It is time to consider what the court order initiated by the FBI and issued to Apple reveals about expectations of US authorities in regards to personal data privacy, and whether we need to consider a different solution for Canada.
Data thieves don't have to be programming wizards to get their hands on your personal information. They often find hard drives that contain financial and other sensitive data at flea markets, charity shops, the city dump, and even on eBay. These tips will help you render an old drive's files unreadable.
The standard encryption mechanism used by Oracle Corp.'s database products can be easily circumvented, according to a German security researcher who last week published details on a number of unpatched security vulnerabiliities in the database vendor's products. Security expert Alexander Kornbrust plans to give a presentation at the Black Hat USA 2005 security conference this week showing how Oracle's encryption can be broken.
Wireless devices, including laptop computers and PDAs (personal digital assistants) that are widely used to access corporate computer networks rely on a protocol that has "major security flaws" and are vulnerable to hackers using easily obtained equipment, a research group at the University of California, Berkeley, has concluded in findings published on the Internet.