Everybody is reporting about a new security iPhone security feature with iOS 18: if the phone hasn’t been used for a few days, it automatically goes into its “Before...
Read moreCriminals Exploiting FBI Emergency Data Requests
November 12 2024I’ve been writing about the problem with lawful-access backdoors in encryption for decades now: that as soon as you create a mechanism for law enforcement to bypass encryption, the...
Read moreRoger Grimes on Prioritizing Cybersecurity Advice
October 31 2024This is a good point:
Part of the problem is that we are constantly handed lists…list of required controls…list of things we are being asked to fix or improve…lists...
Read more
IronNet Has Shut Down
October 11 2024After retiring in 2014 from an uncharacteristically long tenure running the NSA (and US CyberCommand), Keith Alexander founded a cybersecurity company called IronNet. At the time, he claimed that...
Read moreAn Analysis of the EU’s Cyber Resilience Act
September 26 2024A good—long, complex—analysis of the EU’s new Cyber Resilience Act.
Read morePython Developers Targeted with Malware During Fake Job Interviews
September 17 2024Interesting social engineering attack: luring potential job applicants with fake recruiting pitches, trying to convince them to download malware. From a news article
These particular attacks from North...
Read more
On the Cyber Safety Review Board
August 6 2024When an airplane crashes, impartial investigatory bodies leap into action, empowered by law to unearth what happened and why. But there is no such empowered and impartial body to...
Read moreProviding Security Updates to Automobile Software
July 30 2024Auto manufacturers are just starting to realize the problems of supporting the software in older models:
Today’s phones are able to receive updates six to eight years after their...
Read more
Apple Is Alerting iPhone Users of Spyware Attacks
July 11 2024Not a lot of details: Apple has issued a new round of threat notifications to iPhone users across 98 countries, warning them of potential mercenary spyware attacks. It’s the second...
Read more
Recent Comments