Twitter
LinkedIn
RSS

Posts Tagged ‘bruce schneier’


The NSA’s Patents

Here are all the NSA’s patents, in one searchable database. If you find something good, tell us all in the comments.

Read More...

Debit Card Override Hack

Clever : Parrish allegedly visited Apple Stores and tried to buy products with four different debit cards, which were all closed by his respective financial institutions. When his debit card was inevitably declined by the Apple Store, he would protest and offer to call his bank — except, he wasn’t really calling his bank.

Read More...

The Costs of NSA Surveillance

New America Foundation has a new paper on the costs of NSA surveillance: economic costs to US business, costs to US foreign policy, and costs to security. News article .

Read More...

Conference on Deception

There was a conference on deception earlier this month. Sophie Van Der Zee has a summary of the sessions.

Read More...

Russia Paying for a Tor Break

Russia has put out a tender on its official government procurement website for anyone who can identify Tor users. The reward of $114,000 seems pretty cheap for this capability

Read More...

Security Vulnerability in the Tails OS

I’d like more information on this .

Read More...

Securing the Nest Thermostat

A group of hackers are using a vulnerability in the Nest thermostat to secure it against Nest’s remote data collection.

Read More...

US National Guard is Getting Into Cyberwar

The Maryland Air National Guard needs a new facility for its cyberwar operations : The purpose of this facility is to house a Network Warfare Group and ISR Squadron. The Cyber mission includes a set of capabilities, expertise to enable the cyber operational need for an always-on, net-speed awareness and integrated operational response with global reach. It enables operators to drive upstream in pursuit of cyber adversaries, and is informed 24/7 by intelligence and all-source information

Read More...

Hackers Steal Personal Information of US Security-Clearance Holders

The article says they were Chinese but offers no evidence: The intrusion at the Office of Personnel Management was particularly disturbing because it oversees a system called e-QIP , in which federal employees applying for security clearances enter their most personal information, including financial data.

Read More...

Security Against Traffic Analysis of Cloud Data Access

Here’s some interesting research on foiling traffic analysis of cloud storage systems.

Read More...