Twitter
LinkedIn
RSS

Archive for July, 2011


Friday Squid Blogging: 25-foot Giant Squid Caught in Fishing Net

A 25-foot (or maybe 23-foot ) giant squid was caught off the coast of Florida. Also, I’m going to try something new. Let’s use this weekly squid post to talk about the security stories in the news that I didn’t cover

Read More...

Luggage Hack

Bypassing the lock on luggage.

Read More...

VU#690315: Avaya Secure Access Link (SAL) Gateway information disclosure vulnerability

Vulnerability Note VU#690315 Avaya Secure Access Link (SAL) Gateway information disclosure vulnerability Overview Avaya Secure Access Link (SAL) gateway releases 1.5, 1.8, and 2.0 have an information disclosure vulnerability in the default install. I.

Read More...

Hacking Apple Laptop Batteries

Interesting : Security researcher Charlie Miller, widely known for his work on Mac OS X and Apple’s iOS, has discovered an interesting method that enables him to completely disable the batteries on Apple laptops, making them permanently unusable, and perform a number of other unintended actions. The method, which involves accessing and sending instructions to the chip housed on smart batteries could also be used for more malicious purposes down the road

Read More...

ShareMeNot

ShareMeNot is a Firefox add-on for preventing tracking from third-party buttons (like the Facebook “Like” button or the Google “+1″ button) until the user actually chooses to interact with them.

Read More...

Data Privacy as a Prisoner’s Dilemma

Good analysis : Companies would be better off if they all provided meaningful privacy protections for consumers, but privacy is a collective action problem for them: many companies would love to see the ecosystem fixed, but no one wants to put themselves at a competitive disadvantage by imposing unilateral limitations on what they can do with user data. The solution — and one endorsed by the essay — is a comprehensive privacy law.

Read More...

Cryptography and Wiretapping

Matt Blaze analyzes the 2010 U.S. Wiretap Report. In 2000, government policy finally reversed course, acknowledging that encryption needed to become a critical part of security in modern networks, something that deserved to be encouraged, even if it might occasionally cause some trouble for law enforcement wiretappers.

Read More...

Ars Technica on Liabilities and Computer Security

Good article : Halderman argued that secure software tends to come from companies that have a culture of taking security seriously. But it’s hard to mandate, or even to measure, “security consciousness” from outside a company

Read More...

Duplicating Physical Keys from Photographs (Sneakey)

In this demonstration , researchers photographed keys from 200 feet away and then made working copies.

Read More...

Apple Releases iOS 4.3.5 and iOS 4.2.10

(added July 26, 2011) A full-content feed is available at http://www.us-cert.gov/current/index.atom

Read More...