Kryptos On CIA Grounds Gets Final Clue.

The creator of Krytpos – a sculpture found on the grounds of the CIA and one of the more famous unsolved puzzles in the world – has revealed a clue, supposedly the last one, to prod enthusiasts into solving the object’s message. The sculpture, dedicated in 1990, has four encrypted messages. Three of these have […] read more

Thieves Using Bluetooth To Track Laptops and Smartphones To Steal.

As you travel and shop over the holidays, keep in mind that criminals will be working overtime in ways you don’t expect. According to wired.com, incidents where thieves are using Bluetooth scanners are increasing. At least, it’s the only conclusion to be drawn in a number of cases where phones and other electronics were stolen […] read more

Most of the Used Memory Cards Bought Online Are Not Properly Wiped.

According to tests carried out by researchers at the University of Hertfordshire (UK), nearly two-thirds of memory cards bought used from eBay, offline auctions, and second-hand shops were improperly wiped. That is, the researchers were able to access images or footage that were once saved to these electronic storage units… even if they were deleted. […] read more

Equifax Data Breach Continues To Bear Poisoned Fruit.

About two weeks ago, when Equifax first revealed their massive data breach, it was noted by many that the company didn’t appear to be prepared nor equipped to deal with the demands of whatever contingency plans they had prepared for the day they would be hacked. That was on the first day after Equifax had […] read more

Delaware Updates Data Breach Notification Rules.

Delaware, the second-smallest state but the leader in business incorporations, at least within the USA, has updated its legal framework regarding data breach notifications. Beginning on August 14, 2018, companies that experience a data breach must notify any affected individuals in Delaware within 60 days. In addition, credit monitoring – free of charge, of course […] read more

Sextortion Case Treads A Well-Worn Path: Are Passwords Protected Under the Fifth?.

A case of “sextortion” – blackmailing someone over naked footage (digital footage, more specifically, to reflect the times we live in) – between Instagram celebs has again dredged up the decidedly non-superfluous legal quagmire that’s been repeatedly visited since at least 2009: Is forcing a defendant to spit out his or her password a violation […] read more

Encryption Law: EU Ministers Say Encryption Must Provide Safe Harbor From Publicizing Data Breach.

Details are beginning to emerge for the European Union’s data protection laws.  Like many before it, the use of encryption software is being encouraged in order to safeguard the private information of people who fall under the EU’s jurisdiction.  In addition, a number of other details are being considered as well, such as the use […] read more