A Tale of a Lost Device

A couple of weeks ago,  I left my Kindle e-reader in my airplane seat. I know, I should have listened to the flight attendant’s advice to check the seat around me and so on, but I guess I was too tired to hear her. Aside from the “oh crap, those aren’t cheap” thoughts, there were […]
Read More ›

Cyber Security and Masquerade — Not Just For Halloween

It’s nearly Halloween here in the US and that means costumes and masquerade. Google tells us that “masquerade” is a noun meaning “a false show or pretense” or a verb meaning “pretend to be someone one is not”. These have the same sense as the cyber security definition from RFC 4949, “A type of threat […]
Read More ›

Why You Need to Pay Attention to the Wyndham Case

The US government is getting closer to being able to hold companies liable for cyber security breaches. Three years ago I wrote about a lawsuit by the Federal Trade Commission against Wyndham hotels (actually a collection of business entities). They alleged, among other things, that Wyndham used bad passwords, stored customers’ data unencrypted. After requesting […]
Read More ›

Illusions of Security and the Dangers of Complacency

We all get complacent. We look at something that we believe works and we believe it still works. This is not, of course, an appropriate mindset for the cyber security world. We need to be inquisitive, challenge conventional beliefs, and generally skeptical of new tools as well as the ones we use. We need to […]
Read More ›

Passive Keyless Entry & the Security/Ease-of-Use Trade-off

During a TV commercial the other evening my wife asked, “How do those push-button car starters work? Can just anyone start your car if the door is open?” That’s a good question and it has a significant cyber security component. First — to directly answer her question — no, not just anyone can start the […]
Read More ›

Type to search blog.learningtree.com

Do you mean "" ?

Sorry, no results were found for your query.

Please check your spelling and try your search again.