Everything online is hackable. This is true for Equifax’s data and the federal Office of Personal Management’s data, which was hacked in 2015. If information is on a computer connected to the Internet, it is vulnerable. But just because everything is hackable doesn’t mean everything will be hacked. The difference between the two is complex, … Read More “Can Consumers’ Online Data Be Protected?” »
Month: February 2018
Nice profile of Mordechai Guri, who researches a variety of clever ways to steal data over air-gapped computers. Guri and his fellow Ben-Gurion researchers have shown, for instance, that it’s possible to trick a fully offline computer into leaking data to another nearby device via the noise its internal fan generates, by changing air temperatures … Read More “Jumping Air Gaps” »
There are a lot: The cybersecurity company McAfee recently uncovered a cyber operation, dubbed Operation GoldDragon, attacking South Korean organizations related to the Winter Olympics. McAfee believes the attack came from a nation state that speaks Korean, although it has no definitive proof that this is a North Korean operation. The victim organizations include ice … Read More “Internet Security Threats at the Olympics” »
Research shows that what a food is called affects how we think about it. Research paper. As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered. Read my blog posting guidelines here. Powered by WPeMatico
In “The House that Spied on Me,” Kashmir Hill outfits her home to be as “smart” as possible and writes about the results. Powered by WPeMatico
A water utility in Europe has been infected by cryptocurrency mining software. This is a relatively new attack: hackers compromise computers and force them to mine cryptocurrency for them. This is the first time I’ve seen it infect SCADA systems, though. It seems that this mining software is benign, and doesn’t affect the performance of … Read More “Water Utility Infected by Cryptocurrency Mining Software” »
This story of leaked Australian government secrets is unlike any other I’ve heard: It begins at a second-hand shop in Canberra, where ex-government furniture is sold off cheaply. The deals can be even cheaper when the items in question are two heavy filing cabinets to which no-one can find the keys. They were purchased for … Read More “Cabinet of Secret Documents from Australia” »
The Guardian is reporting that “every NHS trust assessed for cyber security vulnerabilities has failed to meet the standard required.” This is the same NHS that was debilitated by WannaCry. Powered by WPeMatico
A CNN reporter foundsome sensitive — but, technically, not classified — documents about Super Bowl security in the front pocket of an airplane seat. Powered by WPeMatico
Pretty, but contains no actual squid ingredients. As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered. Read my blog posting guidelines here. Powered by WPeMatico