It’s amazing that this is even possible: “SonarSnoop: Active Acoustic Side-Channel Attacks“: Abstract: We report the first active acoustic side-channel attack. Speakers are used to emit human inaudible acoustic signals and the echo is recorded via microphones, turning the acoustic system of a smart phone into a sonar system. The echo signal can be used … Read More “Using a Smartphone’s Microphone and Speakers to Eavesdrop on Passwords” »
Author: infossl
I am pleased to announce the publication of my latest book: Click Here to Kill Everybody: Security and Survival in a Hyper-connected World. In it, I examine how our new immersive world of physically capable computers affects our security. I argue that this changes everything about security. Attacks are no longer just about data, they … Read More “New Book Announcement: Click Here to Kill Everybody” »
Another giant squid washed up on a beach, this time in Wellington, New Zealand. Is this a global trend? As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered. Read my blog posting guidelines here. Powered by WPeMatico
On Thursday, September 6, starting at 10:00 am CDT, I’ll be doing a Reddit “Ask Me Anything” in association with the Ford Foundation. It’s about my new book, but — of course — you can ask me anything. No promises that I will answer everything…. Powered by WPeMatico
This is a current list of where and when I am scheduled to speak: I’m giving a book talk on Click Here to Kill Everybody at the Ford Foundation in New York City, on September 5, 2018. The Aspen Institute’s Cybersecurity & Technology Program is holding a book launch for Click Here to Kill Everybody … Read More “Upcoming Speaking Engagements” »
Yet another way of eavesdropping on someone’s computer activity: using the webcam microphone to “listen” to the computer’s screen. Powered by WPeMatico
I’ve previously written about people cheating in marathon racing by driving — or otherwise getting near the end of the race by faster means than running. In China, two people were convicted of cheating in a pigeon race: The essence of the plan involved training the pigeons to believe they had two homes. The birds … Read More “Cheating in Bird Racing” »
Interesting story of a CIA intelligence network in China that was exposed partly because of a computer security failure: Although they used some of the same coding, the interim system and the main covert communication platform used in China at this time were supposed to be clearly separated. In theory, if the interim system were … Read More “CIA Network Exposed through Insecure Communications System” »
Andy Greenberg wrote a fascinating account of the Russian NotPetya worm, with an emphasis on its effects on the company Maersk. BoingBoing post. Powered by WPeMatico
A report for the Center for Strategic and International Studies looks at surprise and war. One of the report’s cyberwar scenarios is particularly compelling. It doesn’t just map cyber onto today’s tactics, but completely reimagines future tactics that include a cyber component (quote starts on page 110). The U.S. secretary of defense had wondered this … Read More “Future Cyberwar” »