gnat + security   112

Deep Black: More details on Boeing’s new secure Android smartphone | Ars Technica
Black is based on a proprietary security architecture that Boeing calls "PureSecure." Like Samsung’s Knox platform, it has a “trusted boot” mode that can detect and thwart any attempt to root the device—or disable it if it can’t. In addition to onboard media encryption for internal storage, the phone can be configured to inhibit certain functions based on location or the network it is connected to in order to prevent data loss. It might also be used to disable the device’s camera in secure facilities.
android  phone  security 
may 2014 by gnat
Evernote’s CTO on Your Biggest Security Worries From 3 to 300 Employees
"If you have 30 employees, at least three of them are using the same password for their corporate email as they used for something that's already been compromised in the past."
security  business 
january 2014 by gnat
At Facebook, zero-day exploits, backdoor code bring war games drill to life | Ars Technica
detailed story of how Facebook tried for verisimilitude in their security testing
security 
february 2013 by gnat
SysAdmin Corner: Introduction to Pentesting and the Pwn Plug – Part 1 – Techgage
The PwnPlug strikes a perfect balance between cost and function – unlike products such as Metasploit Pro and CORE Impact, it’s a one-time entry fee of between $500-$1,000 (depending on model) with no future costs. Unlike Backtrack, it doesn’t require any separate hardware to make it work. Thanks to its easy setup, it’s the perfect tool for someone who isn’t entirely familiar with the intricacies of the security field to keep themselves up-to-date with the same tools that an attacker would use… but provides a full pentesting platform for those who are already knowledgeable and are looking for something efficient and easy to deploy.
security 
december 2012 by gnat
Detail on kiosk fault too risky to release: MSD | Computerworld New Zealand
“there were always two grounds.”

and eurasia has always been at war with ...
security  politics  twaddle 
december 2012 by gnat
Computer Viruses Are "Rampant" on Medical Devices in Hospitals | MIT Technology Review
In a typical example, at Beth Israel Deaconess Medical Center in Boston, 664 pieces of medical equipment are running on older Windows operating systems that manufactures will not modify or allow the hospital to change—even to add antivirus software—because of disagreements over whether modifications could run afoul of U.S. Food and Drug Administration regulatory reviews, Fu says.
security  healthcare  hardware 
november 2012 by gnat
Malware Targeting Windows 8 Uses Google Docs | Symantec Connect Community
"Next, I would like to introduce a very unique feature of Backdoor.Makadocs. The latest version of Makadocs does not connect to a C&C server directly, rather, it uses Google docs as a proxy server."

not bad enough that people might use your online service for XSS attacks or SEO spam, now you might end up as botnet middleware!
security 
november 2012 by gnat
"Cyberdraft" Would Press-Gang Geeks Into Government Service | Fast Company
While it isn't a cyberdraft, Israel is building a Jewish foreign legion of computer geeks. Unit 8200 of the Israeli Defense Forces (IDF), which specializes in cyberwarfare and cyberintelligence, is embarking on a recruitment drive in the Jewish diaspora. According to a report in Israeli newspaper Yediot Ahronot, representatives from the IDF will be sent to scour for Jews abroad with cyberwarfare potential with interest in speaking to military recruiters. The newspaper cites a military source as saying that “Our first order of business is to search Jewish communities abroad for teens who could qualify […] Our representatives will then travel to the communities and begin the screening process there.”
security 
november 2012 by gnat
Errata Security: Why voting machines suck
The second point is that voting machines are never going to be robust like an ATM machine or a slot machine. Those machines are used every day, and people try to hack them every day. Voting machines are used only for one day every two years. These leads to a "security through obscurity" problem. Things that are exposed to hackers get quickly hacked, and quickly fixed. Things that aren't exposed to hackers have lingering, obvious problems with them that never get fixed. This is true for voting machines, SCADA control equipment, and so on.
security 
november 2012 by gnat
Terrorists suck - Boing Boing
terrorists just aren't very good at their jobs
security 
october 2012 by gnat
When human beings are asked to monitor computers, disaster ensues - Boing Boing
"But human beings are neurologically wired to stop noticing things that stay the same for a long time. We suck at vigilance. So when complex, stable systems catastrophically fail, so do we. "
psychology  risks  security 
may 2012 by gnat
The History of Key Design: From Ancient Wooden Rods to the Hotel Keycard - Slate Magazine
As locks and keys proliferated across Europe, they became increasingly sophisticated. This 1680 “detector lock,” designed in England by John Wilkes, is a technical marvel. To spring the bolt, you cock the cap of the merry musketeer; to find the keyhole, you slide his leg, hinged at the knee. And each time the door is unlocked, the numbered dial takes note, ticking forward a notch. That means that if you lock up your study when the dial’s at 98 and you come home to find it at 99, you know someone’s been messing around with your stuff.
security  history 
may 2012 by gnat
Buggy 'smart meters' open door to power-grid botnet • The Register
To prove his point, Davis and his IOActive colleagues designed a worm that self-propagates across a large number of one manufacturer's smart meter. Once infected, the device is under the control of the malware developers in much the way infected PCs are under the spell of bot herders. Attackers can then send instructions that cause its software to turn power on or off and reveal power usage or sensitive system configuration settings.
security  power  grid 
june 2009 by gnat
Bruce Perens - A Cyber-Attack on an American City
ham radios saved hospitals when saboteurs cut fibre in a city
security  infrastructure  internet 
april 2009 by gnat
Toorcamp 2009
hacker camp at a titan-1 missile silo. oh yes.
security  events 
april 2009 by gnat
joshua's blog: on url shorteners
So there are clear benefits for both the service (low cost of entry, potentially easy profit) and the linker (the quick rush of popularity). But URL shorteners are bad for the rest of us.
web  usability  security 
april 2009 by gnat
Fingerprinting Blank Paper Using Commodity Scanners | Freedom to Tinker
From the texture, you want to compute a concise, secure "fingerprint" which can survive ordinary wear and tear on the paper, such as crumpling, scribbling or printing, and moisture.
security  paper 
march 2009 by gnat
ivan krstić · code culture » Languages and security: a short reading list
# The “My name is Correctness, king of kings” people say that security problems are merely one manifestation of incorrectness, which is dissonance between what the program is supposed to do and what its implementation actually does. This tends to be the group led by mathematicians, and you can recognize them because their solutions revolve around proofs and the writing and (automatic) verification thereof.
programming  security  languages 
march 2009 by gnat
Source for "Megaupload auto-fill captcha" – Userscripts.org
neural network as greasemoney script (Javascript) that completes Captchas for megaupload.
programming  javascript  security  hacks  ocr  greasemonkey 
january 2009 by gnat
Obama keeps BlackBerry e-mail device, after all | Reuters
I wonder what "security on the device has been enhanced" means.
mobile  politics  security 
january 2009 by gnat
Private firm may track all email and calls | UK news | The Guardian
The only way to be safe from data leaks is not to gather it. A lesson the UK government hasn't learned. I wonder what demographic and voter psychological trends gave us the odd situation the UK is in: where MPs compete to be Tougher On Terror while simultaneously decrying the Iraq war, deploring China's human rights record while building IT infrastructure to enable similar state domination.
politics  security  database  england 
december 2008 by gnat
The Food Issue - An Open Letter to the Next Farmer in Chief - Michael Pollan - NYTimes.com
Michael Pollan's recipe for changing and fixing America's agricultural system. It all sounds good, but I'm nervous about arguing the decentralization is good for security--sure, no longer will one factory handle 20M hamburger patties, but now you'll have 15,000 processing plants and sources to secure, test, etc. Centralization is efficient for more than financial reasons.
food  agriculture  security  usa  politics 
november 2008 by gnat
Check am Flughafen: Scannen bis auf die Haut - SPIEGEL ONLINE - Nachrichten - Reise
what the security people see when you go through one of the new security scanners in airports.
security  privacy  transportation 
october 2008 by gnat
The Things He Carried - The Atlantic (November 2008)
Exploration of security theatre in US airports. Instructions on how to build a knife in the airplane toilets and fly even if you're on the no-fly list. "What if you don't know how to edit PDF files?" "Then you're a stupid terrorist and the government will catch you."
security  usa  politics  transportation 
october 2008 by gnat
U.N. agency eyes curbs on Internet anonymity | Politics and Law - CNET News
UN tech group working on an IP tracing standard, with use case of: "A political opponent to a government publishes articles putting the government in an unfavorable light. The government, having a law against any opposition, tries to identify the source of the negative articles but the articles having been published via a proxy server, is unable to do so protecting the anonymity of the author."
un  security  privacy  internet  politics 
september 2008 by gnat
I’m in Your Google Docs, Reading Your Spreadsheets - Bits - Technology - New York Times Blog
The danger of re-entering email addresses. Of course, this is solved by application integration (OH NO HOW MICROSOFT!) which either forces us all to use gmail (oh fuck NO!) or for all apps to be extensible (aka roll over and lubricate for the insertion of a Google Docs plugin). Is this the future? Is it a Robocop Brazil nightmare or is it ... no wait, there aren't any soft-focus upbeat movies about the future, are there?
google  security  privacy  email  collaboration  social  software 
august 2008 by gnat
MiFare RFID crack more extensive than previously thought
"It seems that all these wireless technologies are hyped for comfort, mostly," said Nohl. "Swiping a card is presented as cumbersome, whereas tapping a card is considered fancy and new. At the same time, these technologies are not really understood in terms of threat models."
rfid  ubicomp  security 
august 2008 by gnat
Home office measure gives public bodies access to personal emails and texts | UK news | The Guardian
OMFG, this is repugnant. EU wants local councils, health authorities and hundreds of other public bodies to have access to your voice, txt, and Internet traffic. How is this a good thing?
privacy  security  internet  europe  law 
august 2008 by gnat
Rain Master's Smart Controller Outsmarts The Thief
networked mobile devices can report their own theft. how long before this is expected and built-in? why don't Macs have this ability out of the box? phones?
mobile  ubicomp  security 
july 2008 by gnat
ABC News: Some Viruses Come Pre-Installed
q: how do we turn ubicomp into ubisec? At the moment it's heading for ubipwn.
security  hardware 
march 2008 by gnat
Touch-Screen Voting Machines Not Counted On - SD Times On The Web
Avi Rubin against touch-screen machines. Fortify offered their scanner to all state governments to check voting machines and so on...no takers.
democracy  security  ui 
march 2008 by gnat
Startup Plans to Solve Online Identity Theft, But Does Anyone Care?
privacy and security using multiparty cryptography. Interested in learn more.
crypto  security  privacy  startups 
february 2008 by gnat
Secrets of Shell and Rolls-Royce come under attack from China’s spies - Times Online
Shell via recruitment and threats on Chinese family back home; Rolls-Royce through trojans targeting their networks. MI6 sent the companies mail.
security  china  england  politics 
december 2007 by gnat
Scan This Guy's E-Passport and Watch Your System Crash
buffer overflow possible in the JPEG image stored in machine-readable passports
security  travel 
august 2007 by gnat
FBI: Encryption Really Pisses Us Off
NSA will decrypt shit for FBI if terrorism involved. FileVault with excellent passwords = problem for FBI. There's a megacontract between FBI and MS for help with MS encryption tech.
security  windows  microsoft 
may 2007 by gnat
Family feud may have sparked cruel Craigslist hoax
Family feud may have sparked cruel Craigslist hoax
great  story  web  security  fun 
april 2007 by gnat
My Amazon Anniversary
Chris waits a year then releases an unfixed bug he filed with Amazon
security  amazon 
march 2007 by gnat
SnoopStick From CYBERsitter
plug into computer A, it installs spyware. plug it into computer B and you can monitor computer A. all on a USB stick
security  techfutures 
february 2007 by gnat
Home - LOCKSS
Lots of Copies Keeps Stuff Safe
security  data 
february 2007 by gnat
Big Friend-of-a-Friend
The Department of Homeland Security is paying Rutgers $3 million to oversee development of computing methods that could monitor suspicious social networks and opinions found in news stories, Web blogs and other Web information to identify indicators of po
web2.0  security  politics 
february 2007 by gnat
SiVuS - VoIP Vulnerability Scanner
First publicly available vulnerability scanner for VoIP networks
voip  voice  security  radar 
september 2005 by gnat
The Mobile Technology Weblog - Tracking Mobiles, Tapping Calls
Roundup of articles about how lax mobile phone security is: how easily you can be overheard, your calls traced, etc.
mobile  security 
september 2005 by gnat
Bletchley Park security conference
security con to be held at site of Enigma code breakers
conferences  security 
december 2004 by gnat
hacking w/google
passwords, usernames, portals, sensitive directories, etc.
google  security 
september 2004 by gnat
Zaius
invade Mac OS X space by loading bundles into other apps.
mac  os  programming  security  x 
july 2004 by gnat
« earlier      
per page:    204080120160

Copy this bookmark:



description:


tags: