Hacking Trespass Law
December 10 2022This article talks about public land in the US that is completely surrounded by private land, which in some cases makes it inaccessible to the public. But there’s...
Read moreThis article talks about public land in the US that is completely surrounded by private land, which in some cases makes it inaccessible to the public. But there’s...
Read moreEufy cameras claim to be local only, but upload data to the cloud. The company is basically lying to reporters, despite being shown evidence to the contrary....
Read moreA bunch of Android OEM signing keys have been leaked or stolen, and they are actively being used to sign malware.
Łukasz Siewierski, a member of Google’s Android Security...
Read more
This is a really interesting paper that discusses what the authors call the Decoupling Principle:
The idea is simple, yet previously not clearly articulated: to ensure privacy, information should...
Read more
Kaspersky is reporting on a data wiper masquerading as ransomware that is targeting local Russian government networks.
The Trojan corrupts any data that’s not vital for the functioning of...
Read more
At a GMC plant. As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered. Read my blog posting guidelines...
Read moreWe know that complexity is the worst enemy of security, because it makes attack easier and defense harder. This becomes catastrophic as the effects of that attack become greater.
In...
Read moreThe company was hacked, and customer information accessed. No passwords were compromised.
Read more
Recent Comments