The press is reporting a $32M theft of the cryptocurrency Ethereum. Like all such thefts, they’re not a result of a cryptographic failure in the currencies, but instead a software vulnerability in the software surrounding the currency — in this case, digital wallets. This is the second Ethereum hack this week. The first tricked people … Read More “Ethereum Hacks” »
Category: Security technology
Auto Added by WPeMatico
Slashdot asks if password masking — replacing password characters with asterisks as you type them — is on the way out. I don’t know if that’s true, but I would be happy to see it go. Shoulder surfing, the threat is defends against, is largely nonexistent. And it is becoming harder to type in passwords … Read More “Password Masking” »
Humble Bundle is selling a bunch of cybersecurity books very cheaply. You can get copies of Applied Cryptography, Secrets and Lies, and Cryptography Engineering — and also Ross Anderson’s Security Engineering, Adam Shostack’s Threat Modeling, and many others. This is the cheapest you’ll ever see these books. And they’re all DRM-free. Powered by WPeMatico
News from Australia: Under the law, internet companies would have the same obligations telephone companies do to help law enforcement agencies, Prime Minister Malcolm Turnbull said. Law enforcement agencies would need warrants to access the communications. “We’ve got a real problem in that the law enforcement agencies are increasingly unable to find out what terrorists … Read More “Australia Considering New Law Weakening Encryption” »
They’re rare: The one Dubielzig really wants is an eye from a giant squid, which has the biggest eye of any living animal — it’s the size of a dinner plate. “But there are no intact specimens of giant squid eyes, only rotten specimens that have been beached,” he says. As usual, you can also … Read More “Friday Squid Blogging: Eyeball Collector Wants a Giant-Squid Eyeball” »
There are two opposing models of how the Internet has changed protest movements. The first is that the Internet has made protesters mightier than ever. This comes from the successful revolutions in Tunisia (2010-11), Egypt (2011), and Ukraine (2013). The second is that it has made them more ineffectual. Derided as “slacktivism” or “clicktivism,” the … Read More “Book Review: Twitter and Tear Gas, by Zeynep Tufekci” »
A set of documents in Pakistan were detected as forgeries because their fonts were not in circulation at the time the documents were dated. Powered by WPeMatico
I have a soft spot for interesting biological security measures, especially by plants. I’ve used them as examples in several of my books. Here’s a new one: when tomato plants are attacked by caterpillars, they release a chemical that turns the caterpillars on each other: It’s common for caterpillars to eat each other when they’re … Read More “Tomato-Plant Security” »
“Traffic shaping” — the practice of tricking data to flow through a particular route on the Internet so it can be more easily surveiled — is an NSA technique that has gotten much less attention than it deserves. It’s a powerful technique that allows an eavesdropper to get access to communications channels it would otherwise … Read More “More on the NSA’s Use of Traffic Shaping” »
Some of the ways artists are hacking the music-streaming service Spotify. Powered by WPeMatico