In June, I blogged about a video of a live juvenile giant squid. Here’s how that video was captured. As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered. Read my blog posting guidelines here. Powered by WPeMatico
Category: Security technology
Auto Added by WPeMatico
All of life is based on the coordinated action of genetic parts (genes and their controlling sequences) found in the genomes (the complete DNA sequence) of organisms. Genes and genomes are based on code– just like the digital language of computers. But instead of zeros and ones, four DNA letters — A, C, T, G … Read More “When Biology Becomes Software” »
The Independent Commission on Examination Malpractice in the UK has recommended that all watches be banned from exam rooms, basically because it’s becoming very difficult to tell regular watches from smart watches. Powered by WPeMatico
This seems to be an identity theft first: Criminals used artificial intelligence-based software to impersonate a chief executive’s voice and demand a fraudulent transfer of €220,000 ($243,000) in March in what cybercrime experts described as an unusual case of artificial intelligence being used in hacking. Another news article. Powered by WPeMatico
The Carnegie Endowment for International Peace and Princeton University’s Center for Information Technology Policy convened an Encryption Working Group to attempt progress on the “going dark” debate. They have released their report: “Moving the Encryption Policy Conversation Forward. The main contribution seems to be that attempts to backdoor devices like smartphones shouldn’t also backdoor communications … Read More “More on Law Enforcement Backdoor Demands” »
Good paper on cybersecurity insurance: both the history and the promise for the future. From the conclusion: Policy makers have long held high hopes for cyber insurance as a tool for improving security. Unfortunately, the available evidence so far should give policymakers pause. Cyber insurance appears to be a weak form of governance at present. … Read More “On Cybersecurity Insurance” »
It’s not perfume for squids. Nor is it perfume made from squids. It’s a perfume called Squid, “inspired by life in the sea.” As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered. Read my blog posting guidelines here. Powered by WPeMatico
Many GPS trackers are shipped with the default password 123456. Many users don’t change them. We just need to eliminate default passwords. This is an easy win. Powered by WPeMatico
A decade ago, the Doghouse was a regular feature in both my email newsletter Crypto-Gram and my blog. In it, I would call out particularly egregious — and amusing — examples of cryptographic “snake oil.” I dropped it both because it stopped being fun and because almost everyone converged on standard cryptographic libraries, which meant … Read More “The Doghouse: Crown Sterling” »
Good article in the Washington Post on all the surveillance associated with credit card use. Powered by WPeMatico
