Infosecurity.US

Information Security & Occasional Forays Into Adjacent Realms

  • Web Log

CryptoHarlem, Teaching Encryption →

June 12, 2018 by Marc Handelman in Information Security, Education, Teaching, Security Education, Security Economics, Security Innovation, Security Leadership

'“You can’t buy a bag of chips in Harlem without being surveilled,” Mitchell said. CryptoHarlem has been teaching the community how to use encryption and other methods to prevent their digital activities from being surveilled and used against them. “People say this is the next frontier of civil rights,” Mitchell said.' from the Motherboard post via YouTube

June 12, 2018 /Marc Handelman
Information Security, Education, Teaching, Security Education, Security Economics, Security Innovation, Security Leadership

DEF CON Groups 9723, Irena Damsky & Omri Moyal's 'Stories From The Dark Side Of Managing A Security Research Department In A Start-Up' →

April 28, 2018 by Marc Handelman in Security Operations, Security Management, Information Security, Security Leadership
April 28, 2018 /Marc Handelman
Security Operations, Security Management, Information Security, Security Leadership

PowerHammer, The Mains Exploitation →

April 16, 2018 by Marc Handelman in Information Security, Cybersecurity, Data Leakage, Education, Security Science, Security Research, State of Israel, Must Read, Security Leadership

A new research paper has attracted my attention at arXiv.org; and from Mordechai Guri, Boris Zadov, Dima Bykhovsky, Yuval Elovici, all from the astonishingly prolific Ben-Gurion University of the Negev, in southern Israel's blooming desert - the Negev. Interestingly, all working in the Cyber-Security Research Center a component - if you will - of the Department of Software and Information Systems Engineering.

This is one of those seemingly easy to grasp, easy to execute (for the right entities, and with the apropos hardware and software exfiltration tools) in which, data may be slurped-up, with minimal invasive telltale artifacts left behind, simply from sampling the modulated goodness of the electrical power connection to the targeted device.

Importantly, this form of attack would be devestating to the target, of which, has essentially no in-built incusion defense watching over the electrical power flow into the machies PDU (other than the usual gatekeeping set up around and amongst whatever payload is being sought (think diretory services, database passwords, API security, tokens, et cetera). Certainly, today's Must Read.

April 16, 2018 /Marc Handelman
Information Security, Cybersecurity, Data Leakage, Education, Security Science, Security Research, State of Israel, Must Read, Security Leadership

Akamai's Dave Lewis Scrutinizes Mirai →

November 04, 2017 by Marc Handelman in Information Security, Cybersecurity, Security Leadership
November 04, 2017 /Marc Handelman
Information Security, Cybersecurity, Security Leadership