Netsec, comsec, infosec and IA news, research and trends
Who needs to pull off a conventional bank robbery when you can simply steal Bitcoin online?
Critical crypto bug leaves Linux, hundreds of apps open to eavesdropping
Closing the IT security communications gap
Everyone in the enterprise has a very different grasp on IT risk, and different ways to express it. Putting financial metrics on IT risk gives everyone a common language.
Researchers at the University of Liverpool claim to have created a computer virus that can spread via Wi-Fi as efficiently as the common cold infects humans.
Chameleon can spread through densely populated areas like the common cold, the researchers claim, by hopping from network to network via access points, spreading rapidly amongst homes and businesses.
New Android "Blackphone" thinks your privacy is worth $629
D'oh! Hundreds of Millions of Stolen Login Credentials Found Online
Purported iOS 'flaw' lets nefarious apps secretly log keystrokes in background
Proof of concept captures all SSL traffic via Apple's goto fail exploit
IEEE and other publishers remove gibberish computer-generated research papers, including ones alleged to have been peer reviewed
Latest iPhone Update Fixes Major Security Flaw That Apple Kept Quiet
Because of recent blows to net neutrality Netflix streaming is getting slower (and probably won’t get better any time soon)
Multifactor Authentication for Office 365 Expanded to Regular Users
Google Announces Plans To Expand Fiber To 34 Additional U.S. Cities
Google Acquires SlickLogin, The Sound-Based Password Alternative
What is the Link Between Processors and Security?
What Google really means when it calls Android 'open' from John
Mac BitCoin Trojan Found on Legit Software Sites
Linksys Worm ("TheMoon") Captured from Nathan
NIST launches Cybersecurity Framework (FWIW)
Flappy Birds malware shenanigans have been discovered in multiple 3d party app marketplaces
IRC network calls for investigations over GCHQ's attack on Anonymous. QuakeNet calls GCHQ actions grossly hypocritical
The Herculean task of running IT at the Olympics
Hacked Within Minutes: Sochi Visitors Face An Internet Minefield
Bypass a padlock in seconds
Inside TAO, or What Have You Mail Ordered Recently?
Yet more NSA high-handedness comes to light
Harvard Bomb Threat used Anonymous Email, Tor
NSA Says It Foiled Plot To Destroy Our Economy By Bricking Computers Across The US - From Joe
Never use Intel processors - From John
Updated: Federal judge finds NSA phone spying likely unconstitutional from Bob
How f*d is my database?
Trends in Cyber Security by Dan Geer (Must Read)
Shameless plug. From here, go anywhere. :)
The internet mystery that has the world baffled.
Internet Explorer users face drive-by attacks targeting new 0-day bug (Updated) from Bob
CryptoLocker ransomware crooks offer "late payment penalty" option from Bob
Why you should change lock designs from the 1960's.
RFID Reader Snoops from 3 feet away.
Cyber Warfare is no Computer Game
Anatomy of an exploit - inside the CVE-2013-3893 Internet Explorer zero-day - Part 1 - Part 2 from Bob
Volatility 2.3 Released! - Get it here!
The Navy's newest warship is powered by Linux.
Cryptolocker - A hybrid asymmetric/symmetric cryptovirus has finally hit the streets - from Robert