Like many, I was surprised and shocked by the election of Donald Trump as president. I believe his ideas, temperament, and inexperience represent a grave threat to our country and world. Suddenly, all the things I had planned to work on seemed trivial in comparison. Although Internet security and privacy are not the most important … Read More “My Priorities for the Next Four Years” »
Category: Security technology
Auto Added by WPeMatico
That’s the conclusion of a research paper: Once [costs and complexity] are eliminated, it enables big hosting providers to issue and deploy certificates for their customers in bulk, thus quickly and automatically enable encryption across a large number of domains. For example, we have shown that currently, 47% of LE certified domains are hosted at … Read More “Let's Encrypt Is Making Web Encryption Easier” »
Interesting: “We used silver and carbon ink to print an image consisting of small rods that are about a millimeter long and a couple of hundred microns wide,” said Ajay Nahata from the University of Utah, leader of the research team. “We found that changing the fraction of silver and carbon in each rod changes … Read More “Hiding Information in Silver and Carbon Ink” »
A new ransomware, Popcorn Time, gives users the option of infecting others in lieu of paying the ransom. Related: a good general article on ransomware. EDITED TO ADD: Slashdot thread. Powered by WPeMatico
It’s called Cryptomancer. Think computer hacking plus magic. I know nothing about it, but it feels reminiscent of Shadowrun. Reddit thread. RPG.net thread. Powered by WPeMatico
Squid-inspired electronic screens. As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered. Powered by WPeMatico
A fully functional four-rotor Enigma machine sold for $463,500. Wow. Powered by WPeMatico
Le Monde and the Intercept are reporting about NSA spying in Africa, and NSA spying on in-flight mobile phone calls — both from the Snowden documents. Powered by WPeMatico
There’s new malware toolkit that uses steganography to hide in images: For the past two months, a new exploit kit has been serving malicious code hidden in the pixels of banner ads via a malvertising campaign that has been active on several high profile websites. Discovered by security researchers from ESET, this new exploit kit … Read More “WWW Malware Hides in Images” »
This article outlines two different types of international phone fraud. The first can happen when you call an expensive country like Cuba: My phone call never actually made it to Cuba. The fraudsters make money because the last carrier simply pretends that it connected to Cuba when it actually connected me to the audiobook recording. … Read More “International Phone Fraud Tactics” »