Infosecurity.US

Information Security & Occasional Forays Into Adjacent Realms

  • Web Log

CyCon 2018, Thomas Dullien's 'Security, Moore’s Law, And The Anomaly Of Cheap Complexity' →

June 17, 2018 by Marc Handelman in Complexity, Hardware Security, Information Security

Quite likely, the most imnportant media discussing hardware security, computer science, and complexity escalation you may view today (if you are interested in that sort of thing, that is). Slides available.

June 17, 2018 /Marc Handelman
Complexity, Hardware Security, Information Security

Becca Rick's 'How Paypal Shares Your Data' →

January 22, 2018 by Marc Handelman in Accountability, Bulk Data Collection, Complexity, Corporate Evil, Data Mining, Data Leakage, Data Discovery, Information Security

Rebecca (Becca) Rick's has published a highly informative interactive graphic (along with the data source) detailing the Paypal data sharing efforts, in which, your data is published to a multitude of said entities. Astonishing.

Folks, the easiest method to explore this super-graphic is to click this post's title, or the "published" link above, and magically visit the interactive graphic on Ms. Rick's site. Rated Highly Entertaining by Infosecurity.US!

Thanks for the H/T!

January 22, 2018 /Marc Handelman
Accountability, Bulk Data Collection, Complexity, Corporate Evil, Data Mining, Data Leakage, Data Discovery, Information Security

SIM'd

October 11, 2016 by Marc Handelman in All is Information, Complexity, Communications, Cellular Telephony

Well done (and mercifully brief) Subscriber Identity Module teardown. via Firewall Consultants.

October 11, 2016 /Marc Handelman /Source
All is Information, Complexity, Communications, Cellular Telephony

The Untrustworthy Chronicles: Password Strength Meters →

September 06, 2016 by Marc Handelman in All is Information, Authentication, Common Sense, Complexity, Information Security

via Sophos' Naked Security Blog, come this tell-all targeting password strength meters; perhaps, why caveat emptor is good advice, when testing the strength of password choices.

September 06, 2016 /Marc Handelman
All is Information, Authentication, Common Sense, Complexity, Information Security

Bostrom, What Happens When Computers Become Smarter Than Us →

November 05, 2015 by Marc Handelman in All is Information, Automation, Complexity, Computer Science, Disruptive Technologies, Singularity
November 05, 2015 /Marc Handelman
All is Information, Automation, Complexity, Computer Science, Disruptive Technologies, Singularity

All Your Automatonic Security Are Not Belong To Us →

June 22, 2015 by Marc Handelman in All is Information, Complexity, Automation, DevSecOps, DevOps

Well crafted thought piece appearing over at Darkmatters, a Norse blog, written by the inimitable Pete Herzog, regaling us with the truth of robotic security. Today's MustRead.

"The problem is that automating security creates a paradox. You see, in security, automation works best as a tool and not a wielder of tools. You see, your security automation is in charge of making periodic and systematic changes to controls and then verifying those changes." via Darkmatters, a Norse Security blog, by Pete Herzog

June 22, 2015 /Marc Handelman
All is Information, Complexity, Automation, DevSecOps, DevOps

Vitae Tacitum, Litaniae ex Signum →

December 08, 2014 by Marc Handelman in Complexity, Computation, Data Security, Information Security, Common Sense

Fascinating piece on the notion of passwords, written by Ian Urbina at the New York Times Magazine; with an exceedingly tight focus on the true meaning of the so-called password object...

December 08, 2014 /Marc Handelman
Complexity, Computation, Data Security, Information Security, Common Sense

Name'd →

December 05, 2014 by Marc Handelman in All is Information, Code, Complexity, Information Security, Research, Security, Vulnerabilities

Everything you would want to know about the naming of malware, via Violet Blue for Zero Day. Enjoy.

 

December 05, 2014 /Marc Handelman
All is Information, Code, Complexity, Information Security, Research, Security, Vulnerabilities

All Your Base, Encrypted They Are

November 25, 2014 by Marc Handelman in All is Information, Complexity, IETF, Information Security, SSL / TLS, EFF

Efforts are underway, led by the inimitable Electronic Frontier Foundation to encrypt the Internets, in it's entirety...

November 25, 2014 /Marc Handelman
All is Information, Complexity, IETF, Information Security, SSL / TLS, EFF

'We Don't Have An Algorithm For This'

November 18, 2014 by Marc Handelman in All is Information, Complexity, Computation, Computer Science, Identity Management, Information Sciences, Information Security, Physical Sciences, Science

via Dr. Holger Sierks, a Max-Planck-Gesellschaft Scientist and Principal Investigator, leading the team working on the OSIRIS (Optical, Spectroscopic, and Infrared Remote Imaging System) on-board the Philae, describing the effort taken by human researchers when analyzing images of the comet...

The ramifications to many endeavors, ranging from automated driving, to automated information and physical security functionality (identity management, authentication, access control, biometrics, image recognition, et cetera)  are startling, when confronted with new visages, we have yet to develop algorithmic capabilities to manipulate the data, and bend it to our will. EOM

November 18, 2014 /Marc Handelman
All is Information, Complexity, Computation, Computer Science, Identity Management, Information Sciences, Information Security, Physical Sciences, Science

Virtue of Patience

September 25, 2014 by Marc Handelman in All is Information, Computation, Complexity, Cruft, Information Security

Cogitate thrice upon updating newly released software with newly released patches to fix newly discovered bugs, as evidence of cruft...

September 25, 2014 /Marc Handelman
All is Information, Computation, Complexity, Cruft, Information Security

Complexity

August 27, 2014 by Marc Handelman in Complexity
August 27, 2014 /Marc Handelman
Complexity