XKCD, Documents →
via Randall Munroe, at XKCD.
The United States Federal Bureau of Investigation has just issued an update to the Bureaus' ongoing investigation into the SONY [NYSE: SNE] breach, and the miscreants that committed the crime. The gist: North Korea has been implicated in the crime.
Astounding. The Litany of DRM exposed... This time, by that escapade ancienne - reuse. The POC has been published by KeurigHack. The enforcers may already be at your door.
The Electronic Frontier Foundations' Secure Messaging Scorecard is our Must Read. In a nutshell, the EFF has graded the anti-surveillance efficacy of an impressive number of providers and software packages. Enjoy!
In a well wrought thought piece crafted by Ellen Branagh, and published by Cable.UK (A UK based cable television and broadband inter-networking industry site), in which, the good Ms. Branagh converses with Olaf Kolkman, ISOCs' CITO, regarding the true nature and benefits brought to the networking table by our favorite integrity-guarantor of DNS queries, non-other than DNSSEC.
via the inimitable Dan Goodin, writing at Ars Technica, regales us with the latest POODLE attack news, this time, targeting TLS, and not your ankles...
Clerkendweller (aka Colin Watson) discusses an interesting ACM paper entitled 'Clubbing Seals: Exploring the Ecosystem of Third-party Security Seals', presented last month at the ACM CCS 2014. The paper's authors, Frank Piessens, Tom Van Goethem, Nick Nikiforakis and Wouter Joosen present a fascinating take on the current crop of security seals, badges and what-not, attesting the security posture of whatever site the badges appear on.
Once again, Kim Zetters' superlative prose details the astounding story of Stuxnet; this time, in a new book titled 'Countdown to Zero Day: Stuxnet and the Launch of the World’s First Digital Weapon' [published by Crown Publishing Group a division of Random House]. Apparently, like many other 'infections' the vector [in this case] is the order-of-the-day... This month's MustRead.
Fascinating blog post at Trustwave SpiderLabs by Tom Neaves, detailing a deep interest in all things wireless, and in this case 802.11 wireless and covert channel exploitation. Today's Must Read.
Fascinating piece on the notion of passwords, written by Ian Urbina at the New York Times Magazine; with an exceedingly tight focus on the true meaning of the so-called password object...
Everything you would want to know about the naming of malware, via Violet Blue for Zero Day. Enjoy.