Interesting data: Turning to the crime section of the Chapman Survey on American Fears, the team discovered findings that not only surprised them, but also those who work in fields pertaining to crime. “What we found when we asked a series of questions pertaining to fears of various crimes is that a majority of Americans … Read More “Survey on What Americans Fear” »
Category: Security technology
Auto Added by WPeMatico
EDITED TO ADD (10/28): This is a more nuanced discussion of this issue. At this point, it seems clear that there is a lot less here than described in the blog post below. The latest version of Apple’s OS automatically syncs your files to iCloud Drive, even files you choose to store locally. Apple encrypts … Read More “Apple Copies Your Files Without Your Knowledge or Consent” »
Here’s a physical attack against a credit card verification system. Basically, the attack disrupts the communications between the retail terminal and the system that identifies revoked credit cards. Since retailers generally default to accepting cards when the system doesn’t work, the attack is generally successful. Powered by WPeMatico
There’s a report that the FBI has identified a second leaker: The case in question involves an Aug. 5 story published by The Intercept, an investigative website co-founded by Glenn Greenwald, the reporter who first published sensitive NSA documents obtained from Snowden. Headlined “Barack Obama’s Secret Terrorist-Tracking System, by the Numbers,” the story cited a … Read More “US Intelligence "Second Leaker" Identified” »
Last week, Ron Rivest gave a talk at MIT about Spritz, a new stream cipher by him and Jacob Schuldt. It’s basically a redesign of RC4, given current cryptographic tools and knowledge. RC4 is an example of what I think of as a too-good-to-be-true cipher. It looks so simple. It is so simple. In classic … Read More “Spritz: A New RC4-Like Stream Cipher” »
A pair of Humboldt squids attacked a Greenpeace submarine. There’s video. As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered. Powered by WPeMatico
Good analysis. Powered by WPeMatico
Interesting paper: Maya Embar, Louis M. McHough IV, and William R. Wesselman, “Printer watermark obfuscation,” Proceeding RIIT ’14: Proceedings of the 3rd annual conference on Research in information technology: Abstract: Most color laser printers manufactured and sold today add “invisible” information to make it easier to determine when a particular document was printed and exactly … Read More “Analysis of Printer Watermarking Techniques” »
Susan Landau has a new paper on the NSA’s increasing role in commercial cybersecurity. She argues that the NSA is the wrong organization to do this, and we need a more public and open government agency involved in commercial cybersecurity. Powered by WPeMatico
Last week, Adi Shamir gave a presentation at Black Hat Europe on using all-in-one printers to control computers on the other side of air gaps. There’s no paper yet, but two publications reported on the talk: Theoretically, if a malicious program is installed on an air-gapped computer by an unsuspecting user via, say, a USB … Read More “Jumping Air Gaps with All-in-One Printers” »