Apple is the latest in a host of technology players to be requested to allow exceptional access, that is, access in exceptional cases where it would be deemed to have high value relative to an active investigation.
Car security is rising to the fore here at CES 2016, which is not altogether surprising as 2015 was the year when car hacking really crossed over into the mainstream.
As ever, ESET is once again in attendance at CES in Las Vegas, offering you expert insight into all the security aspects of this year’s show, which, from what have seen so far, is a key focus for CES in 2016.
At a recent conference on “the future of wearables” I was asked to speak about security. I think my presentation surprised some people because I didn’t focus on the security of wearable devices themselves. This article summarizes what I said, with a link to my slides and some free resources you might find helpful. For
In an article I wrote recently for Infosecurity Magazine – Spelling Bee (Input from the Hive Mind – I touched on the topic of textual analysis (in a rather loose sense). This was in response to some comments implying that it’s a good indicator of scamminess when a message uses US or UK spellings inappropriate to
Introduction It might not have escaped your notice that I write quite a lot about support scams, an issue in which most commentators in the security industry take only sporadic interest and tend to regard as of only niche interest. (As when a scammer is damaging their brand or product in some way, for instance