Calling someone back feels safer than clicking an unknown link... but it isn't! Remind your friends and family.
Read moreParagon: Yet Another Cyberweapons Arms Manufacturer
August 3 2021
Forbes has the story:
Paragon’s product will also likely get spyware critics and surveillance experts alike rubbernecking: It claims to give police the power to remotely break into encrypted...
Read more
New Normal Demands New Security Leadership Structure
August 2 2021At the inaugural Omdia Analyst Summit, experts discuss where the past year has created gaps in traditional security strategy and how organizations can fill them.
Read more"PwnedPiper" flaws could allow attackers to disrupt delivery of lab samples or steal hospital employee credentials, new research shows.
Read moreThe European Space Agency Launches Hackable Satellite
August 2 2021Of course this is hackable: A sophisticated telecommunications satellite that can be completely repurposed while in space has launched. […] Because the satellite can be reprogrammed in orbit, it can respond...
Read moreOften it feels like squid just evolved better than us mammals. As usual, you can also use this squid post to talk about the security stories in the news that...
Read moreI Am Parting With My Crypto Library
July 30 2021
The time has come for me to find a new home for my (paper) cryptography library. It’s about 150 linear feet of books, conference proceedings, journals, and monographs —...
Read moreLatest episode - listen now!
Read moreStoring Encrypted Photos in Google’s Cloud
July 30 2021
New paper: “Encrypted Cloud Photo Storage Using Google Photos“:
Abstract: Cloud photo services are widely used for persistent, convenient, and often free photo storage, which is especially useful for...
Read more
The Life Cycle of a Breached Database
July 29 2021Every time there is another data breach, we are asked to change our password at the breached entity. But the reality is that in most cases by the time...
Read more
Recent Comments