History of the HX-63 Rotor Machine
September 3 2021Jon D. Paul has written the fascinating story of the HX-63, a super-complicated electromechanical rotor cipher machine made by Crypto AG.
Read moreZero-Click iPhone Exploits
September 1 2021Citizen Lab is reporting on two zero-click iMessage exploits, in spyware sold by the cyberweapons arms manufacturer NSO Group to the Bahraini government. These are particularly scary exploits, since they...
Read moreMore Military Cryptanalytics, Part III
August 31 2021Late last year, the NSA declassified and released a redacted version of Lambros D. Callimahos’s Military Cryptanalytics, Part III. We just got most of the index. It’s hard to...
Read moreExcellent Write-up of the SolarWinds Security Breach
August 30 2021Robert Chesney wrote up the Solar Winds story as a case study, and it’s a really good summary.
Read moreFriday Squid Blogging: Tentacle Doorknob
August 27 2021It’s pretty. As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered. Read my blog posting guidelines here.
Read moreDetails of the Recent T-Mobile Breach
August 27 2021Seems that 47 million customers were affected. Surprising no one, T-Mobile had awful security. I’ve lost count of how many times T-Mobile has been hacked.
Read moreInteresting Privilege Escalation Vulnerability
August 26 2021If you plug a Razer peripheral (mouse or keyboard, I think) into a Windows 10 or 11 machine, you can use a vulnerability in the Razer Synapse software —...
Read moreSurveillance of the Internet Backbone
August 25 2021
Vice has an article about how data brokers sell access to the Internet backbone. This is netflow data. It’s useful for cybersecurity forensics, but can also be used...
Read more
Recent Comments