A Narrative on Apple Pay, Google Wallet, CurrentC, & Mobile Payments

Apple Pay's introduction has certainly generated a lot of press coverage, especially as it relates to its banishment by retailer-led consortium MCX. However, a lot of the articles I've read contain a great deal of incorrect information about Apple Pay and other mobile payment methodologies, so I thought it might…

#Tags: Payments, Security

Lessons To Be Learned From The Sony Hack

UPDATE: Sony Pictures Co-Chair Amy Pascal has stepped down in the wake of the cyberattack. It seems that most of the mainstream media are concerned these days with attributing the Sony hack to North Korea, a recently discharged insider, some lone hackers, or a combination thereof. What hasn't been discussed…

#Tags: Security, Breach

DUAL_EC_DRBG Backdoors And Why You Should Care

It is looking more and more likely pretty damned obvious that the NSA managed to get a weakness introduced into a widely used random number generating algorithm standard (DUAL_EC_DRBG) that was approved for use by NIST (the National Institute of Standards and Technology) for US Government use. Such…

#Tags: Security, Encryption

The Heartbleed Vulnerability in English

By now, you've probably heard of a serious vulnerability (called "Heartbleed") that has the security community and the news whipped up into a frenzy. There's plenty of advanced and detailed technical information available - as well as information condensed down to publicly-digestable bites spread via the media that…

#Tags: Encryption, Security

Snowden To The Left Of Me, The NSA To The Right, Here I Am, Stuck In The Middle.. With You?

Ever since Edward Snowden began disclosing secret NSA monitoring programs to the public, there has been a very divided reaction from all corners of the globe. Some sing Snowden's praises for revealing the actions of what they describe as an agency run amok, violating the law under the…

#Tags: