Author Archives: jimg
Current Events: No need for jello, fingerprint USB sticks are easy to crack.
No need to go to great lengths to try to spoof finger print scanners on USB sticks. You can just tell the device that the data is public. Researches discovered this vulnerability in models from 9pay and A-Data fingerprint USB … Continue reading
Security Review: Apple iPhone 3rd party application support
On Thursday, Apple happily unveiled its plan for third party support of native iPhone applications. The plan involves an application development and distribution pipeline including an iPhone SDK, a suite of IDE tools, and a sales and distribution plan through … Continue reading
Security Review: Mac OS X Dashboard Widgets
The Mac OS X Dashboard is a platform for developing small applications, or Widgets, that can be accessed and hidden quickly at any time within the OS. Common widgets tasks include simple calendars, calculators, games, weather tracking, and system monitoring. … Continue reading
Google Privacy Policy: 2007 in Review
Google has posted a video recap of 2007’s privacy policies. In the heart of “don’t be evil”, Google Global Privacy Counsel member Peter Fleischer covers Google’s position on some of the toughest privacy topics of our time.
Perfect Security: Delusional and Misdirected
I hesitate to post commentary about this article, but feel that is important to deconstruct claims by those believing they have all the answers. Especially when they are posting in high-profile blog sites. InfoWorld’s Security adviser Roger A. Grimes has … Continue reading
Define “Safe”…
An article in InformationWeek yesterday exposes the details of what McAfee’s ScanAlert product actually means by “Hacker Safe”. The ScanAlert product issues certifications that websites are safe from attack. However XSSed.com, a website dedicated to exposing Cross-Site Scripting attacks, gave … Continue reading
GOA says “The IRS security still sucks”
According to a report Tuesday from the Government Accountability Office, sensitive taxpayer data housed at the IRS is critically vulnerable to security threats. The report is a follow up from March 2006 where the security problems were initially discovered. The … Continue reading