Blogroll

Detecting Drone Surveillance with Traffic Analysis

Schneier on Security - Wed, 01/24/2018 - 12:28
This is clever: Researchers at Ben Gurion University in Beer Sheva, Israel have built a proof-of-concept system for counter-surveillance against spy drones that demonstrates a clever, if not exactly simple, way to determine whether a certain person or object is under aerial surveillance. They first generate a recognizable pattern on whatever subject­ -- a window, say -- someone might want... Bruce Schneier
Categories: Security

New Malware Hijacks Cryptocurrency Mining

Schneier on Security - Tue, 01/23/2018 - 13:41
This is a clever attack. After gaining control of the coin-mining software, the malware replaces the wallet address the computer owner uses to collect newly minted currency with an address controlled by the attacker. From then on, the attacker receives all coins generated, and owners are none the wiser unless they take time to manually inspect their software configuration. So... Bruce Schneier
Categories: Security

Skygofree: New Government Malware for Android

Schneier on Security - Mon, 01/22/2018 - 19:06
Kaspersky Labs is reporting on a new piece of sophisticated malware: We observed many web landing pages that mimic the sites of mobile operators and which are used to spread the Android implants. These domains have been registered by the attackers since 2015. According to our telemetry, that was the year the distribution campaign was at its most active. The... Bruce Schneier
Categories: Security

Dark Caracal: Global Espionage Malware from Lebanon

Schneier on Security - Mon, 01/22/2018 - 13:38
The EFF and Lookout are reporting on a new piece of spyware operating out of Lebanon. It primarily targets mobile devices compromised by fake secure messaging clients like Signal and WhatsApp. From the Lookout announcement: Dark Caracal has operated a series of multi-platform campaigns starting from at least January 2012, according to our research. The campaigns span across 21+ countries... Bruce Schneier
Categories: Security

Friday Squid Blogging: Te Papa Colossal Squid Exhibition Is Being Renovated

Schneier on Security - Fri, 01/19/2018 - 23:48
The New Zealand home of the colossal squid exhibit is behind renovated. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered. Read my blog posting guidelines here.... Bruce Schneier
Categories: Security

Security Breaches Don't Affect Stock Price

Schneier on Security - Fri, 01/19/2018 - 13:06
Interesting research: "Long-term market implications of data breaches, not," by Russell Lange and Eric W. Burger. Abstract: This report assesses the impact disclosure of data breaches has on the total returns and volatility of the affected companies' stock, with a focus on the results relative to the performance of the firms' peer industries, as represented through selected indices rather than... Bruce Schneier
Categories: Security

Student Cracks Inca Knot Code

Schneier on Security - Thu, 01/18/2018 - 14:12
Interesting.... Bruce Schneier
Categories: Security

Article from a Former Chinese PLA General on Cyber Sovereignty

Schneier on Security - Wed, 01/17/2018 - 13:23
Interesting article by Major General Hao Yeli, Chinese People's Liberation Army (ret.), a senior advisor at the China International Institute for Strategic Society, Vice President of China Institute for Innovation and Development Strategy, and the Chair of the Guanchao Cyber Forum. Against the background of globalization and the internet era, the emerging cyber sovereignty concept calls for breaking through the... Bruce Schneier
Categories: Security

Jim Risen Writes about Reporting Government Secrets

Schneier on Security - Tue, 01/16/2018 - 13:58
Jim Risen writes a long and interesting article about his battles with the US government and the New York Times to report government secrets.... Bruce Schneier
Categories: Security

Fighting Ransomware

Schneier on Security - Mon, 01/15/2018 - 13:43
No More Ransom is a central repository of keys and applications for ransomware, so people can recover their data without paying. It's not complete, of course, but is pretty good against older strains of ransomware. The site is a joint effort by Europol, the Dutch police, Kaspersky, and McAfee.... Bruce Schneier
Categories: Security

Friday Squid Blogging: Japanese "Dude Food" Includes Squid

Schneier on Security - Fri, 01/12/2018 - 23:12
This seems to be a trend. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered. Read my blog posting guidelines here.... Bruce Schneier
Categories: Security

XKCD's Smartphone Security System

Schneier on Security - Fri, 01/12/2018 - 19:51
Funny.... Bruce Schneier
Categories: Security

Facial Recognition Is Coming to Retail

Schneier on Security - Fri, 01/12/2018 - 13:29
Summary article.... Bruce Schneier
Categories: Security

Fingerprinting Digital Documents

Schneier on Security - Thu, 01/11/2018 - 19:50
In this era of electronic leakers, remember that zero-width spaces and homoglyph substitution can fingerprint individual instances of files.... Bruce Schneier
Categories: Security

Yet Another FBI Proposal for Insecure Communications

Schneier on Security - Thu, 01/11/2018 - 14:05
Deputy Attorney General Rosenstein has given talks where he proposes that tech companies decrease their communications and device security for the benefit of the FBI. In a recent talk, his idea is that tech companies just save a copy of the plaintext: Law enforcement can also partner with private industry to address a problem we call "Going Dark." Technology increasingly... Bruce Schneier
Categories: Security

Susan Landau's New Book: Listening In

Schneier on Security - Wed, 01/10/2018 - 20:42
Susan Landau has written a terrific book on cybersecurity threats and why we need strong crypto. Listening In: Cybersecurity in an Insecure Age. It's based in part on her 2016 Congressional testimony in the Apple/FBI case; it examines how the Digital Revolution has transformed society, and how law enforcement needs to -- and can -- adjust to the new realities.... Bruce Schneier
Categories: Security

Cybersecurity and the 2017 US National Security Strategy

Schneier on Security - Wed, 01/10/2018 - 14:27
Commentaries on the 2017 US national security strategy by Michael Sulmeyer and Ben Buchanan.... Bruce Schneier
Categories: Security

Daniel Miessler on My Writings about IoT Security

Schneier on Security - Tue, 01/09/2018 - 22:26
Daniel Miessler criticizes my writings about IoT security: I know it's super cool to scream about how IoT is insecure, how it's dumb to hook up everyday objects like houses and cars and locks to the internet, how bad things can get, and I know it's fun to be invited to talk about how everything is doom and gloom. I... Bruce Schneier
Categories: Security

NSA Morale

Schneier on Security - Tue, 01/09/2018 - 12:58
The Washington Post is reporting that poor morale at the NSA is causing a significant talent shortage. A November New York Times article said much the same thing. The articles point to many factors: the recent reorganization, low pay, and the various leaks. I have been saying for a while that the Shadow Brokers leaks have been much more damaging... Bruce Schneier
Categories: Security

Tourist Scams

Schneier on Security - Mon, 01/08/2018 - 13:34
A comprehensive list. Most are old and obvious, but there are some clever variants.... Bruce Schneier
Categories: Security
Syndicate content

eXTReMe Tracker