In the first of what will undoubtedly be a large number of battles between companies that make IoT devices and the police, Amazon is refusing to comply with a warrant demanding data on what its Echo device heard at a crime scene. The particulars of the case are weird. Amazon’s Echo does not constantly record; … Read More “Law Enforcement Access to IoT Data” »
Month: January 2017
The FDA has issued a report giving medical devices guidance on computer and network security. There’s nothing particularly new or interesting; it reads like standard security advice: write secure software, patch bugs, and so on. Note that these are “non-binding recommendations,” so I’m really not sure why they bothered. Powered by WPeMatico
President Barack Obama’s public accusation of Russia as the source of the hacks in the US presidential election and the leaking of sensitive e-mails through WikiLeaks and other sources has opened up a debate on what constitutes sufficient evidence to attribute an attack in cyberspace. The answer is both complicated and inherently tied up in … Read More “Attributing the DNC Hacks to Russia” »
Easy recipe from America’s Test Kitchen. As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered. Powered by WPeMatico
Good article debunking the myth that requiring people to use their real names on the Internet makes them behave better. Powered by WPeMatico
They’re not much, but they do exist. Powered by WPeMatico
Someone just registered their company name as ; DROP TABLE “COMPANIES”;– LTD. Reddit thread. Obligatory xkcd comic. Powered by WPeMatico
In The Better Angels of Our Nature, Steven Pinker convincingly makes the point that by pretty much every measure you can think of, violence has declined on our planet over the long term. More generally, “the world continues to improve in just about every way.” He’s right, but there are two important caveats. One, he … Read More “Are We Becoming More Moral Faster Than We're Becoming More Dangerous?” »
There’s a concept from computer security known as a class break. It’s a particular security vulnerability that breaks not just one system, but an entire class of systems. Examples might be a vulnerability in a particular operating system that allows an attacker to take remote control of every computer that runs on that system’s software. … Read More “Class Breaks” »
A modern photocopier is basically a computer with a scanner and printer attached. This computer has a hard drive, and scans of images are regularly stored on that drive. This means that when a photocopier is thrown away, that hard drive is filled with pages that the machine copied over its lifetime. As you might … Read More “Photocopier Security” »