• Home
  • News
  • Coins2Day 500
  • Tech
  • Finance
  • Leadership
  • Lifestyle
  • Rankings
  • Multimedia
TechCyber Saturday

Data Sheet—Saturday, January 21, 2017

Robert Hackett
By
Robert Hackett
Robert Hackett
Down Arrow Button Icon
Robert Hackett
By
Robert Hackett
Robert Hackett
Down Arrow Button Icon
January 21, 2017, 10:28 AM ET

President Trump began his new job and, at the insistence of the Secret Service, finally ditched his old cell phone for something more secure. Trump’s reported reluctance to part with his Android device was not unusual—people in power, like most of us, prefer convenience over security.

The tech-loving President Obama, for instance, complained on TV that his POTUS-edition smartphone didn’t have popular Internet features. (As for Hillary Clinton, her IT operations included not just that infamous server but also aides who smashed her old BlackBerries with hammers).

When it comes to the U.S. President, though, there’s no room for balance between security and ease-of-operations: Security is paramount. But for almost everyone else, including the thousands of women descending on Washington D.C. To protest on Saturday, there’s a case for convenience.

Not everyone is willing to acknowledge this, however, and one result is misinformation among women in Washington about the popular messaging app WhatsApp. Specifically, an irresponsible news article has reportedly led protest leaders to warn that WhatsApp contains a “backdoor” and is not a secure way to communicate.

The WhatsApp allegation is false. While the app does contain a security hole—an “attack surface” in hacker parlance—it’s a tiny one that can only be exploited in very unusual circumstances. What’s more, the hole reflects a design decision by the makers of WhatsApp, who understood that eliminating the risk entirely would make the app less convenient to use, and that people would likely turn to a less secure form of messaging instead.

This is what we must understand when it comes to cyber security for ordinary people: Perfect must not be the enemy of the good. But for President Trump, the stakes are different and nothing less than perfect security will do. Let’s hope Trump, whose previous positions on “the cyber” can charitably be described as contradictory, by now understands that.

Thanks for reading — your usual round-up of cyber items below.

Jeff John Roberts

@jeffjohnroberts

[email protected]

Welcome to the Cyber Saturday edition of Data Sheet, Coins2Day’sdaily tech newsletter. You may reach Robert Hackett via Twitter, Cryptocat, Jabber (see OTR fingerprint on my about.me), PGP encrypted email (see public key on my Keybase.io), Wickr, Signal, or however you (securely) prefer. Feedback welcome.

THREATS

To the heart of Mirai. This cyber-whodunit starts with extortion and ends with security journalist Brian Krebs pointing the finger at a Rutgers student for unleashing Mirai, the army of zombie IoT machines that wrecked havoc on websites worldwide. We'll wager the student will soon be seeing a lot of the FBI. (Krebs on Security)

Coinbase cofounder dishes on departure: Fred Ehrsam shares some thoughts on why he left the well-known bitcoin shop, and what life after Coinbase will be. He promises not to name his next venture FredCoin. (Coins2Day)

A clear Signal for the Trump era.  New data from Apptopia suggests Moxie Marlingspike's tool—long the toast of the crypto crowd—is becoming mainstream. Telegram is still number one, but Signal use has shot up since the election. (Coins2Day)

It's called "cartapping." Services like satellite radio and OnStar are convenient for drivers—and for law enforcement. Court records show police have for years been getting warrants to force the likes of GM and SiriusXM to supply live-tracking of customer locations. (Forbes)

Facebook Forks Out. The social network paid its highest bug bounty ever this month, handing $40,000 to a white hat researcher who discovered an exploit in a third party photo editing tool. (Facebook)

Oh, and hey McDonald's, Hacker One wants to know where's your Security@?

Share today's Data Sheet with a friend:
http://coins2day.com/newsletter/datasheet/

Looking for previous Data Sheets? Click here.

ACCESS GRANTED

The most popular item on Coins2Day's site this week is a story by Robert about a sneaky Gmail scam that's fooling all kinds of folks. Careful out there:

Here's how the swindle works. The attacker, usually disguised as a trusted contact, sends a boobytrapped email to a prospective victim. Affixed to that email, there appears to be a regular attachment, say a PDF document. Nothing seemingly out of the ordinary.

Read more on Coins2Day.com.

FORTUNE RECON

If You Can't Beat Russian Hackers, Hire Oneby Vivienne Walt

Stay Away From This Popular Selfie Appby Jeff John Roberts

Oracle Issues 'Massive' Security Upgradeby Barb Darrow

Anonymous Tells Donald Trump "He Will Regret the Next 4 Years"by Jonathan Vanian

Wilbur Ross Confirmation: On Trump and Cyber Securityby Jen Wieczner

ONE MORE THING

"I've got a picture of a dinosaur." To finish the week on a lighter note, enjoy this video of a UK cyber-security expert trolling the bejesus out of a gang of tech support scammers who had the bad luck to call up and offer to fix his computer. (The Sun)

About the Author
Robert Hackett
By Robert Hackett
Instagram iconLinkedIn iconTwitter icon
See full bioRight Arrow Button Icon
Rankings
  • 100 Best Companies
  • Coins2Day 500
  • Global 500
  • Coins2Day 500 Europe
  • Most Powerful Women
  • Future 50
  • World’s Most Admired Companies
  • See All Rankings
Sections
  • Finance
  • Leadership
  • Success
  • Tech
  • Asia
  • Europe
  • Environment
  • Coins2Day Crypto
  • Health
  • Retail
  • Lifestyle
  • Politics
  • Newsletters
  • Magazine
  • Features
  • Commentary
  • Mpw
  • CEO Initiative
  • Conferences
  • Personal Finance
  • Education
Customer Support
  • Frequently Asked Questions
  • Customer Service Portal
  • Privacy Policy
  • Terms Of Use
  • Single Issues For Purchase
  • International Print
Commercial Services
  • Advertising
  • Coins2Day Brand Studio
  • Coins2Day Analytics
  • Coins2Day Conferences
  • Business Development
About Us
  • About Us
  • Editorial Calendar
  • Press Center
  • Work At Coins2Day
  • Diversity And Inclusion
  • Terms And Conditions
  • Site Map

© 2025 Coins2Day Media IP Limited. All Rights Reserved. Use of this site constitutes acceptance of our Terms of Use and Privacy Policy | CA Notice at Collection and Privacy Notice | Do Not Sell/Share My Personal Information
FORTUNE is a trademark of Coins2Day Media IP Limited, registered in the U.S. and other countries. FORTUNE may receive compensation for some links to products and services on this website. Offers may be subject to change without notice.