In June 2019, Mandiant Threat Intelligence first reported to customers a pro-People’s Republic of China (PRC) network of hundreds of inauthentic accounts on Twitter, Facebook, and ...
Read moreSecurity Risks of Relying on a Single Smartphone
September 8 2021Isracard used a single cell phone to communicate with credit card clients, and receive documents via WhatsApp. An employee stole the phone. He reformatted the phone and replaced the...
Read moreLightning Cable with Embedded Eavesdropping
September 7 2021Normal-looking cables (USB-C, Lightning, and so on) that exfiltrate data over a wireless network. I blogged about a previous prototype here.
Read more“FudCo” Spam Empire Tied to Pakistani Software Firm
September 6 2021In May 2015, KrebsOnSecurity briefly profiled "The Manipulaters," the name chosen by a prolific cybercrime group based in Pakistan that was very publicly selling spam tools and a range...
Read more3,000,000 downloads a week... if only they'd read the fastidious manual!
Read moreTracking People by their MAC Addresses
September 6 2021Yet another article on the privacy risks of static MAC addresses and always-on Bluetooth connections. This one is about wireless headphones.
The good news is that product vendors are...
Read moreFriday Squid Blogging: Squid Communication
September 3 2021Interesting article on squid communication. As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered. Read my blog posting...
Read moreHistory of the HX-63 Rotor Machine
September 3 2021Jon D. Paul has written the fascinating story of the HX-63, a super-complicated electromechanical rotor cipher machine made by Crypto AG.
Read moreS3 Ep48: Cryptographic bugs, cryptocurrency nightmares, and lots of phishing [Podcast]
September 3 2021Latest episode - listen now!
Read more
Recent Comments