Report from the Cambridge Cybercrime Conference
July 15 2025The Cambridge Cybercrime Conference was held on 23 June. Summaries of the presentations are here.
Read moreThe Cambridge Cybercrime Conference was held on 23 June. Summaries of the presentations are here.
Read moreOnce you build a surveillance system, you can’t control who will use it:
A hacker working for the Sinaloa drug cartel was able to obtain an FBI official’s phone...
Read more
One one my biggest worries about VPNs is the amount of trust users need to place in them, and how opaque most of them are about who owns them...
Read moreIn response to a FOIA request, the NSA released “Fifty Years of Mathematical Cryptanalysis (1937-1987),” by Glenn F. Stahly, with a lot of redactions. Weirdly, this is the second time...
Read moreThe UK’s National Cyber Security Centre just released its white paper on “Advanced Cryptography,” which it defines as “cryptographic techniques for processing encrypted data, providing enhanced functionality over...
Read moreCitizen Lab has a new report on Paragon’s spyware:
Key Findings:
- Introducing Paragon Solutions. Paragon Solutions was founded in Israel in 2019 and sells spyware called Graphite. The company differentiates... Read more
NIST’s second draft of its “SP 800-63-4“—its digital identify guidelines—finally contains some really good rules about passwords:
The following requirements apply to passwords:
- lVerifiers and CSPs SHALL require passwords to... Read more
Really interesting analysis of the American M-209 encryption device and its security.
Read morePalo Alto Networks published its semi-annual report on ransomware. From the Executive Summary:
Unit 42 monitors ransomware and extortion leak sites closely to keep tabs on threat activity. We...
Read more
Consumer Reports has a new study of people-search site removal services, concluding that they don’t really work:
As a whole, people-search removal services are largely ineffective. Private information about...
Read more
Recent Comments