Solution
Description:

An answer to your Information Assurance problem.

Caveat on Verizon Droid 2.1-update1 OTA update lock pattern fix

My Motorola Droid finally received the much anticipated Over The Air (OTA) software update (version 2.1-update1) from Verizon Wireless. So, is the Verizon Droid pattern lock bypass fixed? Yes. But there is one little caveat…

A (temporary) countermeasure for the Verizon Droid pattern lock bypass

It has been observed that, as long as a Bluetooth device is paired, AND CONNECTED, to the Droid; the pattern lock bypass vulnerability does not occur.

The GSM encryption “hack,” & how it affects you

The Wall Street Journal reports that German “hacker” Karsten Nohl demonstrated how it was possible to break the security of GSM cell phones, and to monitor conversations and text messages as they take place. However, before anyone starts fearing for their privacy, let us assess the real risk posed by this so-called breakthrough.

Text messages — Is it them… or someone else?

How can you be certain the person you are exchanging texts with, is who you think it is? The caller ID and that cute little contact picture, only tell you whose phone sent the message! Unlike phone calls there is no heuristic method by which you can be sure of who is on the other side of the keypad.

A Personal Security Classification Taxonomy (PSCT)

Learn how to create and use, a Personal Security Classification Taxonomy (PSCT) that is on par with how governments protect their own secret information. Includes real life examples of PSCT in action.

Mitigating social network data leaks

Data leaks on social networking sites allow web surfing behavior to be tracked by third parties.