Infosecurity.US

Information Security & Occasional Forays Into Adjacent Realms

  • Web Log

Joe Armstrong's 'The Mess We're In' →

April 24, 2019 by Marc Handelman in Brilliant, Code, Requiescet Indu Pacem
April 24, 2019 /Marc Handelman
Brilliant, Code, Requiescet Indu Pacem

Browser Cookie Jar: The Pilferage

August 17, 2018 by Marc Handelman in Security Research, Brilliant, Information Security

via Cory Doctorow, comes this fascinating stoy of academicians exercising superlative research and detection skills in the effort to understand - in excrutiatingly intense detail - the true nature of cookie policies, in this case third-party cookie polices.

Entitled Who Left Open the Cookie Jar? A Comprehensive Evaluation of Third-Party Cookie Policies (PDF) (and of course, the researchers'documentation targeting the trove of discovered exploits) are all at your disposal to assit and perhaps discover other flaws in the browsers under scrutiny,

The creator/academians at the root of this ooutstanding comprehensive work - Gertjan Franken, Tom Van Goethem and Wouter Joosen all are Researchers at Catholic University in Leuven, Belgium were awarded the Distinguished Paper prize at this summers' Usenix Security Conference. Also covered in Academics Discover New Bypasses for Browser Tracking Protections and Ad Blockers by Catalin Cimpanu at Bleeping Computer. Both are today's Must Read!

August 17, 2018 /Marc Handelman
Security Research, Brilliant, Information Security

Bitcoin Explained →

March 29, 2018 by Marc Handelman in Brilliant, Bitcoin, Sarcasm, Satire, Security Humor
March 29, 2018 /Marc Handelman
Brilliant, Bitcoin, Sarcasm, Satire, Security Humor

Originally Published on Reddit

Hawking, Oliver, Schooled →

March 18, 2018 by Marc Handelman in Requiescat in Pacem, Sarcasm, Brilliant, Stuff of Genius, Humor
March 18, 2018 /Marc Handelman
Requiescat in Pacem, Sarcasm, Brilliant, Stuff of Genius, Humor

Dr. Chuvakin's Prescription: 'On Negative Pressure ...'

January 25, 2018 by Marc Handelman in Brilliant, Security Tooling, Security Testing, Security Strategy, Information Security, Cybersecurity

via Anton Chuvakin, Ph.D., Research VP and Distinguished Analyst at Gartner, speaks security truth to power. Pay attention folks - your organization's security and continued existence could very well depend on the action you take in your environments, based what he has to say.

January 25, 2018 /Marc Handelman
Brilliant, Security Tooling, Security Testing, Security Strategy, Information Security, Cybersecurity

DEF CON 25, Dan Petro's & Ben Morris' 'Weaponizing Machine Learning' →

August 15, 2017 by Marc Handelman in All is Information, Alternate Attack Vectors, Conferences, Brilliant, Education, Information Security, Machine Learning
August 15, 2017 /Marc Handelman
All is Information, Alternate Attack Vectors, Conferences, Brilliant, Education, Information Security, Machine Learning

Sam Cattle on Ransomware →

July 20, 2017 by Marc Handelman in Brilliant, Cybersecurity, Cybernetic Crime, Information Security

Sam Cattle - National Security Practice Director at Rolta AdviseX, presents on the company's solutions in the anti-ransomeware space. Enjoy.

July 20, 2017 /Marc Handelman
Brilliant, Cybersecurity, Cybernetic Crime, Information Security

DARPA, The Implantation Instantiation →

July 11, 2017 by Marc Handelman in DARPA, All is Information, Brilliant, Computer Science, Cognitive Security, Cogitation

News, via the IEEE's Spectrum Magazine (and reported by Eliza Strickland) of a challenge from DARPA's Neural Engineering Systems Design; in this case, the need for a recording brain implant has been identified. Indeed.

July 11, 2017 /Marc Handelman
DARPA, All is Information, Brilliant, Computer Science, Cognitive Security, Cogitation

BSides Boston 2017, The Jack Daniel Keynote →

May 12, 2017 by Marc Handelman in All is Information, Brilliant, Common Sense, Conferences, Education, Information Security, BSides

Tip O' THe Hat

May 12, 2017 /Marc Handelman
All is Information, Brilliant, Common Sense, Conferences, Education, Information Security, BSides

Myctyris Longicarpus, Ratiocinor Infra Aedificium →

March 02, 2017 by Marc Handelman in Biological Computation, Biology, Brilliant, Compute Infrastructure, Computer Science, Logic, Gates, Must Read

Via Futility Closet comes an outstanding computational methodology utilizing blue soldier crabs as the componentized logic delivery mechanism for a bio-computational device (in this case - a logic gate). Certainly today's MustRead.

March 02, 2017 /Marc Handelman
Biological Computation, Biology, Brilliant, Compute Infrastructure, Computer Science, Logic, Gates, Must Read

The Origami Solution →

February 20, 2017 by Marc Handelman in All is Information, Brilliant, Engineers, Law Enforcement, Physical Security, Physical Sciences

Meanwhile - admist all the foo-fa-raw of last weeks' RSAC 2017 - came very good physical security new's of a fascinating kevlar and aluminum origami-based ballistic shield (developed by Engineers at Brigham Young University) that stops .44 calibre magnum slugs. Very good news for law enforcement, and other organizations (think schools, other civilian government organizations, military, businesses)

The design is able to protect multiple people at one time and folds down to a compact shape. Utilizing the Yosimura Origami Crease Pattern, it currently tips the scales at a paltry 55 lbs. (25 kg).

Simply Outstanding.

February 20, 2017 /Marc Handelman
All is Information, Brilliant, Engineers, Law Enforcement, Physical Security, Physical Sciences

DARPA Visits Planet Meta →

January 16, 2017 by Marc Handelman in All is Information, Automation, Brilliant, US Armed Forces, United States of America, Science, Innovation, Information Sciences

Superb post at DARPA, detailing the Agency's plans to go Meta... Today's Must Read.

January 16, 2017 /Marc Handelman
All is Information, Automation, Brilliant, US Armed Forces, United States of America, Science, Innovation, Information Sciences

O'Reilly Security 2016, Dan Kaminsky's 'From Possible to Practical - The Path for Defense' →

December 09, 2016 by Marc Handelman in All is Information, Brilliant, Conferences, Information Security
December 09, 2016 /Marc Handelman
All is Information, Brilliant, Conferences, Information Security

O'Reilly Security, Cory Doctorow's Security and Feudalism →

December 02, 2016 by Marc Handelman in All is Information, Brilliant, Conferences, Information Security
December 02, 2016 /Marc Handelman
All is Information, Brilliant, Conferences, Information Security

Paul Vixie, Compromised Security in IoT Caused by Market Pressure →

November 30, 2016 by Marc Handelman in All is Information, Brilliant, IoT Security, ISOC

via the Internet Society's blog, comes an outstanding screed - penned by Jeri Clausing - detailing the on-target cogitation of the eponymous Paul Vixie, Ph.D., this time, those thoughts encompass the in-built security flaws of the seemingly ubiquitous IoT infrastructure. Read it and Weep.

November 30, 2016 /Marc Handelman
All is Information, Brilliant, IoT Security, ISOC

Soghoian, Your Smartphone is a Civil Rights Issue →

November 07, 2016 by Marc Handelman in All is Information, Brilliant, Cellular Telephony, Information Security, Communications, Common Sense

Dr. Soghoian's Take...

Tip O' The Hat to Firewall Consultants!

November 07, 2016 /Marc Handelman
All is Information, Brilliant, Cellular Telephony, Information Security, Communications, Common Sense

Ada, Calculated →

October 14, 2016 by Marc Handelman in All is Information, Brilliant, Computation, History
October 14, 2016 /Marc Handelman
All is Information, Brilliant, Computation, History

RDRLESS

June 24, 2016 by Marc Handelman in Brilliant, Sarcasm, Satire

Hat Tip

June 24, 2016 /Marc Handelman /Source
Brilliant, Sarcasm, Satire

Robert Waldinger, What Builds...

January 01, 2016 by Marc Handelman in All is Information, Brilliant, Research
January 01, 2016 /Marc Handelman
All is Information, Brilliant, Research

28x →

December 31, 2015 by Marc Handelman in All is Information, Brilliant, Information Security, Operating System Security, OpenSource, Operating Systems

Old, as these things go, yet truly the most glaring example of operating system failures yet seen, this time in Linus's Linux (Full Disclosure: We are heavy users of at least three Linux distro's)... Comes this outstandling and outrageous vulnerability, starting in 2009's release of Grub (also known as the Grand United Bootloader) all the way down through the ages to today 2015! The Dr's Marco and Ripoll of this embroglio-laden code expound further:

"A vulnerability in Grub2 has been found. Versions from 1.98 (December, 2009) to 2.02 (December, 2015) are affected. The vulnerability can be exploited under certain circumstances, allowing local attackers to bypass any kind of authentication (plain or hashed passwords). And so, the attacker may take control of the computer. Grub2 is the bootloader used by most Linux systems including some embedded systems. This results in an incalculable number of affected devices." - via Hector Marco, Ph.D. & Professor Ismael Ripoll, Ph.D., Cybersecurity Group.

December 31, 2015 /Marc Handelman
All is Information, Brilliant, Information Security, Operating System Security, OpenSource, Operating Systems
  • Newer
  • Older