Twitter
LinkedIn
RSS

Archive for the ‘Security Bloggers’ Category


Conference on Deception

There was a conference on deception earlier this month. Sophie Van Der Zee has a summary of the sessions.

Read More...

Russia Paying for a Tor Break

Russia has put out a tender on its official government procurement website for anyone who can identify Tor users. The reward of $114,000 seems pretty cheap for this capability

Read More...

Friday Squid Blogging: Build a Squid

An interactive animation from the Museum of New Zealand Te Papa Tongarewa. As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered.

Read More...

Building a Legal Botnet in the Cloud

Two researchers have built a botnet using free anonymous accounts. They only collected 1,000 accounts, but there’s no reason this can’t scale to much larger numbers

Read More...

Security Vulnerability in the Tails OS

I’d like more information on this .

Read More...

Securing the Nest Thermostat

A group of hackers are using a vulnerability in the Nest thermostat to secure it against Nest’s remote data collection.

Read More...

Fingerprinting Computers By Making Them Draw Images

Here’s a new way to identify individual computers over the Internet. The page instructs the browser to draw an image. Because each computer draws the image slightly differently, this can be used to uniquely identify each computer.

Read More...

Friday Squid Blogging: Squid Dissection

A six-hour video of a giant squid dissection from Auckland University of Technology. As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered.

Read More...

NASDAQ Hack

Long article on a sophisticated hacking of the NASDAQ stock exchange.

Read More...

US National Guard is Getting Into Cyberwar

The Maryland Air National Guard needs a new facility for its cyberwar operations : The purpose of this facility is to house a Network Warfare Group and ISR Squadron. The Cyber mission includes a set of capabilities, expertise to enable the cyber operational need for an always-on, net-speed awareness and integrated operational response with global reach. It enables operators to drive upstream in pursuit of cyber adversaries, and is informed 24/7 by intelligence and all-source information

Read More...