This judgment has major implications for online freedom of expression around the world…. The ruling also means that a court in one EU member state will be able to order the removal of social media posts in other countries, even if they are not considered unlawful there. This would set a dangerous precedent where the courts of one country can control what internet users in another country can see. —Judith Bergman
I am happy to announce the release of NetworkMiner 2.5 today! This new version includes new features like JA3 and parsers for the HTTP/2 and DoH protocols. We have also added support for a few older protocols that are still widely used, such as Kerberos and the CIFS browser protocol. Additionally, NetworkMiner can now parse PCAP files up to twice as fast as before! —Erik Hjelmvik
One of the habits of the modern mind is division. If we are Christians, we might divide our profession of faith on Sunday morning from our daily lives Monday through Saturday (particularly, it seems, when it comes to Friday night). Then, when we build compartments, we often divide our view of the person, separating a Christian vision of reality from our use of technology. As it turns out, however, our view of the imago dei, or the image of God in man, plays a significant role in the way we view technology—particularly artificial intelligence (AI). —Russ White
Cyber insurance policies are designed to cover the costs of security incidents and breaches such as system forensics, data recovery, and legal and customer reparations costs. Typical incident types that are covered include invoice fraud, cryptolocker recovery, and insider threats. While cyber insurance has its place in a holistic approach to security, its place is misunderstood. —Chris Kennedy
The next great (and possibly confusing) version of USB is on its way. In early September 2019, the USB Implementers Forum (USB-IF) published the USB4 specification paving the way for blazing-fast USB connections comparable to the speeds of Thunderbolt 3. —Ian Paul
FireEye Mandiant recently discovered a new malware family used by APT41 (a Chinese APT group) that is designed to monitor and save SMS traffic from specific phone numbers, IMSI numbers and keywords for subsequent theft. Named MESSAGETAP, the tool was deployed by APT41 in a telecommunications network provider in support of Chinese espionage efforts —Raymond Leong, Dan Perez, Tyler Dean
Cybersecurity firm Trend Micro has disclosed a security incident this week carried out by an employee who improperly accessed the personal data of thousands of its customers with a “clear criminal intent” and then sold it to a malicious third-party tech support scammers earlier this year. —Wang Wei
Two former employees of Twitter have been charged with spying on thousands of Twitter user accounts on behalf of the Saudi Arabian government, likely with the purpose of unmasking the identity of dissidents. —Swati Khandelwal
The popular VPN provider, NordVPN, recently announced a server breach at a third-party data center. NordVPN reassured users that its key services were not impacted, but some user logins from this breach were found to have been leaked and were used to try to access users’ accounts. —Alexis Hancock
Mozilla, in partnership with Facebook, Cloudflare, and other IETF community members, has announced technical specifications for a new cryptographic protocol called “Delegated Credentials for TLS.” Delegated Credentials for TLS is a new simplified way to implement “short-lived” certificates without sacrificing the reliability of secure connections. —Mohit Kumar
Google is teaming up with tech industry partners to launch OpenTitan, an open source project to strengthen chip security. The initiative will build reference design and integration guidelines for root-of-trust (RoT) silicon chips to be implemented in data center servers, storage devices, peripherals, and other technologies. —Kelly Sheridan
For many in Gen X using Blind Carbon Copy (Bcc) in group emails is an identifying tic of cultural lag becoming as anachronistic as the word carbon in the term itself. Back in the day we were tight with out lists, they were like the Glengarry leads, to us they were gold, and those who received our emails did not get to have them. But sadly, this is changing as exhibitionist Millennials regularly flood my inbox with hundreds of email addresses. —David Marcus
SpaceNews recently reported that Elon Musk and his low-orbit space venture Starlink have filed with the International Telecommunications Union (ITU) to launch an additional 30,000 broadband satellites in addition to the 11,927 now in the planning stages. This looks like a land grab and Musk is hoping to grab valuable orbital satellite paths to keep them away from competitors. —Doug Dawson
Related