Wayne Rash

About

Wayne Rash is a content writer and editor with a 35-year history covering technology. He’s a frequent speaker on business, technology issues and enterprise computing. He is the author of five books, including his most recent, "Politics on the Nets." Rash is a former Executive Editor of eWEEK and a former analyst in the eWEEK Test Center. He was also an analyst in the InfoWorld Test Center and editor of InternetWeek. He's a retired naval officer, a former principal at American Management Systems and a long-time columnist for Byte Magazine.

Panama Papers Breach Reveals Astonishingly Lax Network Security

My first reaction after reading accounts about the breach of a vast trove of financial and related information from the Panamanian law firm Mossack Fonseca was to channel John Le Carré and his famed Panamanian tailor/spy Harry Pendel. However, the reality is much less interesting. The story is actually about a company with third-rate security […]

Privacy Forum Shows Regulators Challenges Posed by Technology

WASHINGTON—At first the meeting at the Future of Privacy Forum headquarters downtown looked like any other office soiree here, one populated by Millennials and hipsters trying to impress each other with their real or perceived level of official access. But a second look changed that impression. Right behind the check-in desk was a massive flat […]

Web Users Must Stay Extra Wary to Fend Off Stealthy ‘Malvertising’

I was visiting a Website belonging to a well-known Macintosh publication reading details about the iPhone SE when a window appeared in the lower right corner of my screen. It was an alert saying that the Malwarebytes security software I use had detected an intrusion attempt, and that the malware was being quarantined. A few […]

Third-Party Tech Help Resolves FBI-Apple Standoff Over Killer’s iPhone

The drama is over. The rancorous legal drama during which the Federal Bureau of Investigation tried to compel Apple to create a work-around that would allow the agency to bypass iOS security measures ended when the bureau announced that it had gained access to an iPhone 5C used by terrorists and that Apple’s help was […]

Microsoft’s Tay Chatbot Debacle Reveals Immaturity of AI, Web Trolls

Imagine if you will that Edgar Rice Burroughs had taught his famous character Tarzan how to type and then dropped him into a room with nothing but a computer attached to Twitter. That computer would be the young Tarzan’s only window to the outside world. You’ll remember that Burroughs’ fictional Tarzan (the character in the […]

Amazon Echo Digital Assistant Is Still Not Ready for Office Work

I had high hopes for the Amazon Echo device when I ordered it in early March as a sort of birthday present to myself. This is because I work in a remote office with no support staff and there are times when I need an assistant. Sadly, hiring and paying an assistant involves real money […]

Researchers Claim Correlation Between Terror Attacks, Cyber-Activity

The links between cyber-warfare and terrorism are well-established. Terrorist organizations such as ISIS have been attacking targets they perceive as unfriendly nearly since their inception. Now, researchers at Cytegic report that they have discovered a link between terrorist attacks, such as the deadly attacks on the Brussels airport and metro system on March 22, and […]

Government-Backed Tor Project Supports the Strong Encryption DOJ Hates

The Tor Project, which maintains the open source secure browser and networking software, published a blog March 21 saying it supported Apple’s resistance to demands from the Federal Bureau of Investigation and the U.S. Department of Justice for encryption back doors to its mobile devices and data services. Kate Kraus, director of communications and public […]

It’s Time to Pay Attention to Connected Car Cyber-Threats

When I bought a car back in February, one of the things I hadn’t realized until I sat down to read the owner’s manuals was that I was now in possession of a connected car. As I went through the section about the entertainment system and the emergency help system, I realized that, among other […]

Apple to Hand iCloud Encryption Key Management to Account Holders

According to a number of press reports, Apple is in the process of revamping its iCloud storage service to increase security by divesting itself of the task of keeping users’ encryption keys. Currently Apple keeps the keys to access iCloud accounts, which means, among other things, that Apple can provide information to authorities when presented […]