Wanted: Cryptography Products for Worldwide Survey In 1999, Lance Hoffman, David Balenson, and others published a survey of non-US cryptographic […]
Archive : InfoSec
Friday Squid Blogging: The Chemistry of Squid Camouflage
Friday Squid Blogging: The Chemistry of Squid Camouflage Interesting research. As usual, you can also use this squid post to […]
Security company litigates to bar disclosure related to its own flaws
FireEye is a publicly traded security firm that regularly finds and reports vulnerabilities in Adobe Flash and Apple’s iOS and […]
Top 100 list shows Ashley Madison passwords are just as weak as all the rest
The unwashed masses are horrible at picking passwords. We’re reminded of this sad truism every time there’s a major leak—like […]
MIT ranks high in bad security at major universities
One of the most prestigious schools in information technology also ranks first among its peers in information security in a […]
Poll: Hillary Clinton Most Likely Candidate To Protect US From A Cyberattack
Among the long list of presidential candidates, Clinton emerges as a leader on cybersecurity issues in a poll conducted by […]
It’s 2015 and miscreants are still trying to dupe you with fake BSoDs
Tech support scammers have mocked up a web page with an even more dire version of Microsoft’s infamous Blue Screen […]
Iranian hackers ease off on US after friendly nuke chats, says NSA
Cyber-attacks against the US by Iranian hackers have eased noticeably since the countries’ landmark nuclear weapons accord, National Security Agency […]
Security bods jab pins at encrypted database system balloons
Developers of encrypted databases and security researchers are at loggerheads – and it’s over a study that claims property-preserving encrypted […]
Drone Self-Defense and the Law
Drone Self-Defense and the Law Last month, a Kentucky man shot down a drone that was hovering near his backyard. […]