Twitter
LinkedIn
RSS

Posts Tagged ‘bruce schneier’


Security Vulnerability in the Tails OS

I’d like more information on this .

Read More...

Securing the Nest Thermostat

A group of hackers are using a vulnerability in the Nest thermostat to secure it against Nest’s remote data collection.

Read More...

US National Guard is Getting Into Cyberwar

The Maryland Air National Guard needs a new facility for its cyberwar operations : The purpose of this facility is to house a Network Warfare Group and ISR Squadron. The Cyber mission includes a set of capabilities, expertise to enable the cyber operational need for an always-on, net-speed awareness and integrated operational response with global reach. It enables operators to drive upstream in pursuit of cyber adversaries, and is informed 24/7 by intelligence and all-source information

Read More...

Hackers Steal Personal Information of US Security-Clearance Holders

The article says they were Chinese but offers no evidence: The intrusion at the Office of Personnel Management was particularly disturbing because it oversees a system called e-QIP , in which federal employees applying for security clearances enter their most personal information, including financial data.

Read More...

Security Against Traffic Analysis of Cloud Data Access

Here’s some interesting research on foiling traffic analysis of cloud storage systems.

Read More...

Risks of Keyloggers on Public Computers

Brian Krebs is reporting that: The U.S. Secret Service is advising the hospitality industry to inspect computers made available to guests in hotel business centers, warning that crooks have been compromising hotel business center PCs with keystroke-logging malware in a bid to steal personal and financial data from guests.

Read More...

Legal Attacks Against Tor

Last week, we learned that the NSA targets people who look for information about Tor. A few days later, the operator of a Tor exit node in Austria has been found guilty as an accomplice, because someone used his computer to transmit child porn. Even more recently, Tor has been named as a defendant in a revenge-porn suit in Texas because it provides web-porn operators with privacy

Read More...

GCHQ Catalog of Exploit Tools

The latest Snowden story is a catalog of exploit tools from JTRIG (Joint Threat Research Intelligence Group), a unit of the British GCHQ, for both surveillance and propaganda. It’s a list of code names and short descriptions, such as these: GLASSBACK: Technique of getting a targets IP address by pretending to be a spammer and ringing them. Target does not need to answer

Read More...

Studying Network Incident Response Teams Using Anthropological Methods

This is an interesting paper : “An Anthropological Approach to Studying CSIRTs.” A researcher spent 15 months at a university’s SOC conducting “ethnographic fieldwork.” Right now it’s more about the methodology than any results, but I’ll bet the results will be fascinating. And here’s some information about the project .

Read More...

This Leaked NSA Memo Will Restore Your Faith in Humanity

Okay, it’s a parody : The Russian Federation is more complex. At a political level there’s a lot of grandstanding

Read More...