Beautiful photo. As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered. Powered by WPeMatico
Month: October 2014
The Intercept has published the complete manuals for Hacking Team’s attack software. This follows a detailed report on Hacking Team’s products from August. Hacking Team sells computer and cell phone hacking capabilities to the governments of Azerbaijan, Colombia, Egypt, Ethiopia, Hungary, Italy, Kazakhstan, Korea, Malaysia, Mexico, Morocco, Nigeria, Oman, Panama, Poland, Saudi Arabia, Sudan, Thailand, … Read More “Hacking Team Documentation” »
Good article, with pictures, diagrams, and code. Powered by WPeMatico
Good essay. Worry about Ebola (or anything) manifests physically as what’s known as a fight, flight, or freeze response. Biological systems ramp up or down to focus the body’s resources on the threat at hand. Heart rate and blood pressure increase, immune function is suppressed (after an initial burst), brain chemistry changes, and the normal … Read More “The Risk of Unfounded Ebola Fears” »
Details. Confirmation. Powered by WPeMatico
The Food and Drug Administration has released guidelines regarding the security of medical devices. I admit that I have not read it. Powered by WPeMatico
Interesting data: Turning to the crime section of the Chapman Survey on American Fears, the team discovered findings that not only surprised them, but also those who work in fields pertaining to crime. “What we found when we asked a series of questions pertaining to fears of various crimes is that a majority of Americans … Read More “Survey on What Americans Fear” »
EDITED TO ADD (10/28): This is a more nuanced discussion of this issue. At this point, it seems clear that there is a lot less here than described in the blog post below. The latest version of Apple’s OS automatically syncs your files to iCloud Drive, even files you choose to store locally. Apple encrypts … Read More “Apple Copies Your Files Without Your Knowledge or Consent” »
Here’s a physical attack against a credit card verification system. Basically, the attack disrupts the communications between the retail terminal and the system that identifies revoked credit cards. Since retailers generally default to accepting cards when the system doesn’t work, the attack is generally successful. Powered by WPeMatico
There’s a report that the FBI has identified a second leaker: The case in question involves an Aug. 5 story published by The Intercept, an investigative website co-founded by Glenn Greenwald, the reporter who first published sensitive NSA documents obtained from Snowden. Headlined “Barack Obama’s Secret Terrorist-Tracking System, by the Numbers,” the story cited a … Read More “US Intelligence "Second Leaker" Identified” »