Skip to main content

The WiKID Blog

Viewing posts by admin

password-on-post-it-note-reveals-affair

According to ComputerWeekly's Downtime blog, a password on a post-it note allowed a temp to access email of a London mayor's office staffer, revealing an affair with a married woman. Downtime's take:

Downtime expects Ken to have already ordered a two-factor authentication scheme to protect those afflicted with short-term memory difficulties, banned 3M’s best-selling product and instructed HR to re-do the background checks to weed out anyone with a malicious sense of humour.

more-on-low-frequency-high-impact-events

Adam's post yesterday on the agency problem got me thinking more about low-frequency, high-impact events and their predictability. His post was about Bear Stearns and how employees lost money. The interesting point for me was that those are the people that should have been in the best position to know that the potential for a high-impact event was increasing.

banks-slow-intrabank-transfers-to-help-spot-fraud

According to Gartner, four UK banks have slowed intrabank transfers to try to reduce fraud.

bankash

Dave Evans from Teros pointed out that the PWSteal.Bankash.D trojan includes two lists: one for sites that

is-a-password-protected-computer-like-a-locked-box

A recent Cirtcut Court decision found them to be so:

The 10th Circuit's recent 2-1 decision in U.S. v. Andrus, No. 06-3094 (April 25, 2007), recognized for the first time that a password-protected computer is like a locked suitcase or a padlocked footlocker in a bedroom. The digital locks raise the expectation of privacy by the owner. The majority nonetheless refused to suppress the evidence.
In the case in question, the father of the suspect gave the officers permission to search the house and his son's computer. The test for the majority was pretty high:
Judge Michael R. Murphy, joined by the court's newest member, Judge Neil M. Gorsuch, said the legal test is "whether law enforcement knows or should reasonably suspect because of surrounding circumstances that the computer is password protected."
While the dissenting judge pointed out that it might be hard to determine if a computer is password protected:
In dissent, Judge Monroe G. McKay called the unconstrained ability of law enforcement to use forensic software to bypass password protection without first determining whether such passwords have been enabled amounts to "dangerously sidestepping the Fourth Amendment."

Recent Posts

Archive

2024
2022
2021
2019
2018
2017
2016
2015
2014
2013
2012
2011
2010
2009
2008

Categories

Tags

Authors

Feeds

RSS / Atom