I'm in Cambridge University, at the tenth Workshop on Security and Human Behavior. SHB is a small invitational gathering of people studying various aspects of the human side of security, organized each year by Ross Anderson, Alessandro Acquisti, and myself. The 50 or so people in the room include psychologists, economists, computer security researchers, sociologists, political scientists, political scientists, neuroscientists,...
A total of 200 master keys can now be used by victims to decrypt and unlock their systems.
As devastating as the latest widespread ransomware attacks have been, it's a problem with a solution. If your copy of Windows is relatively current and you've kept it updated, your laptop is immune. It's only older unpatched systems on your computer that are vulnerable. Patching is how the computer industry maintains security in the face of rampant Internet insecurity. Microsoft,...
Kernels can be exploited and iCloud account user information leaked due to the security flaws.
Here's everything you need to know about the secretive FBI's investigative powers.
There's interesting research on using a set of "master" digital fingerprints to fool biometric readers. The work is theoretical at the moment, but they might be able to open about two-thirds of iPhones with these master prints. Definitely something to keep watching. Research paper (behind a paywall)....
In this guide, learn about current regulations and how to deal with theft, insurance problems, and hardware damage.
All this time, a rather simple Twitter bug could have caused chaos on the platform.
According to court documents, US Immigration and Customs Enforcement is using Stingray cell-site simulators to track illegal immigrants....
The malware is able to lock out companies from accessing their networks as well as infecting neighboring systems.
The government wants to install black box-type devices on telecoms networks for unfettered access to UK metadata, which one rights group says will "become central to the new surveillance regime."
Ransomware isn't new, but it's increasingly popular and profitable. The concept is simple: Your computer gets infected with a virus that encrypts your files until you pay a ransom. It's extortion taken to its networked extreme. The criminals provide step-by-step instructions on how to pay, sometimes even offering a help line for victims unsure how to buy bitcoin. The price...
The destructive ransomware has caused chaos and it may be that cyberattackers want to continue capitalizing on the malware.
The "black box" attacks compromise ATMs to dispense cash.
Authorities demanded data from twice as many Macs, iPhones, iPads in the second-half of last year than the first-half, despite fewer overall requests.
Reuters has an article on North Korea's cyberwar capabilities, specifically "Unit 180." They're still not in the same league as the US, UK, Russia, China, and Israel. But they're getting better....
The Department of Homeland Security is rumored to be considering extending the current travel ban on large electronics for Middle Eastern flights to European ones as well. The likely reaction of airlines will be to implement new traveler programs, effectively allowing wealthier and more frequent fliers to bring their computers with them. This will only exacerbate the divide between the...
The simple line of code made it possible for attackers to view private Yahoo Mail images.
The agency has "gigabytes" of server logs that offer evidence for the alleged distributed denial-of-service attack, but it won't make them public.
It's rare: Fishermen caught a 19-foot-long giant squid off the coast of Ireland on Monday, only the fifth to be seen there since 1673. Also the first in 22 years. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered. Read my blog posting guidelines here....