What your antivirus software doesn’t tell you, and how to get that data

Posted on March 30th, 2019 by Responsible Cyber

Since the beginning, antivirus software vendors have lied about their accuracy. Many claim 100 percent accuracy in detecting bad programs and we, despite nearly every computer being protected by an antivirus program, are still exploited by malware. Submit any malware program to Google’s VirusTotal and get it scanned by 67 to 70 antivirus programs. Never […]

Read More

Friday Squid Blogging: Restoring the Giant Squid at the Museum of Natural History

Posted on March 30th, 2019 by Responsible Cyber

It is traveling to Paris. As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered. Read my blog posting guidelines here. Tags: squid Go to Source Author: Bruce Schneier

Read More

“Twitter 2007 multicolor” hoax – debunk it, don’t spread it!

Posted on March 28th, 2019 by Responsible Cyber

by Paul Ducklin We’ve written about internet hoaxes many times before on Naked Security. Sometimes, hoaxes – made-up nonsense about software, bugs or hackers – get spread widely because they sound exciting and scary. Even when a hoax sounds bizarre and unlikely, it may get picked up and repeated as an earnest truth by millions […]

Read More

Security Lessons from My Game Closet

Posted on March 24th, 2019 by Responsible Cyber

In an era of popular video games like Fortnite and Minecraft, there is a lot to be learned about risk, luck, and strategy from some old-fashioned board games. I was recently looking over my collection of board games. As my eyes moved from game to game, I thought about the strategy and approach with which […]

Read More

Spycam sex videos of 1,600 motel guests sold to paying subscribers

Posted on March 22nd, 2019 by Responsible Cyber

by Lisa Vaas We’ve heard before about hotel owners or Airbnb creep-hosts who’ve set up hidden webcams to capture videos of people having sex, but it seems there are also scumbags selling the live-streamed or prerecorded videos to paying subscribers. The Korea Herald reported on Wednesday that police have arrested two people for setting up […]

Read More

Self-sovereign identity: 3 key questions

Posted on March 15th, 2019 by Responsible Cyber

If you work in the area of identity you will have noticed a lot of talk about self-sovereign identity (SSI).  As a concept, it applies the goal of placing the user at the center of digital identity management and control. User-centric digital identity is not a new idea. I first came across it back in […]

Read More

Congress steers clear of industrial control systems cybersecurity

Posted on March 14th, 2019 by Responsible Cyber

Rule number one about legislation affecting the cybersecurity of industrial control systems (ICS) is that no one talks about legislation affecting the cybersecurity of ICS. At least it seems that way based on a number of attempts to get industry stakeholders to talk on the record about the prospects in the 116th Congress for any […]

Read More

Preserving the privacy of large data sets: Lessons learned from the Australian census

Posted on March 14th, 2019 by Responsible Cyber

Who needs hackers when the government puts sensitive information about every person in the country online and invites the internet to look at it? That’s what happened last year in Australia, and it sends a warning message of what not to do during the upcoming U.S. Census 2020. The Australian Bureau of Statistics published data […]

Read More

Letterlocking – Schneier on Security

Posted on March 14th, 2019 by Responsible Cyber

1&1~=Umm • March 9, 2019 11:48 AM @Seth: “from the little I’ve read about physically uncloneable functions when they’re designed properly they are very secure to tampering.” There’s a few rubs in there, first as many have found the reading material on PUFs is not exactly what you might call user friendly it goes from […]

Read More

Videos and Links from the Public-Interest Technology Track at the RSA Conference

Posted on March 14th, 2019 by Responsible Cyber

Yesterday at the RSA Conference, I gave a keynote talk about the role of public-interest technologists in cybersecurity. (Video here). I also hosted a one-day mini-track on the topic. We had six panels, and they were all great. If you missed it live, we have videos: How Public Interest Technologists are Changing the World: Matt […]

Read More