Interesting research that shows we exaggerate the risks of something when we find it morally objectionable. From an article about and interview with the researchers: To get at this question experimentally, Thomas and her collaborators created a series of vignettes in which a parent left a child unattended for some period of time, and participants … Read More “Confusing Security Risks with Moral Judgments” »
Category: Security technology
Auto Added by WPeMatico
In this article, detailing the Australian and then worldwide investigation of a particularly heinous child-abuse ring, there are a lot of details of the pedophile security practices and the police investigative techniques. The abusers had a detailed manual on how to scrub metadata and avoid detection, but not everyone was perfect. The police used information … Read More “Interesting Internet-Based Investigative Techniques” »
The EFF has a good analysis of all the ways Windows 10 violates your privacy. Powered by WPeMatico
fMRI experiments show that we are more likely to ignore security warnings when they interrupt other tasks. A new study from BYU, in collaboration with Google Chrome engineers, finds the status quo of warning messages appearing haphazardly — while people are typing, watching a video, uploading files, etc. — results in up to 90 percent … Read More “Research on the Timing of Security Warnings” »
Now’s your chance…. Powered by WPeMatico
Photo of the cutest squid ever. As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered. Powered by WPeMatico
Radio noise from a nearby neon-sign transformer made it impossible for people to unlock their cars remotely. Powered by WPeMatico
Andrew Appel has a good two–part essay on securing elections. And three organizations — Verified Voting, EPIC, and Common Cause — have published a report on the risks of Internet voting. The report is primarily concerned with privacy, and the threats to a secret ballot. Powered by WPeMatico
If you’ve read my book Liars and Outliers, you know I like the prisoner’s dilemma as a way to think about trust and security. There is an enormous amount of research — both theoretical and experimental — about the dilemma, which is why I found this new research so interesting. Here’s a decent summary: The … Read More “Prisoner's Dilemma Experiment Illustrates Four Basic Phenotypes” »
The NSA was badly hacked in 2013, and we’re just now learning about it. A group of hackers called “The Shadow Brokers” claim to have hacked the NSA, and are posting data to prove it. The data is source code from “The Equation Group,” which is a sophisticated piece of malware exposed last year and … Read More “Major NSA/Equation Group Leak” »