Infosecurity.US

Information Security & Occasional Forays Into Adjacent Realms

  • Web Log

Supercalifragilistic Reidentifiability →

January 31, 2015 by Marc Handelman in All is Information, Computation, Computer Science, Data Security, Database Security, Information Security, Information Sciences, Intelligence

Well documented paper on the capability to identify entities via credit card metadata [i.e., the identification is based on what was once thought to be anonymous big data...]. Time to move back to currency transactions. Tout Simplement Incroyable.

January 31, 2015 /Marc Handelman
All is Information, Computation, Computer Science, Data Security, Database Security, Information Security, Information Sciences, Intelligence
Share

DeepFace and the End of Privacy

January 30, 2015 by Marc Handelman in All is Information, Computation, Computer Science, Data Security, Database Security, Demise of Privacy

In a new series (typically, behind Science Magazines' pay-wall, but free access to February 5th, 2015), comes this particularly disturbing revelation of Facebook Inc.'s (NasdaqGS: FB) DeepFace system which is now, apparently,  as accurate as human's at facial recognition.

January 30, 2015 /Marc Handelman
All is Information, Computation, Computer Science, Data Security, Database Security, Demise of Privacy
Share

Diamonds, Quantum Computations Best Friend

January 17, 2015 by Marc Handelman in All is Information, Compute Infrastructure, Computer Science, Mathematics, Quantum Mathematics, Quantum Mechanics, Physical Sciences, Quantum Effects, Materials Science, Physics
January 17, 2015 /Marc Handelman
All is Information, Compute Infrastructure, Computer Science, Mathematics, Quantum Mathematics, Quantum Mechanics, Physical Sciences, Quantum Effects, Materials Science, Physics
Share

>

Tiny Subversions, Kazemi's Projects

December 24, 2014 by Marc Handelman in All is Information, Computer Science, Engineers

So important, Mr. Kazemi's video is meets today's Must Watch criteria.

December 24, 2014 /Marc Handelman
All is Information, Computer Science, Engineers
Share

ICS-CERT: Remote Code Execution Flaw, Network Time Protocol

December 22, 2014 by Marc Handelman in All is Information, Compute Infrastructure, Computer Science, Information Security, TCP/IP Internetworking, Web Security, Time, Network Protocols

Reports of newly discovered targeted attack code harshed our collective holiday mellow late last week, with the notification via the ICS CERT of flaws in the Network Time Protocol (in this case, prior to NTP version 4.2.8). The NTP 4.28 tarball is here, for folks that need to update their NTP deployments.

"NTP users are strongly urged to take immediate action to ensure that their NTP daemon is not susceptible to use in a reflected denial-of-service (DRDoS) attack. Please see the NTP Security Notice for vulnerability and mitigation details, and the Network Time Foundation Blog for more information. (January 2014) " - via NTP.org

 

December 22, 2014 /Marc Handelman
All is Information, Compute Infrastructure, Computer Science, Information Security, TCP/IP Internetworking, Web Security, Time, Network Protocols
Share

Digital Weaponry, Vectored

December 10, 2014 by Marc Handelman in All is Information, Code, Compute Infrastructure, Computer Science, Data Security, Espionage, Government, Information Security, Malware, National Security, Network Security, Physical Security, Security

Once again, Kim Zetters' superlative prose details the astounding story of Stuxnet; this time, in a new book titled  'Countdown to Zero Day: Stuxnet and the Launch of the World’s First Digital Weapon' [published by Crown Publishing Group a division of Random House]. Apparently, like many other 'infections' the vector [in this case] is the order-of-the-day... This month's MustRead.

December 10, 2014 /Marc Handelman
All is Information, Code, Compute Infrastructure, Computer Science, Data Security, Espionage, Government, Information Security, Malware, National Security, Network Security, Physical Security, Security
Share

Wozniak, the Disruptor →

December 09, 2014 by Marc Handelman in All is Information, Computation, Computer Science, Mathematics, Stuff of Genius, Engineers, Electrical Engineering
December 09, 2014 /Marc Handelman
All is Information, Computation, Computer Science, Mathematics, Stuff of Genius, Engineers, Electrical Engineering
Share

'We Don't Have An Algorithm For This'

November 18, 2014 by Marc Handelman in All is Information, Complexity, Computation, Computer Science, Identity Management, Information Sciences, Information Security, Physical Sciences, Science

via Dr. Holger Sierks, a Max-Planck-Gesellschaft Scientist and Principal Investigator, leading the team working on the OSIRIS (Optical, Spectroscopic, and Infrared Remote Imaging System) on-board the Philae, describing the effort taken by human researchers when analyzing images of the comet...

The ramifications to many endeavors, ranging from automated driving, to automated information and physical security functionality (identity management, authentication, access control, biometrics, image recognition, et cetera)  are startling, when confronted with new visages, we have yet to develop algorithmic capabilities to manipulate the data, and bend it to our will. EOM

November 18, 2014 /Marc Handelman
All is Information, Complexity, Computation, Computer Science, Identity Management, Information Sciences, Information Security, Physical Sciences, Science
Share

OpenStack Juno, The Release

October 23, 2014 by Marc Handelman in Computation, Computer Science, OpenStack, OpenSource, Compute Infrastructure

News, via Renee Yao [with guest writer Mark Voelker, technical lead at Cisco] writing at Cisco Blogs, of the newly released OpenStack 2014.2 (aka Juno). Fundamentally, OpenStack open-source software targets the creation of cloud compute infrastructure, both private and public. Absolutely Outstanding.

October 23, 2014 /Marc Handelman
Computation, Computer Science, OpenStack, OpenSource, Compute Infrastructure
Share

British Tabulating Machine Company - The Turing Bombe Rotors 1940 - 1945

Bletchley Park, The History →

October 14, 2014 by Marc Handelman in All is Information, Computation, Computer Science, Data Security, Education, Espionage, Freedom, Government, Information Sciences, Information Security, Intelligence, Mathematics, Physical Sciences, Physical Security, Security Education, United Kingdom

Readers who have examined this weblog during the thirteen years plus of it's publication, know of my Interest in Matters Turing and Bletchley; Alan Turning & Bletchley Park, that is... With those Foci in mind, here is a fascinating serial scrutinizing the history of Bletchley Park, the nearly seventy-year-old locale of the United Kingdom of Great Britain and Northern Ireland's Government Code and Cypher School (GC&CS) (now known as GCHQ). Today's MustRead.

October 14, 2014 /Marc Handelman
All is Information, Computation, Computer Science, Data Security, Education, Espionage, Freedom, Government, Information Sciences, Information Security, Intelligence, Mathematics, Physical Sciences, Physical Security, Security Education, United Kingdom
Share

TrueCrypt, Resurrected →

September 22, 2014 by Marc Handelman in All is Information, Computer Science, Cryptography, Information Security, Mathematics, Security, Security Tooling

News, via Paul Rubens  writing at eSecurity Planet, of the apparent resurfacing of the TrueCrypt project, this time, with more eyes on the prize, so to speak.  Look for a resurrected TrueCrypt 7.1a code-base with a new re-branded name: CipherShed.  Hat Tip to Firewall Consultants.

September 22, 2014 /Marc Handelman
All is Information, Computer Science, Cryptography, Information Security, Mathematics, Security, Security Tooling
Share

Art credit: Bio Engineering

MonsterMind

August 14, 2014 by Marc Handelman in National Security, All is Information, Cryptography, Intelligence, Computer Science, Government, Information Sciences, Information Security, Data Security

via the inimitable Kim Zetter, Senior Staff Writer at Wired, comes this staggeringly well crafted piece on the United States National Security Agency / Central Security Service's work to create a tool known as MonsterMind. The natural progeny of encompassing surveillance, is the capability to detect and mitigate malware in the wild. 
 

August 14, 2014 /Marc Handelman
National Security, All is Information, Cryptography, Intelligence, Computer Science, Government, Information Sciences, Information Security, Data Security
Share

News of Bletchley Park

August 11, 2014 by Marc Handelman in National Security, Intelligence, Computation, All is Information, Information Security, Computer Science, Cryptography, Information Sciences, United Kingdom, Espionage

Bletchley Park has released the August 2014 edition of the Trusts' podcast series, this time, entitled 'Inspiring Women' in cryptanalysis; in which, the Trust focuses on the work women accomplished at Bletchley Park during World War II.

August 11, 2014 /Marc Handelman
National Security, Intelligence, Computation, All is Information, Information Security, Computer Science, Cryptography, Information Sciences, United Kingdom, Espionage
Share

Binary Math, Moores' Law and You

July 22, 2014 by Marc Handelman in All is Information, Computation, Computer Science, Mathematics
July 22, 2014 /Marc Handelman
All is Information, Computation, Computer Science, Mathematics
Share

Des Possibilités Infinies

July 15, 2014 by Marc Handelman in All is Information, Computer Science, Demise of Privacy, Information Security, Network Security, Physical Security

Fascinating write-up, via El Reg's John Leyden, of what some may say smack's a bit o' the Ned Ludd... In which, Mr. Leyden tells a tale fractionally too close to home; yours and my home, that is. A tale of portent, and societal dis-ease whence the Internet of Things [IoT] truly does arrive, and we become beholden to our inter-connected fridges, light bulbs and what-not. SkyNet? Hardly. An apt description would be MundaneNet™.

July 15, 2014 /Marc Handelman
All is Information, Computer Science, Demise of Privacy, Information Security, Network Security, Physical Security
Share

Domas, Pattern Recognition

July 03, 2014 by Marc Handelman in All is Information, Computation, Computer Science, Information Security
July 03, 2014 /Marc Handelman
All is Information, Computation, Computer Science, Information Security
Share

Qubits, Webinared

June 24, 2014 by Marc Handelman in Computation, Computer Science, Information Security, Science, Quantum Mechanics
June 24, 2014 /Marc Handelman
Computation, Computer Science, Information Security, Science, Quantum Mechanics
Share

TrueCrypt, Kaput

May 30, 2014 by Marc Handelman in Cryptography, Computer Science, Computation, Data Security

Unfortunate news, for TrueCrypt users, and project contributors... Apparently, the developers of the full disk encryption (FDE) open source product are in the process of shuttering the projects SourceForge site, along with directions targeting the product's users to migrate TrueCrypt partitions to BitLocker. 

May 30, 2014 /Marc Handelman
Cryptography, Computer Science, Computation, Data Security
Share

IETF Surveillance Mitigation RFC 7528

May 19, 2014 by Marc Handelman in Computer Science, Information Security, National Security, Security, IETF, Identity Theft

The IETF has declared pervasive monitoring as an attack via RFC 7528...

May 19, 2014 /Marc Handelman
Computer Science, Information Security, National Security, Security, IETF, Identity Theft
Share

Mickens: Computers are a Sadness, I am the Cure...

May 16, 2014 by Marc Handelman in Computer Science, Computation, Information Sciences, Research, Science

via Monitorama PDX 2014 an exposition of sorts, presented by the eponymous James Mickens of  Microsoft Corporation (NasdaqGS: MSFT) Research. Hat Tip -Trey at Firewall Consultants.

May 16, 2014 /Marc Handelman
Computer Science, Computation, Information Sciences, Research, Science
Share
  • Newer
  • Older