security

Lucian Constantin’s Motherboard guide to protecting your home router is full of excellent, nearly impossible-to-follow advice that you should follow, but probably won’t. Constantin sensibly points out that your ability to trust your router ultimately and absolutely depends on its security track record (“How did it handle vulnerabilities…

Read More

In cryptographic and security circles, the “evil maid” problem describes a class of attacks in which a piece of unguarded hardware, is tampered with by someone who gains physical access to it: for example, a hotel chambermaid who can access your laptop while you’re out of the room. …

Read More

On Wednesday, the CIA released nearly 500,000 files recovered from the 2011 raid on Osama bin Laden’s compound in Abbottabad, Pakistan hideout. According to the CIA’s web page, the files are “temporarily unavailable pending resolution of a technical issue.” From Wired: Hailed by researchers and international relations experts as…

Read More

Respected security researcher Dan Wallach from Rice University has published a short (18 page) guide to securing small organizations against three kinds of cyberattack: Untargeted, ​remote ​(spammers, ​phishers, ​ransomware ​griefers, ​etc.); Targeted, ​remote ​(spear ​phishers); and Targeted, ​in ​person ​(immigration ​agents, ​police, ​criminal ​trespass). It’s an essential guide…

Read More

This month, University of Washington researchers will present Exploring ADINT: Using Ad Targeting for Surveillance on a Budget — or — How Alice Can Buy Ads to Track Bob at the Workshop on Privacy in the Electronic Society in Dallas; the paper details a novel way that stalkers and…

Read More

One week after announcing the worst breach in American history, and days after it was revealed that the breach had been caused by simple negligence, Equifax has announced the “retirement” of its Chief Information Officer, David Webb, and Chief Security Officer, Susan Mauldin, though “the company’s review of the…

Read More

The NSO Group is an Israeli firm that describes itself as a “cyber warfare” company, dealing exclusively to governments, including the famously corrupt and dysfunctional government of Mexico. The NSO Group is presently for sale, with a $1 billion pricetag. Earlier this year, NSO Group malware was used…

Read More