Daily Archives: February 24, 2008

Google to Store Patient Health Data

News article here, covered on Slashdot here. Google, with the cooperation of the Cleveland Clinic, is beginning a project to record medical history and other health-related data for patients. The stated goal is to provide patients with a way to … Continue reading

Posted in Current Events, Ethics, Privacy | Tagged , , | 7 Comments

ISP caching issue exposes Gmail data

Last week, when a Kuwait-based Gmail user tried logging in, he was denied access to his own account, and instead was granted access to over 30 accounts that did not belong to him. He was able to peek into other … Continue reading

Posted in Current Events | Tagged | 3 Comments

Security Review: Coin-Operated Laundromats

They’re out there…Some of us use them everyday…Especially college students living away from home…We can’t avoid them, unless we want to be stinky… Yes I’m talking about coin-operated laundries… Coin-operated washing facilities provide an interesting security problem, since the users … Continue reading

Posted in Miscellaneous, Physical Security, Security Reviews | 6 Comments

Collaborative Security Review: Wave2Go

This security review is intentionally left incomplete. It is simply a topic that I think would be interesting for us as a group to explore. If you can add to the discussion, please do, even if it’s simply to propose … Continue reading

Posted in Physical Security, Security Reviews | Tagged , , | 2 Comments

U.S. Intelligence wants to monitor WoW chat

Called The Reynard project, it is a series of plans for the U.S. Intelligence to monitor more internet traffic, most notably, data mining from several major MMORPGs, including WoW. The goal being to eventually create a system that can “automatically … Continue reading

Posted in Current Events, Policy, Privacy | 2 Comments

Security Review: Full disk encryption

Summary The past week has seen a renewed interest on the part of the security community in the reliability of hard disk encryption. With the recent revelation that data on encrypted drives is vulnerable to unauthorized access via memory manipulation, … Continue reading

Posted in Security Reviews | Comments Off on Security Review: Full disk encryption

Security Researchers Crack Wireless GSM Encryption

Security researchers have announced the development of a ultra-fast method of cracking wireless GSM encryption in 30 minutes or less.  The 64-bit encryption algorithm was cracked in theory over 10 years ago, but the development of new technology has exploited … Continue reading

Posted in Current Events, Privacy | Tagged , , , , | 6 Comments

Now that we are being listened to

The government has decided to continue wiretapping phones with assistance from phone companies. These companies are also pushing a bill for immunity from lawsuits for participating in the tapping. What is the line at which informational surveillance pushes too far … Continue reading

Posted in Current Events, Policy, Privacy | Comments Off on Now that we are being listened to

16 hackers got arrested in Quebec recently

Recently, the police department in Quebec, Canada, busted an international hacking network. 16 people that were between the ages of 17 and 26 were arrested and this was the biggest hacking scam in Canadian history according to the police. These … Continue reading

Posted in Current Events, Ethics, Integrity | 2 Comments