Lance Spitzner looks at the safety features of a power saw and tries to apply them to Internet security: By the way, here are some of the key safety features that are built into the DeWalt Mitre Saw. Notice in all three of these the human does not have to do anything special, just use … Read More “Security Lessons from a Power Saw” »
Category: Security technology
Auto Added by WPeMatico
Former NSA attorneys John DeLong and Susan Hennessay have written a fascinating article describing a particular incident of oversight failure inside the NSA. Technically, the story hinges on a definitional difference between the NSA and the FISA court meaning of the word “archived.” (For the record, I would have defaulted to the NSA’s interpretation, which … Read More “Intelligence Oversight and How It Can Fail” »
This is a harrowing story of a scam artist that convinced a mother that her daughter had been kidnapped. More stories are here. It’s unclear if these virtual kidnappers use data about their victims, or just call people at random and hope to get lucky. Still, it’s a new criminal use of smartphones and ubiquitous … Read More “Virtual Kidnapping” »
Squid ink risotto is a good accompaniment for any mild fish. As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered. Powered by WPeMatico
On today’s Internet, too much power is concentrated in too few hands. In the early days of the Internet, individuals were empowered. Now governments and corporations hold the balance of power. If we are to leave a better Internet for the next generations, governments need to rebalance Internet power more towards the individual. This means … Read More “Cybersecurity Issues for the Next Administration” »
Interesting data and analysis. Powered by WPeMatico
TU Delft is running a free online class in cybersecurity economics. Powered by WPeMatico
Richard Thieme gave a talk on the psychological impact of doing classified intelligence work. Summary here Powered by WPeMatico
You can edit anyone’s information you want: The question, boiled down, was haunting: Want to see how easy it would be to get into someone’s voter registration and make changes to it? The offer from Steve Klink — a Lafayette-based public consultant who works mainly with Indiana public school districts — was to use my … Read More “Indiana's Voter Registration Data Is Frighteningly Insecure” »
Interesting research in Nature. The article is behind a paywall, but here are five summaries of the research. Powered by WPeMatico