Good paper, and layman’s explanation. Internet voting scares me. It gives hackers the potential to seriously disrupt our democratic processes. Powered by WPeMatico
Month: November 2014
Kaspersky Labs is reporting (detailed report here, technical details here) on a sophisticated hacker group that is targeting specific individuals around the world. “Darkhotel” is the name the group and its techniques has been given. This APT precisely drives its campaigns by spear-phishing targets with highly advanced Flash zero-day exploits that effectively evade the latest … Read More “Sophisticated Targeted Attack Via Hotel Networks” »
Security is a combination of protection, detection, and response. It’s taken the industry a long time to get to this point, though. The 1990s was the era of protection. Our industry was full of products that would protect your computers and network. By 2000, we realized that detection needed to be formalized as well, and … Read More “The Future of Incident Response” »
I’m not sure why this is news, except that it makes for a startling headline. (Is the New York Times now into clickbait?) It’s not as if people are throwing squid onto the field, as Detroit hockey fans do with octopus. As usual, you can also use this squid post to talk about the security … Read More “Friday Squid Blogging: Dried Squid Sold in Korean Baseball Stadiums” »
My company, Co3 Systems, is hiring both technical and nontechnical positions. If you live in the Boston area, click through and take a look. Powered by WPeMatico
Chicago is doing random explosives screenings at random L stops in the Chicago area. Compliance is voluntary: Police made no arrests but one rider refused to submit to the screening and left the station without incident, Maloney said. […] Passengers can decline the screening, but will not be allowed to board a train at that … Read More “Testing for Explosives in the Chicago Subway” »
Robert Lee and Thomas Rid have a new paper: “OMG Cyber! Thirteen Reasons Why Hype Makes for Bad Policy.” Powered by WPeMatico
Interesting paper by Melissa Hathaway: “Connected Choices: How the Internet Is Challenging Sovereign Decisions.” Abstract: Modern societies are in the middle of a strategic, multidimensional competition for money, power, and control over all aspects of the Internet and the Internet economy. This article discusses the increasing pace of discord and the competing interests that are … Read More “How the Internet Affects National Sovereignty” »
Verizon is tracking the Internet use of its phones by surreptitiously modifying URLs. This is a good description of how it works. Powered by WPeMatico
Probably the best IT security book of the year is Adam Shostack’s Threat Modeling (Amazon page). The book is an honorable mention finalist for “The Best Books” of the past 12 months. This is the first time a security book has been on the list since my Applied Cryptography (first edition) won in 1994 and … Read More “Adam Shostack's Threat Modeling” »