The “Momo challenge” – why it’s time to stop the hype [VIDEO]

Posted on March 1st, 2019 by Responsible Cyber

by Paul Ducklin Cyberscare-of-the-moment is the “Momo challenge”, named after an admittedly rather freaky Japanese sculpture known as Momo, or the Mother-Bird. The sculpture was made a few years ago by a horror-movie special effects artist and displayed at an art exhibition. Pictures of the sculpture began to circulate online over the last year or […]

Read More

Ep.021 – Leaked calls, a social media virus and passwords exposed [PODCAST]

Posted on February 27th, 2019 by Responsible Cyber

by Paul Ducklin The Naked Security podcast investigates a massive medical data blunder, tells you how NOT to do vulnerability disclosure, and finds out whether password managers do more harm than good. With Anna Brading, Paul Ducklin, Mark Stockley and Matt Boddy. This week’s stories: If you enjoy the podcast, please share it with other […]

Read More

Gen. Nakasone on US CyberCommand

Posted on February 22nd, 2019 by Responsible Cyber

Really interesting article by and interview with Paul M. Nakasone (Commander of U.S. Cyber Command, Director of the National Security Agency, and Chief of the Central Security Service) in the current issue of Joint Forces Quarterly. He talks about the evolving role of US CyberCommand, and it’s new posture of “persistent engagement” using a “cyber-presistant […]

Read More

Bluetooth “gas station” warning on Facebook – truth or hoax? [VIDEO]

Posted on February 22nd, 2019 by Responsible Cyber

by Paul Ducklin There’s a warning spreading virally on Facebook telling you to use your phone as a Bluetooth detector whenever you go to a gas station to buy fuel. The idea is that this will reliably warn you if there are any credit card skimmers nearby, and thus protect you from credit card fraud. […]

Read More

Reconstructing SIGSALY – Schneier on Security

Posted on February 20th, 2019 by Responsible Cyber

Jon PAUL • February 16, 2019 5:10 AM Hello all, I greatly appreciate your comments and feedback! 1/ There were 33 patents granted to BTL overall, some by very well-known engineers like Homer Dudley, inventor of the VOCODER. Many were classified secret at the time and only declassified in 1976. Claude Shannon’s fundamental paper Communication […]

Read More

Millions of “private” medical helpline calls exposed on internet

Posted on February 20th, 2019 by Responsible Cyber

by Paul Ducklin Thanks to Sophos security expert Petter Nordwall for his help with this article. You know when you call a helpline and a cheery voice advises you that your call may be recorded for a variety of reasons, all of which are supposed to be for your benefit? Have you ever wondered what […]

Read More

Ep. 020 – Leaky containers, careless coders and risky USB cables [PODCAST]

Posted on February 20th, 2019 by Responsible Cyber

by Paul Ducklin The Naked Security podcast explains the recent security hole in Linux products such as Docker and Kubernetes, ponders whether Apple’s insistence on 2FA for developers will bring rogue apps under control, and tells you whether to worry about booby-trapped USB cables. With Anna Brading, Paul Ducklin and special guest Greg Iddon. This […]

Read More

Ep. 019 – Android holes, iOS screengrabbing and USB poo [PODCAST]

Posted on February 15th, 2019 by Responsible Cyber

by Paul Ducklin The Naked Security podcast pokes a stick into the latest critical security bugs in Android, investigates the dubious art of iOS screenshots you didn’t know about, and marvels at the USB drive that survived a seal’s digestive tract. With Anna Brading, Paul Ducklin, Mark Stockley and Matthew Boddy. This week’s stories: If […]

Read More

Top tips for Valentine’s Day – and the rest of the year! [VIDEO]

Posted on February 13th, 2019 by Responsible Cyber

by Paul Ducklin In this week’s Naked Security Live video, we’re giving you three quick and easy security tips for Valentine’s Day… …and for every other Day (and every other day) in the year. [embedded content] (Watch directly on YouTube if the video won’t play here.) PS. Like the shirt in the video? They’re available […]

Read More

Linux container bug could eat your server from the inside – patch now!

Posted on February 12th, 2019 by Responsible Cyber

by Paul Ducklin If you’re a fan of retro gaming, you’ve probably used an emulator, which is a software program that runs on computer hardware of one sort, and pretends to be a computer system of its own, possibly of a completely different sort. That’s how your latest-model Mac, which has an Intel x64 CPU, […]

Read More