It’s called KeySweeper. More articles. Source code. Slashdot thread. Hacker News thread. Powered by WPeMatico
Month: January 2015
It’s called SnoopSnitch: SnoopSnitch is an app for Android devices that analyses your mobile radio traffic to tell if someone is listening in on your phone conversations or tracking your location. Unlike standard antivirus apps, which are designed to combat software intrusions or steal personal info, SnoopSnitch picks up on things like fake mobile base … Read More “Surveillance Detection for Android Phones” »
In the wake of the Paris terrorist shootings, David Cameron has said that he wants to ban encryption in the UK. Here’s the quote: “If I am prime minister I will make sure that it is a comprehensive piece of legislation that does not allow terrorists safe space to communicate with each other.” This is … Read More “David Cameron's Plan to Ban Encryption in the UK” »
This is an interesting historical use of viking runes as a secret code. Yes, the page is all in Finnish. But scroll to the middle. There’s a picture of the Stockholm city police register from 1536, about a married woman who was found with someone who was not her husband. The recording scribe “encrypted” her … Read More “Viking Runes as Encryption in the 1500s” »
A worldwide survey of writers affiliated with PEN shows a significant level of self-censoring. From the press release: The report’s revelations, based on a survey of nearly 800 writers worldwide, are alarming. Concern about surveillance is now nearly as high among writers living in democracies (75%) as among those living in non-democracies (80%). The levels … Read More “How Surveillance Causes Writers to Self-Censor” »
This just in: the threat of being eaten doesn’t deter dumpling squid from having sex. As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered. Powered by WPeMatico
Pretty impressive surveillance-economy satire. Powered by WPeMatico
The FBI has provided more evidence: Speaking at a Fordham Law School cybersecurity conference Wednesday, Comey said that he has “very high confidence” in the FBI’s attribution of the attack to North Korea. And he named several of the sources of his evidence, including a “behavioral analysis unit” of FBI experts trained to psychologically analyze … Read More “Further Evidence Pointing to North Korea as Sony Hacker” »
This sort of thing is still very rare, but I fear it will become more common: …hackers had struck an unnamed steel mill in Germany. They did so by manipulating and disrupting control systems to such a degree that a blast furnace could not be properly shut down, resulting in “massive” — though unspecified — … Read More “Hacking Attack Causes Physical Damage at German Steel Mill” »
When you’re attacked by a missile, you can follow its trajectory back to where it was launched from. When you’re attacked in cyberspace, figuring out who did it is much harder. The reality of international aggression in cyberspace will change how we approach defense. Many of us in the computer-security field are skeptical of the … Read More “Attack Attribution in Cyberspace” »