An early preview. As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered. Read my blog posting guidelines here. Powered by WPeMatico
There’s evidence: Though the assessment is not conclusive, the preponderance of the evidence points to Pyongyang. It includes the range of computer Internet protocol addresses in China historically used by the RGB, and the assessment is consistent with intelligence gathered recently by other Western spy agencies. It states that the hackers behind WannaCry are also … Read More “NSA Links WannaCry to North Korea” »
Turns out that it’s surprisingly easy to game: It appears that news sites deemed legitimate by Google News are being modified by third parties. These sites are then exploited to redirect to the spam content. It appears that the compromised sites are examining the referrer and redirecting visitors coming from Google News. Powered by WPeMatico
I hesitate to blog this, because it’s an example of everything that’s wrong with pop psychology. Malcolm Harris writes about millennials, and has a theory of why millennials leak secrets. My guess is that you could write a similar essay about every named generation, every age group, and so on. Powered by WPeMatico
This article argues that Britain’s counterterrorism problem isn’t lack of data, it’s lack of analysis. Powered by WPeMatico
Good commentary. Powered by WPeMatico
Research paper: “Subscribers remote geolocation and tracking using 4G VoLTE enabled Android phone,” by Patrick Ventuzelo, Olivier Le Moal, and Thomas Coudray. Abstract: VoLTE (Voice over LTE) is a technology implemented by many operators over the world. Unlike previous 2G/3G technologies, VoLTE offers the possibility to use the end-to-end IP networks to handle voice communications. … Read More “Security Flaws in 4G VoLTE” »
Interesting reading. Powered by WPeMatico
New US government report: “Report on Improving Cybersecurity in the Health Care Industry.” It’s pretty scathing, but nothing in it will surprise regular readers of this blog. It’s worth reading the executive summary, and then skimming the recommendations. Recommendations are in six areas. The Task Force identified six high-level imperatives by which to organize its … Read More “Healthcare Industry Cybersecurity Report” »
The more they mate, the sooner they die. Academic paper (paywall). News article. As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered. Read my blog posting guidelines here. Powered by WPeMatico