I Am Parting With My Crypto Library
July 30 2021
The time has come for me to find a new home for my (paper) cryptography library. It’s about 150 linear feet of books, conference proceedings, journals, and monographs —...
Read more
The time has come for me to find a new home for my (paper) cryptography library. It’s about 150 linear feet of books, conference proceedings, journals, and monographs —...
Read moreLatest episode - listen now!
Read more
New paper: “Encrypted Cloud Photo Storage Using Google Photos“:
Abstract: Cloud photo services are widely used for persistent, convenient, and often free photo storage, which is especially useful for...
Read more
Every time there is another data breach, we are asked to change our password at the breached entity. But the reality is that in most cases by the time...
Read moreA teenager on an airplane sent a photo of a replica gun via AirDrop to everyone who had their settings configured to receive unsolicited photos from strangers. This caused...
Read moreUt tensio, sic uis! Does twice the bug pile on twice the pressure to fix it?
Read moreSecurity researchers and practitioners share a host of new cyber tools for penetration testing, reverse engineering, malware defense, and more.
Read more
This is important:
Monsignor Jeffrey Burrill was general secretary of the US Conference of Catholic Bishops (USCCB), effectively the highest-ranking priest in the US who is not a bishop,...
Read more
You're probably expecting us to say, "Patch early, patch often." And that is EXACTLY what we're saying!
Read more
Interesting research: “EvilModel: Hiding Malware Inside of Neural Network Models”.
Abstract: Delivering malware covertly and detection-evadingly is critical to advanced malware campaigns. In this paper, we present a method...
Read more
Recent Comments