All articles by: The Assurer

Verizon Droid pattern lock bypass

One of the interesting features of Android smart-phones is the pattern lock screen. Instead of a four digit PIN, the phone is secured with a “pattern” of four to nine dots, arranged in a 3 by 3 square. This results in a possible 3,024 to 362,880 different combinations. Sounds pretty secure, right?

The GSM encryption “hack,” & how it affects you

The Wall Street Journal reports that German “hacker” Karsten Nohl demonstrated how it was possible to break the security of GSM cell phones, and to monitor conversations and text messages as they take place. However, before anyone starts fearing for their privacy, let us assess the real risk posed by this so-called breakthrough.

Text messages — Is it them… or someone else?

How can you be certain the person you are exchanging texts with, is who you think it is? The caller ID and that cute little contact picture, only tell you whose phone sent the message! Unlike phone calls there is no heuristic method by which you can be sure of who is on the other side of the keypad.

A Personal Security Classification Taxonomy (PSCT)

Learn how to create and use, a Personal Security Classification Taxonomy (PSCT) that is on par with how governments protect their own secret information. Includes real life examples of PSCT in action.

Bad dog!

They say that “On the Internet, nobody knows you’re a dog.” But what happens if your ex-boyfriend is a dog, who is hounding you, in an effort to sully your online reputation?

Legislation of software design

The Informed P2P User Act (HR 1319) makes it illegal for P2P software to inadvertently share files over a P2P network without a user’s knowledge.

Mitigating social network data leaks

Data leaks on social networking sites allow web surfing behavior to be tracked by third parties.

U.S. security classification taxonomies

Detailed description of the United States security classification taxonomies, in the areas of national security, national interests and homeland security.

The fallacy of Unclassified information

The common belief by the public, about Unclassified information; is that it is harmless, general knowledge; available to anyone, and is of little or no strategic value. Contrary to this belief, the term “Unclassified” refers to information that possesses one or more of the following attributes…

What to know about Need-To-Know

Need-To-Know (NTK) is a security concept with military origins. In computer security, it’s called the principle of least-privilege. And in the field of security engineering, it’s called security through obscurity. A less than polite definition; which I’m sure everyone can relate to is: making it your business to ensure that everyone working for, around, or with you, is minding their own business.