Blog

Blog

Schneier on Security: Info on Russian Bulk Surveillance

Seems like the NSA has competition (or is that a friendly rivalry)?   Russian law gives Russia’s security service, the FSB, the authority to use SORM “System for Operative Investigative […]

How to protect yourself against high-tech passport thieves

NEW YORK (PIX11) – But revelation that two Iranian passengers on the flight were able to board using stolen passports – has not eased concerns about what appear to be [...]

10 Years A (Digital) Slave

Article by Raj Goel I read a moving article on CNN.com about modern day slavery in Mauritania (see http://www.cnn.com/interactive/2012/03/world/mauritania.slaverys.last.stronghold/index.html/ ). Yes, slavery still exists and 10-20% of the Mauritanian population […]

Privacy vs. Security — What do you choose?

Below is an excerpt from the Keynote presentation I delivered at GBATA 2013 in Helsinki, Finland. It is based upon my“A Global Overview of Trends in Personal, Corporate and Government […]

Beware The Little Sisters

This article originally appeared in De Volkskrant – http://www.volkskrant.nl/vk/nl/2844/Archief/archief/article/detail/3394833/2013/02/16/Vrees-de-Little-Sisters.dhtml Everybody spies on everybody on the Internet. Your blogs, emails, tweets and Photos can [and will] always and everywhere be used […]

Trends in Financial Crimes

High-tech professional criminals are getting ever more clever Malicious attacks on databases and incidents of online and other tech-related thefts continue to evolve in number and manner leaving both consumers […]

Is there any harm in continous surveillance?

For years, clients asked us what was the REAL cost of non-compliance (with HIPAA, PCI, etc).  Thankfully, Dr. Ponemon & his team put some real numbers to the cost of […]

Laptop, Smartphone – what's the difference?

What’s the difference between your laptop and your smartphone? When it comes to information leakage, not much. As the Wired article shows, cell phone wipes leave almost as much data […]

Peter Teffer interviews Raj Goel

After the NCSC 2013 presentation, Peter Teffer interviewed me.   Here’s a (very poor) Google translation of his original Dutch article If we do not ask, we will not get. […]

Michael Ahti – How China controls the internet

The NCSC conference 2013 was an amazing event #1   Michael Ahti’s presentation on how China controls their internet (and how other countries are copying their model) was education and […]