Thursday, October 24, 2013

4th Amendment is not for Hackers

JusticeIt is difficult to choose between the quote from one of the Seven Sages of Greece, Bias of Priene, "knowledge is the only property not to be missed", or go directly to proverbs and stay with "who robs a thief, a hundred years of forgiveness." Either illustrates the paths of the following lines.

It is true that if John "borrows" the knowledge of Francis, Francis does not lost them. But if he used for commercial benefit from them to the detriment of Francis, then John is getting illegitimately returns, and therefore Francis would begin to "steal" knowledge also John. Not only Francis: anyone. That at least is what has set a district court of Idaho (USA), which has found that a company that has publicly stated that they love to hack and they will not stop doing it, is not entitled to the Fourth Amendment's protection about "irrational" seizures on the property.

The case has its roots in the fact that the owner of that company is a former employee of another one that had developed software for cyber attack detection. The original company claimed that its former employee was marketing code, in the form of proprietary software, but actually it was a replica of that had developed in his old job. It's right or not, security is guided by the weakest (or uncontrollable) link of the chain. A report in the newspaper My San Antonio tells precisely how the subcontractors (or suppliers) have become a real toothache for large companies.

So if you do not invest for yourself... do it for those who are part of your ecosystem. More and more solutions, the question is to choose the best for you. That is, choose correctly your eyes and ears, which is the subject of a dense article in the prestigious Forbes. If you do nothing, you may not just be attacked, but you will be tested. The U.S. Securities Industry and Financial Markets Association (SIFMA) last month simulated a cyber attack led by "white hat" hackers that showed some weaknesses (and strengths) of large corporations in this area.

Finish off the day with two notes. First, yesterday we wondered how soon the new Apple devices would be hacked, and now we have a researcher, Vladimir Katalov, which has shown the ineffectiveness of two-steps verification when accessing backup data of iPhone, iPad and iPod. The second point brings us back to a scam being propagated via Facebook (and it's the third in three days). So once again: no, Celine Dion has NOT died in a plane crash, if you get that message despise it.


We invite you to rate our posts, to leave your comments and to share them on social networks. Also, if you want you can follow us on our profiles. At the sidebar, you’ve got the links ;-)


Post a Comment