Quantcast

Articles

Get all-in-one coverage of Internet security and online privacy issues brought up by the industry’s leading experts at security conferences and seminars.

Mikko Hypponen: Where Are We and Where Are We Going?

Taking the floor at Hack In Paris 2012 event, F-Secure’s CRO Mikko Hypponen depicts the global threatscape and speaks in detail about known groups of attackers. My name is Mikko Hypponen, and we will be speaking about the big picture, speaking about why we are still having all these problems, how come we...

Defending Privacy at the U.S. Border 6: Questions and Answers

This is the final Q&A part of the presentation by EFF’s Marcia Hofmann and Seth Schoen, where additional issues are raised, such as peculiarities of border inspection by different ports of entry, as well as Cloud and social network access requests from border agents. Marcia Hofmann speaking: I think...

Defending Privacy at the U.S. Border 5: Device-Specific Data Protection

This section encompasses considerations on whether there are decent alternatives to full disk encryption for protecting data in a border scenario; findings about data deletion beyond recovery; and data protection on devices other than PCs. Precautions against Border Searches Now, I’m traveling from the...

Defending Privacy at the U.S. Border 4: Data Encryption

The speakers now get to some technical and legal aspects of dealing with the password issue and data encryption when crossing the border, and provide tips applicable to the situation where you stick to the tactic of actually not knowing or refusing to turn over the password during your trip. Creating a...

Defending Privacy at the U.S. Border 3: Choosing a Strategy

EFF’s Marcia Hofmann and Seth Schoen focus on data privacy-related tactics and precautions one should take when planning to cross the United States border. Personal Background and Circumstances One thing that we realized was that there really isn’t one strategy that everybody should adopt for protecting...

Defending Privacy at the U.S. Border 2: Agencies and Policies

The primary spotlight in this part of the presentation is the hierarchy and authority of U.S. agencies associated with providing security at the border. U.S. Border Agencies So let’s talk a little bit about what we know about agency policies and procedures for performing searches at the border. I think a...

Defending Privacy at the U.S. Border: “Reasonable” Searches and Seizures

Electronic Frontier Foundation representatives Marcia Hofmann and Seth Shoen participate in Black Hat Europe 2012 Conference to present their white paper on guidelines for maintaining digital privacy when crossing the U.S. border. My name is Marcia Hofmann, I am a Senior Staff Attorney at the Electronic...

Layers of Security 4: Fighting Terror by Refusing to Be Terrorized

In the final part of the interview, Bruce Schneier gets to some conclusions on whether the cost of current security policies is worth the benefit, speaks on the war metaphor effect, and where the sensible line should be drawn in fighting terrorism. – Now, Bruce, you’ve just pointed something out and...

Layers of Security 3: Are We on the Right Track?

Bruce Schneier outlines the things in airplane security that he deems the right ones to focus on, and explains some downsides of the current state of affairs. – Tell me a bit more about security. If, in your opinion, what we need to do is spend more of the money we currently spend on screening at...

Layers of Security 2: The World after 9/11

Bruce Schneier now looks into the scope of terrorism threats in the last decade and further elaborates on the way airport security changed after the 9/11 attack. – So you see you are not alone, I think, in security analysts saying: “Hey, we don’t need to spend so much money on this stuff, and...