app stores . A version with the Android trojan DroidJack has been seen which allows the

  • Security lessons from Pokemon Go Catch them all The Privacy Blog

    Updated: 2024-12-08 09:39:59
    The Privacy Blog Blog About Contact Search Navigation Blog About Contact Search Security lessons from Pokemon Go Catch them all July 12, 2016 by lance in Location malware When anything big happens on the Internet , the criminals and snoops are not far behind . This time the event is Pokemon Go and there are all kinds of different threats developing in its wake from malware to tracking to physical danger . I you are not familiar with this game yet just look around next time you step outside , it is . everywhere Criminals have jumped quickly on the piecemeal global rollout of the game . Players unwilling to wait for the official release in their countries have been looking for the game on unofficial app stores . A version with the Android trojan DroidJack has been seen which allows the

  • Downloading files is dangerous these tips can keep you safe The Privacy Blog

    Updated: 2024-12-08 09:39:59
    , The Privacy Blog Blog About Contact Search Navigation Blog About Contact Search Downloading files is dangerous , these tips can keep you safe July 01, 2016 by lance in Uncategorized When it comes to checking for hostile files coming in from the web , it is much more difficult than simply scanning an email . Communications are being conducted in real-time and often encrypted . So in order to defend against the two ways to get malware when surfing the Internet — an exploited browser which automatically downloads malware without the need for you to click anything and being tricked into downloading an infected file — you need a secure browser and some common . sense To effectively protect yourself against browser exploits it doesn†t take much , you just need to use a secure browser .

  • Downloading files is dangerous these tips can keep you safe The Privacy Blog

    Updated: 2024-12-08 09:39:57
    , The Privacy Blog Blog About Contact Search Navigation Blog About Contact Search Downloading files is dangerous , these tips can keep you safe July 01, 2016 by lance in Uncategorized When it comes to checking for hostile files coming in from the web , it is much more difficult than simply scanning an email . Communications are being conducted in real-time and often encrypted . So in order to defend against the two ways to get malware when surfing the Internet — an exploited browser which automatically downloads malware without the need for you to click anything and being tricked into downloading an infected file — you need a secure browser and some common . sense To effectively protect yourself against browser exploits it doesn†t take much , you just need to use a secure browser .

  • Why the FBI Apple hack is a good thing for security The Privacy Blog

    Updated: 2024-12-08 09:39:57
    The Privacy Blog Blog About Contact Search Navigation Blog About Contact Search Why the FBI Apple hack is a good thing for security March 29, 2016 by lance in Personal Privacy There is a lot of hand wringing about the announcement that the FBI , with outside help , has been able to break into Syed Farook†s iPhone . This is not at all the same situation we would have if Apple had agreed to create the FBI requested version of the operating system . The important difference is scalability . With this announcement we now know that law enforcement can break into any iPhone of that generation or earlier at least given sufficient effort . That effort is the key . It appears that the phone hack requires disassembling the phone and desoldering at least one chip at a minimum . It might actually be

  • The Privacy Blog

    Updated: 2024-12-08 09:39:57
    The Privacy Blog Blog About Contact Search Navigation Blog About Contact Search Why the FBI Apple hack is a good thing for security March 29, 2016 by lance in Personal Privacy The FBI's hack of Syed Farook†s iPhone appears to be a lot of work . This makes the security implications much less . disturbing Read More March 29, 2016 lance apple fbi hack iphone Personal Privacy Comment Apple can't decrypt your phone September 26, 2014 by lance in apple cellular Cryptography Personal Privacy Since it was introduced , Apple has had the ability to decrypt the contents if iPhones and other iOS devices when asked to do so with a warrant Apple recently announced that with iOS 8 Apple will no longer be able to do so . Predictably , there has been a roar of outrage from many in law enforcement .

  • The Privacy Blog

    Updated: 2024-12-08 09:39:57
    The Privacy Blog Blog About Contact Search Navigation Blog About Contact Search Why the FBI Apple hack is a good thing for security March 29, 2016 by lance in Personal Privacy The FBI's hack of Syed Farook†s iPhone appears to be a lot of work . This makes the security implications much less . disturbing Read More March 29, 2016 lance apple fbi hack iphone Personal Privacy Comment Holder is wrong backdoors and security can not . coexist October 01, 2014 by lance in apple Cryptography legal In the article below Attorney General Eric Holder said “It is fully possible to permit law enforcement to do its job while still adequately protecting personal privacy” This is simply not true , and harkens back to the discredited arguments made by the FBI in the 1990†s about the Clipper . Chip

Current Feed Items | Previous Months Items

Nov 2024 | Oct 2024 | Sep 2024 | Aug 2024 | Jul 2024 | Jun 2024