- + Friday Squid Blogging: Squid Purses—Squid-shaped purses for sale. As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered. ...
- + My TED Talks—I have spoken at several TED conferences over the years. TEDxPSU 2010: “ Reconceptualizing Security ” TEDxCambridge 2013: “ ...
- + Rare Interviews with Enigma Cryptanalyst Marian Rejewski—The Polish Embassy has posted a series of short interview segments with Marian Rejewski, the first person to crack the Enigma. Details from his ...
- + The UK Bans Default Passwords—The UK is the first country to ban default passwords on IoT devices. On Monday, the United Kingdom became the first country in the world to ban ...
- + AI Voice Scam—Scammers tricked a company into believing they were dealing with a BBC presenter. They faked her voice, and accepted money intended for her. [Author...
- + WhatsApp in India—Meta has threatened to pull WhatsApp out of India if the courts try to force it to break its end-to-end encryption. [Author: Bruce Schneier] [Catego...
- + Whale Song Code—During the Cold War, the US Navy tried to make a secret code out of whale song. The basic plan was to develop coded messages from recordings of ...
- + Friday Squid Blogging: Searching for the Colossal Squid—A cruise ship is searching for the colossal squid. As usual, you can also use this squid post to talk about the security stories in the news that...
- + Long Article on GM Spying on Its Cars’ Drivers—Kashmir Hill has a really good article on how GM tricked its drivers into letting it spy on them—and then sold that data to insurance companie...
- + The Rise of Large-Language-Model Optimization—The web has become so interwoven with everyday life that it is easy to forget what an extraordinary accomplishment and treasure it is. In just a few d...
- + Dan Solove on Privacy Regulation—Law professor Dan Solove has a new article on privacy regulation. In his email to me, he writes: “I’ve been pondering privacy consent for more...
- + Microsoft and Security Incentives—Former senior White House cyber policy director A. J. Grotto talks about the economic incentives for companies to improve their security—in pa...
- + Using Legitimate GitHub URLs for Malware—Interesting social-engineering attack vector : McAfee released a report on a new LUA malware loader distributed through what appeared to be a l...
- + Upcoming Speaking Engagements—This is a current list of where and when I am scheduled to speak: I’m speaking twice at RSA Conference 2024 in San Francisco. I’ll...
- + Friday Squid Blogging: The Awfulness of Squid Fishing Boats—It’s a pretty awful story . As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered...
- + Smuggling Gold by Disguising it as Machine Parts—Someone got caught trying to smuggle 322 pounds of gold (that’s about a quarter of a cubic foot) out of Hong Kong. It was disguised as machine...
- + Backdoor in XZ Utils That Almost Happened—Last week, the Internet dodged a major nation-state attack that would have had catastrophic cybersecurity repercussions worldwide. It’s a catastrophe ...
- + Friday Squid Blogging: Squid Trackers—A new bioadhesive makes it easier to attach trackers to squid. Note: the article does not discuss squid privacy rights. As usual, you can also...
- + Other Attempts to Take Over Open Source Projects—After the XZ Utils discovery, people have been examining other open-source projects. Surprising no one, the incident is not unique: The OpenJS F...
- + Using AI-Generated Legislative Amendments as a Delaying Technique—Canadian legislators proposed 19,600 amendments —almost certainly AI-generated—to a bill in an attempt to delay its adoption. I wrote ...
- + In Memoriam: Ross Anderson, 1956–2024—Last week, I posted a short memorial of Ross Anderson. The Communications of the ACM asked me to expand it. Here’s the longer version . ...
- + X.com Automatically Changing Link Text but Not URLs—Brian Krebs reported that X (formerly known as Twitter) started automatically changing twitter.com links to x.com links. The problem is: (1) it chan...
- + New Lattice Cryptanalytic Technique—A new paper presents a polynomial-time quantum algorithm for solving certain hard lattice problems. This could be a big deal for post-quantum crypto...
As of 5/3/24 10:42pm. Last new 5/3/24 5:42pm. Score: 358
- Next feed in category: Packet Storm Security