I on occasion get asked whether the data that is stored in call center systems, such as audio recordings and screenshots, is also regulated. Lately I have been asked if there is some way to easily find just the sensitive information in audio or video files and encrypt or hash it without affecting the rest … Continue reading Audio Files and Breaches→
The Associated Press ran a story called Buzz and bullets: Gun fans cheer Starbucks’ policy that gives a good indication of a hot topic in the US: Dale Welch recently walked into a Starbucks in Virginia, handgun strapped to his waist, and ordered a banana Frappuccino with a cinnamon bun. Sounds like the start of … Continue reading Starbucks’ Security Policy→
BlueTooth devices have been proliferating to the point where you can make a safe bet that most vehicles have one. That’s why some clever folks are starting to monitor the highways for bluetooth in project BlueTOAD. Rather than depend on every car carrying a toll tag in plain view, the sensors along highways can read … Continue reading BlueTOAD (Bluetooth Travel Time Origin and Destination)→
News from Prague, just weeks ahead of the Payment Card Industry (PCI) meetings there, reveals new levels of sophistication in ATM fraud. The Prague Monitor reports a foreign gang is thought to be behind the attacks. The principle by which the gang withdraws money from the accounts resembles a mobile telephone – the gang is … Continue reading ATM fraud advances→