Neat. As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered. Powered by WPeMatico
Category: Security technology
Auto Added by WPeMatico
Interesting National Science Foundation award: In the proposed “CryptoClub” afterschool program, middle-grade students will explore cryptography while applying mathematics to make and break secret codes. The playfulness and mystery of the subject will be engaging to students, and the afterschool environment will allow them to learn at their own pace. Some activities will involve moving … Read More “Cryptography for Kids” »
Earlier this week, we learned that Samsung televisions are eavesdropping on their owners. If you have one of their Internet-connected smart TVs, you can turn on a voice command feature that saves you the trouble of finding the remote, pushing buttons and scrolling through menus. But making that feature work requires the television to listen … Read More “Samsung Television Spies on Viewers” »
DJI is programming no-fly zones into its drone software. Here’s how it’ll work. The update will add a list of GPS coordinates to the drone’s computer that tells it not to fly around the Washington D.C. area. When users are within a 15-mile restricted zone, the drone’s motors won’t spin up, preventing it from taking … Read More “Programming No-Fly Zones into Drones” »
Long New York Times article based on “former American and Indian officials and classified documents disclosed by Edward J. Snowden” outlining the intelligence failures leading up to the 2008 Mumbai terrorist attacks: Although electronic eavesdropping often yields valuable data, even tantalizing clues can be missed if the technology is not closely monitored, the intelligence gleaned … Read More “Electronic Surveillance Failures Leading up to the 2008 Mumbai Terrorist Attacks” »
Here are two essays trying to understand NSA malware and how it works, in light of the enormous number of documents released by Der Spiegel recently. Powered by WPeMatico
In January, the National Academies of Science (NAS) released a report on the bulk collection of signals intelligence. Basically, a year previously President Obama tasked the Director of National Intelligence with assessing “the feasibility of creating software that would allow the Intelligence Community more easily to conduct target information acquisition rather than bulk collection.” The … Read More “National Academies Report on Bulk Intelligence Collection” »
The Washington Department of Fish and Wildlife explains how to fish for squid. As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered. Powered by WPeMatico
In the latest article based on the Snowden documents, the Intercept is reporting that the NSA and GCHQ are piggy-backing on the work of hackers: In some cases, the surveillance agencies are obtaining the content of emails by monitoring hackers as they breach email accounts, often without notifying the hacking victims of these breaches. “Hackers … Read More “NSA Using Hacker Research and Results” »
Werner Koch, who has been maintaining the GPG email encryption program since 1997, is going broke and considering quitting. Updates to the article say that, because of the article, he has received substantial contributions to continue. Slashdot thread. Hacker News thread. Powered by WPeMatico