Recursion [noun]: see recursion.
Read moreMore Military Cryptanalytics, Part III
August 31 2021Late last year, the NSA declassified and released a redacted version of Lambros D. Callimahos’s Military Cryptanalytics, Part III. We just got most of the index. It’s hard to...
Read moreExcellent Write-up of the SolarWinds Security Breach
August 30 2021Robert Chesney wrote up the Solar Winds story as a case study, and it’s a really good summary.
Read moreFriday Squid Blogging: Tentacle Doorknob
August 27 2021It’s pretty. As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered. Read my blog posting guidelines here.
Read moreDetails of the Recent T-Mobile Breach
August 27 2021Seems that 47 million customers were affected. Surprising no one, T-Mobile had awful security. I’ve lost count of how many times T-Mobile has been hacked.
Read moreBig bad decryption bug in OpenSSL – but no cause for alarm
August 27 2021The buggy code's in there, alright. Fortunately, it's hard to get OpenSSL to use it even if you want to, which mitigates the risk.
Read moreLatest episode - listen now!
Read moreInteresting Privilege Escalation Vulnerability
August 26 2021If you plug a Razer peripheral (mouse or keyboard, I think) into a Windows 10 or 11 machine, you can use a vulnerability in the Razer Synapse software —...
Read moreMan Robbed of 16 Bitcoin Sues Young Thieves’ Parents
August 25 2021In 2018, Andrew Schober was digitally mugged for approximately $1 million worth of bitcoin. After several years of working with investigators, Schober says he's confident he has located two...
Read moreSurveillance of the Internet Backbone
August 25 2021
Vice has an article about how data brokers sell access to the Internet backbone. This is netflow data. It’s useful for cybersecurity forensics, but can also be used...
Read more
Recent Comments