Blogroll

Spectre and Meltdown Attacks

Schneier on Security - Thu, 01/04/2018 - 14:28
After a week or so of rumors, everyone is now reporting about the Spectre and Meltdown attacks against pretty much every modern processor out there. These are side-channel attacks where one process can spy on other processes. They affect computers where an untrusted browser window can execute code, phones that have multiple apps running at the same time, and cloud... Bruce Schneier
Categories: Security

Tamper-Detection App for Android

Schneier on Security - Wed, 01/03/2018 - 14:17
Edward Snowden and Nathan Freitas have created an Android app that detects when it's being tampered with. The basic idea is to put the app on a second phone and put the app on or near something important, like your laptop. The app can then text you -- and also record audio and video -- when something happens around it:... Bruce Schneier
Categories: Security

Fake Santa Surveillance Camera

Schneier on Security - Tue, 01/02/2018 - 14:51
Reka makes a "decorative Santa cam," meaning that it's not a real camera. Instead, it just gets children used to being under constant surveillance. Our Santa Cam has a cute Father Christmas and mistletoe design, and a red, flashing LED light which will make the most logical kids suspend their disbelief and start to believe!... Bruce Schneier
Categories: Security

Security Vulnerabilities in Star Wars

Schneier on Security - Mon, 01/01/2018 - 14:23
A fun video describing some of the many Empire security vulnerabilities in the first Star Wars movie. Happy New Year, everyone.... Bruce Schneier
Categories: Security

Friday Squid Blogging: Squid Populations Are Exploding

Schneier on Security - Sat, 12/30/2017 - 00:23
New research: "Global proliferation of cephalopods" Summary: Human activities have substantially changed the world's oceans in recent decades, altering marine food webs, habitats and biogeochemical processes. Cephalopods (squid, cuttlefish and octopuses) have a unique set of biological traits, including rapid growth, short lifespans and strong life-history plasticity, allowing them to adapt quickly to changing environmental conditions. There has been growing... Bruce Schneier
Categories: Security

Profile of Reality Winner

Schneier on Security - Fri, 12/29/2017 - 14:34
New York Magazine published an excellent profile of the single-document leaker Reality Winner.... Bruce Schneier
Categories: Security

The "Extended Random" Feature in the BSAFE Crypto Library

Schneier on Security - Thu, 12/28/2017 - 14:30
Matthew Green wrote a fascinating blog post about the NSA's efforts to increase the amount of random data exposed in the TLS protocol, and how it interacts with the NSA's backdoor into the DUAL_EC_PRNG random number generator to weaken TLS.... Bruce Schneier
Categories: Security

Post-Quantum Algorithms

Schneier on Security - Wed, 12/27/2017 - 14:28
NIST has organized a competition for public-key algorithms secure against a quantum computer. It recently published all of its Round 1 submissions. (Details of the NIST efforts are here. A timeline for the new algorithms is here.)... Bruce Schneier
Categories: Security

Acoustical Attacks against Hard Drives

Schneier on Security - Tue, 12/26/2017 - 17:34
Interesting destructive attack: "Acoustic Denial of Service Attacks on HDDs": Abstract: Among storage components, hard disk drives (HDDs) have become the most commonly-used type of non-volatile storage due to their recent technological advances, including, enhanced energy efficacy and significantly-improved areal density. Such advances in HDDs have made them an inevitable part of numerous computing systems, including, personal computers, closed-circuit television... Bruce Schneier
Categories: Security

Daniel B. Cid, Sucuri

Daniel Cid from Sucuri has agreed to a thought leadership interview. We hope that you will enjoy his thoughts and impressions and we certainly thank him for his time.

Categories: Security

Dominique Karg, AlienVault

Dominique Karg from AlienVault has agreed to a thought leadership interview. We hope that you will enjoy his thoughts and impressions and we certainly thank him for his time.

Categories: Security

Lance Spitzner, Securing The Human, founder

Lance Spitzner of Honeynet and Security The Human fame has agreed to a Thought Leadership interview and we certainly thank him for his time.

Categories: Security

Bill Pfeifer, Juniper Networks

Bill Pfeifer is a Product Line Engineer at Juniper Networks supporting security software and data center firewalls. He has been in the IT field for 15 years, including stints at an Army tank base, a technology reseller, and some time at a financial services ASP. He holds a Bachelor’s degree in Civil Engineering from Penn State and an MBA with a human resources focus from Oakland University.

Categories: Security

Chris Pogue, Senior Security Analyst

Chris Pogue is a Senior Security Analyst for the Spiderlabs Incident Response and Digital Forensics team at Trustwave. He has over ten years of administrative and security experience including three years on the IBM ISS X-Force Emergency Response Services Team, five years with IBM’s Ethical Hacking Team, and 13 years of Active Military service in the US Army Signal Corps.

Categories: Security

John Kanen Flowers

John is a truly unique security thought leader. He has been involved in a number of start ups and is currently working on something fairly radical カネ|box (or kane|box).

Categories: Security

Kees Leune, Leune Consultancy, LLC

Kees has made many contributions to the information assurance community, but one, the use of rubrics to help guide the peer review of GIAC Gold papers means a lot to me. It means a lot to you as well, because it created a state change for higher quality in the Gold program. So those of us at the Security Laboratory are excited that he has chosen to be a part of the SecurityThought Leadership Project.

Categories: Security

Joel Yonts, CISO

Joel Yonts is a seasoned security executive with a passion for information security research.He has over 20 years of IT experience with certifications in the areas of Security Leadership, Computer Forensics, Malware Analysis, Incident Handling, and Reverse Engineering. His research interests include malware analysis and defense, computer forensics, and enterprise security.

Categories: Security

Maury Shenk, TMT Advisor, Steptoe & Johnson

Maury Shenk, TMT Advisor at Steptoe and Johnson, working with a focus on intellectual property, information security and encryption issues, has agreed to be interviewed for the Security Thought Leadership project, Maury has also recently embarked on a consultancy business to build on new approaches for realizing value in technology and intellectual property He has agreed to be interviewed for the Security Thought Leadership project, and we certainly thank Maury for his time.

Categories: Security

Chris Wysopal, CTO, Veracode

Veracode’s CTO and Co-Founder, Chris Wysopal, was named one of InfoWorld's Top 25 CTO's and one of the 100 most influential people in IT by eWeek. One of the original vulnerability researchers and a member of L0pht Heavy Industries, he has testified on Capitol Hill in the US on the subjects of government computer security and how vulnerabilities are discovered in software. He is the author of “The Art of Software Security Testing” published by Addison-Wesley.

Categories: Security

Amir Ben-Efraim, CEO, Altor Networks

Amir Ben-Efraim, CEO and co-founder of Altor Networks has agreed to be interviewed for the Security Thought Leadership project. His company's booth at RSA2009 piqued my interest because they deal with one of my favorite subjects, Defense-in-Depth, but specifically in the virtual environment.

Categories: Security
Syndicate content

eXTReMe Tracker