Matthew Green and students speculate on what truly well-designed ransomware system could look like: Most modern ransomware employs a cryptocurrency like Bitcoin to enable the payments that make the ransom possible. This is perhaps not the strongest argument for systems like Bitcoin — and yet it seems unlikely that Bitcoin is going away anytime soon. … Read More “Building Smarter Ransomware” »
Category: Security technology
Auto Added by WPeMatico
Longtime Internet security-policy pioneer Howard Schmidt died on Friday. He will be missed. Powered by WPeMatico
The New York Times reports that Uber developed apps that identified and blocked government regulators using the app to find evidence of illegal behavior: Yet using its app to identify and sidestep authorities in places where regulators said the company was breaking the law goes further in skirting ethical lines — and potentially legal ones, … Read More “Uber Uses Ubiquitous Surveillance to Identify and Block Regulators” »
Squid evolved during an “evolutionary war” — the Mesozoic Marine Revolution — about 100 million years ago. Research paper. As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered. Powered by WPeMatico
This is my talk at the RSA Conference last month. It’s on regulation and the Internet of Things, along the lines of this essay. I am slowly meandering around this as a book topic. It hasn’t quite solidified yet. Powered by WPeMatico
A delightful story. Powered by WPeMatico
Researchers have demonstrated how a malicious piece of software in an air-gapped computer can communicate with a nearby drone using a blinking LED on the computer. I have mixed feelings about research like this. On the one hand, it’s pretty cool. On the other hand, there’s not really anything new or novel, and it’s kind … Read More “Jumping Air Gaps with Blinking Lights and Drones” »
Summer Fowler at CMU has invented a new word: prosilience: I propose that we build operationally PROSILIENT organizations. If operational resilience, as we like to say, is risk management “all grown up,” then prosilience is resilience with consciousness of environment, self-awareness, and the capacity to evolve. It is not about being able to operate through … Read More “Buzzword Watch: Prosilience” »
Botnets have existed for at least a decade. As early as 2000, hackers were breaking into computers over the Internet and controlling them en masse from centralized systems. Among other things, the hackers used the combined computing power of these botnets to launch distributed denial-of-service attacks, which flood websites with traffic to take them down. … Read More “Botnets” »
ProofMode is an app for your smartphone that adds data to the photos you take to prove that they are real and unaltered: On the technical front, what the app is doing is automatically generating an OpenPGP key for this installed instance of the app itself, and using that to automatically sign all photos and … Read More ““Proof Mode” for your Smartphone Camera” »