Security

Apple vs FBI – a new chapter in the second Crypto War?

1 min. reading time

February 22, 2016

US government ordered Apple to collaborate with the FBI to access the data in the iPhone of a suspected terrorist who perpetrated the massacre of San Bernardino, last December. Apple refuses to comply with the court order, claiming that it has much wider implications with regard to data privacy and security of mobile device owners.

Continue reading

Worst Passwords of 2015

1 min. reading time

January 22, 2016

SplashData released its annual “Worst Passwords List” showing no major differences from the previous year. What does this mean? Simple. Many people continue to put themselves at risk of hacking and identity theft using weak passwords that are easy to guess.

Continue reading

Adding security to Linux kernel

1 min. reading time

November 16, 2015

Linus Torvalds advocates the gradual evolution of the Linux kernel according to principles such as stability, reliability and performance, and never “breaking the user space” (i.e., never causing something that a user depends on to stop working). Many experts in the security field believe that this approach to security is too passive, bordering on indifference, as the kernel of an operating system is the essential part of any device, and listed 12 Linux kernel issues that need serious attention.

Continue reading

Second Crypto War: battle won by the pro-security

1 min. reading time

October 15, 2015

Obama Administration decided not to pursue legislation that would force computer and communications equipment manufacturers to add backdoors to their products, for access by duly authorized government agencies.

Continue reading