Matt Blaze’s House testimony on the security of voting machines is an excellent read. (Details on the entire hearing is here.) I have not watched the video. Powered by WPeMatico
Category: Security technology
Auto Added by WPeMatico
I agree with Lorenzo Franceschi-Bicchierai, “Cryptocurrencies aren’t ‘crypto’“: Lately on the internet, people in the world of Bitcoin and other digital currencies are starting to use the word “crypto” as a catch-all term for the lightly regulated and burgeoning world of digital currencies in general, or for the word “cryptocurrency” — which probably shouldn’t even … Read More ““Crypto” Is Being Redefined as Cryptocurrencies” »
Beaked whales, living off the coasts of Ireland, feed on squid. As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered. Read my blog posting guidelines here. Powered by WPeMatico
A Turkish Airlines flight made an emergency landing because someone named his wireless network (presumably from his smartphone) “bomb on board.” In 2006, I wrote an essay titled “Refuse to be Terrorized.” (I am also reminded of my 2007 essay, “The War on the Unexpected.” A decade later, it seems that the frequency of incidents … Read More “Needless Panic Over a Wi-FI Network Name” »
ZDNet is reporting about another data leak, this one from US Army’s Intelligence and Security Command (INSCOM), which is also within to the NSA. The disk image, when unpacked and loaded, is a snapshot of a hard drive dating back to May 2013 from a Linux-based server that forms part of a cloud-based intelligence sharing … Read More “NSA “Red Disk” Data Leak” »
The cell phones we carry with us constantly are the most perfect surveillance device ever invented, and our laws haven’t caught up to that reality. That might change soon. This week, the Supreme Court will hear a case with profound implications on your security and privacy in the coming years. The Fourth Amendment’s prohibition of … Read More “Warrant Protections against Police Searches of Our Data” »
This is an interesting tactic, and there’s a video of it being used: The theft took just one minute and the Mercedes car, stolen from the Elmdon area of Solihull on 24 September, has not been recovered. In the footage, one of the men can be seen waving a box in front of the victim’s … Read More “Man-in-the-Middle Attack against Electronic Car-Door Openers” »
Uber was hacked, losing data on 57 million driver and rider accounts. The company kept it quiet for over a year. The details are particularly damning: The two hackers stole data about the company’s riders and drivers – including phone numbers, email addresses and names — from a third-party server and then approached Uber and … Read More “Uber Data Hack” »
Falsely labeled squid snacks were seized in Cambodia. I don’t know what food product it really was. As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered. Read my blog posting guidelines here. Powered by WPeMatico
Mozilla reviews the privacy practices of Internet-connected toys, home accessories, exercise equipment, and more. Powered by WPeMatico