Google has a new login service for high-risk users. it's good, but unforgiving. Logging in from a desktop will require a special USB key, while accessing your data from a mobile device will similarly require a Bluetooth dongle. All non-Google services and apps will be exiled from reaching into your Gmail or Google Drive. Google's malware scanners will use a...
The bug allowed the researcher to see the most sensitive vulnerabilities in Google's services.
Researchers in the British Virgin Islands have sunk a giant squid made out of steel mesh to serve as an artificial reef. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered. Read my blog posting guidelines here....
Earlier this month, Deputy Attorney General Rod Rosenstein gave a speech warning that a world with encryption is a world without law -- or something like that. The EFF's Kurt Opsahl takes it apart pretty thoroughly. Last week, FBI Director Christopher Wray said much the same thing. This is an idea that will not die....
For the first time since the Edward Snowden surveillance revelations, lawmakers get to choose a new law.
As data from critical applications proliferates, customers are looking for deep visibility across the storage network, Cisco says.
The AmosConnect communication shipboard platform is so weak, complete hijacking is easy -- and there's an open door, too.
Fascinating article about two psychologists who are studying interrogation techniques. Now, two British researchers are quietly revolutionising the study and practice of interrogation. Earlier this year, in a meeting room at the University of Liverpool, I watched a video of the Diola interview alongside Laurence Alison, the university's chair of forensic psychology, and Emily Alison, a professional counsellor. My permission...
Apparently, a pirate download of Microsoft Office could be the root of all the trouble.
The Communications Security Establishment of Canada -- basically, Canada's version of the NSA -- has released a suite of malware analysis tools: Assemblyline is described by CSE as akin to a conveyor belt: files go in, and a handful of small helper applications automatically comb through each one in search of malicious clues. On the way out, every file is...
Researchers are exploring ways to use your smartphone's camera as a secure way to identify yourself.
While serious, the bug would take advanced skills to exploit in a very small time window.
Yet another lesson in how not to secure your network.
Reaper is on track to become one of the largest botnets recorded in recent years — and yet nobody seems to know what it will do or when. But researchers say the damage could be bigger than last year's cyberattack.
It's based on the Mirai code, but much more virulent: While Mirai caused widespread outages, it impacted IP cameras and internet routers by simply exploiting their weak or default passwords. The latest botnet threat, known as alternately as IoT Troop or Reaper, has evolved that strategy, using actual software-hacking techniques to break into devices instead. It's the difference between checking...
Arm hopes the adoption of its new PSA system will help protect trillions of connected devices in the future.
Hacking back is a terrible idea that just will not die. Josephine Wolff takes apart the new hacking back bill that was introduced in the House recently....
The company has promised independent source code reviews and increased bug bounty rewards in the future.
Google's online payments system is designed to speed up purchases and reduce failure rates.
Interesting essay by Danna Staaf, the author of Squid Empire. (I mentioned the book two weeks ago.) As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered. Read my blog posting guidelines here....