The Gonatus squid eats its own kind. As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered. Powered by WPeMatico
Month: September 2016
Last week, Yahoo! announced that it was hacked pretty massively in 2014. Over half a billion usernames and passwords were affected, making this the largest data breach of all time. Yahoo! claimed it was a government that did it: A recent investigation by Yahoo! Inc. has confirmed that a copy of certain user account information … Read More “The Hacking of Yahoo” »
Interesting research from Sasha Romanosky at RAND: Abstract: In 2013, the US President signed an executive order designed to help secure the nation’s critical infrastructure from cyberattacks. As part of that order, he directed the National Institute for Standards and Technology (NIST) to develop a framework that would become an authoritative source for information security … Read More “The Cost of Cyberattacks Is Less than You Might Think” »
A new malware tries to detect if it’s running in a virtual machine or sandboxed test environment by looking for signs of normal use and not executing if they’re not there. From a news article: A typical test environment consists of a fresh Windows computer image loaded into a VM environment. The OS image usually … Read More “Malware Tries to Detect Test Environment” »
Neural networks are good at identifying faces, even if they’re blurry: In a paper released earlier this month, researchers at UT Austin and Cornell University demonstrate that faces and objects obscured by blurring, pixelation, and a recently-proposed privacy system called P3 can be successfully identified by a neural network trained on image datasets — in … Read More “Using Neural Networks to Identify Blurred Faces” »
Brian Krebs writes about the massive DDoS attack against his site. In fact, the site is down as I post this. Powered by WPeMatico
A Lego model of a giant space kraken destroying a Destroyer from Star Wars. As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered. Powered by WPeMatico
It took 24 hours. Slashdot thread. Powered by WPeMatico
I like this Amtrak security awareness campaign. Especially the use of my term “security theater.” Powered by WPeMatico
Impressive remote hack of the Tesla Model S. Details. Video. The vulnerability has been fixed. Remember, a modern car isn’t an automobile with a computer in it. It’s a computer with four wheels and an engine. Actually, it’s a distributed 20-400-computer system with four wheels and an engine. Powered by WPeMatico