"PwnedPiper" flaws could allow attackers to disrupt delivery of lab samples or steal hospital employee credentials, new research shows.
Read moreThe European Space Agency Launches Hackable Satellite
August 2 2021Of course this is hackable: A sophisticated telecommunications satellite that can be completely repurposed while in space has launched. […] Because the satellite can be reprogrammed in orbit, it can respond...
Read moreOften it feels like squid just evolved better than us mammals. As usual, you can also use this squid post to talk about the security stories in the news that...
Read moreI Am Parting With My Crypto Library
July 30 2021
The time has come for me to find a new home for my (paper) cryptography library. It’s about 150 linear feet of books, conference proceedings, journals, and monographs —...
Read moreLatest episode - listen now!
Read moreStoring Encrypted Photos in Google’s Cloud
July 30 2021
New paper: “Encrypted Cloud Photo Storage Using Google Photos“:
Abstract: Cloud photo services are widely used for persistent, convenient, and often free photo storage, which is especially useful for...
Read more
The Life Cycle of a Breached Database
July 29 2021Every time there is another data breach, we are asked to change our password at the breached entity. But the reality is that in most cases by the time...
Read moreAirDropped Gun Photo Causes Terrorist Scare
July 29 2021A teenager on an airplane sent a photo of a replica gun via AirDrop to everyone who had their settings configured to receive unsolicited photos from strangers. This caused...
Read moreUt tensio, sic uis! Does twice the bug pile on twice the pressure to fix it?
Read more8 Security Tools to be Unveiled at Black Hat USA
July 28 2021Security researchers and practitioners share a host of new cyber tools for penetration testing, reverse engineering, malware defense, and more.
Read more
Recent Comments