A useful guide. Powered by WPeMatico
Month: October 2016
An impressive Chinese device that automatically reads marked cards in order to cheat at poker and other card games. Powered by WPeMatico
Beautiful. As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered. Powered by WPeMatico
Interesting research: “Don’t Skype & Type! Acoustic Eavesdropping in Voice-Over-IP“: Abstract: Acoustic emanations of computer keyboards represent a serious privacy issue. As demonstrated in prior work, spectral and temporal properties of keystroke sounds might reveal what a user is typing. However, previous attacks assumed relatively strong adversary models that are not very practical in many … Read More “Eavesdropping on Typing Over Voice-Over-IP” »
A year and a half ago, I wrote about hardware bit-flipping attacks, which were then largely theoretical. Now, they can be used to root Android phones: The breakthrough has the potential to make millions of Android phones vulnerable, at least until a security fix is available, to a new form of attack that seizes control … Read More “Hardware Bit-Flipping Attacks in Practice” »
It was a phishing attack. Powered by WPeMatico
Good long article on the 2015 attack against the US Office of Personnel Management. Powered by WPeMatico
It’s not hard to imagine the criminal possibilities of automation, autonomy, and artificial intelligence. But the imaginings are becoming mainstream — and the future isn’t too far off. Along similar lines, computers are able to predict court verdicts. My guess is that the real use here isn’t to predict actual court verdicts, but for well-paid … Read More “Malicious AI” »
I think this might be the first time it has been openly acknowledged: Sir Michael Fallon, the defence secretary, has said Britain is using cyber warfare in the bid to retake Mosul from Islamic State. Speaking at an international conference on waging war through advanced technology, Fallon made it clear Britain was unleashing its cyber … Read More “UK Admitting "Offensive Cyber" Against ISIS/Daesh” »
Josephine Wolff examines different Internet governance stakeholders and how they frame security debates. Her conclusion: The tensions that arise around issues of security among different groups of internet governance stakeholders speak to the many tangled notions of what online security is and whom it is meant to protect that are espoused by the participants in … Read More “How Different Stakeholders Frame Security” »