This is William Friedman’s highly annotated copy of Herbert Yardley’s book, The American Black Chamber. Powered by WPeMatico
Category: Security technology
Auto Added by WPeMatico
Interesting research: “A Study of MAC Address Randomization in Mobile Devices When it Fails“: Abstract: Media Access Control (MAC) address randomization is a privacy technique whereby mobile devices rotate through random hardware addresses in order to prevent observers from singling out their traffic or physical location from other nearby devices. Adoption of this technology, however, … Read More “Security Vulnerabilities in Mobile MAC Randomization” »
News from the South Atlantic: While the outlook is good at present, it is too early to predict what the final balance of this season will be. The sector is totally aware that the 2016 harvest started well, but then it registered a strong decline. Last year only 60,315 tonnes of Illex squid were landed, … Read More “Friday Squid Blogging: Squid Catches Down in Argentina” »
The article is right; this is frighteningly good. Powered by WPeMatico
An interesting history. Powered by WPeMatico
Researchers have demonstrated using Intel’s Software Guard Extensions to hide malware and steal cryptographic keys from inside SGX’s protected enclave: Malware Guard Extension: Using SGX to Conceal Cache Attacks Abstract:In modern computer systems, user processes are isolated from each other by the operating system and the hardware. Additionally, in a cloud scenario it is crucial … Read More “Using Intel's SGX to Attack Itself” »
CloudPets are an Internet-connected stuffed animals that allow children and parents to send each other voice messages. Last week, we learned that Spiral Toys had such poor security that it exposed 800,000 customer credentials, and two million audio recordings. As we’ve seen time and time again in the last couple of years, so-called “smart” devices … Read More “IoT Teddy Bear Leaked Personal Audio Recordings” »
Some good election security news for a change: France is dropping its plans for remote Internet voting, because it’s concerned about hacking. Powered by WPeMatico
I am part of this very interesting project: For many users, blog posts on how to install Signal, massive guides to protecting your digital privacy, and broad statements like “use Tor” — all offered in good faith and with the best of intentions — can be hard to understand or act upon. If we want … Read More “Digital Security Exchange: Security for High-Risk Communities” »
Brian Krebs posts a video advertisement for Philadelphia, a ransomware package that you can purchase. Powered by WPeMatico