schneier Good policy paper (summary here) on the threats, current state, and potential policy solutions for the poor security of US space systems. …
Continue Reading about The Poor Cybersecurity of US Space Assets →
By admin
schneier Good policy paper (summary here) on the threats, current state, and potential policy solutions for the poor security of US space systems. …
Continue Reading about The Poor Cybersecurity of US Space Assets →
By admin
schneier Interesting research: "You are your Metadata: Identification and Obfuscation of Social Media Users using Metadata Information," by Beatrice Perez, Mirco Musolesi, and Gianluca …
By admin
schneier This is a fantastic video of a squid attracting prey with a tentacle that looks like a smaller squid. As usual, you can also use this squid post to talk about the security stories in the …
Continue Reading about Friday Squid Blogging: Squid Deception →
By admin
schneier According to a new CSIS report, "going dark" is not the most pressing problem facing law enforcement in the age of digital data: Over the past year, we conducted a series of interviews with …
Continue Reading about New Report on Police Digital Forensics Techniques →
By admin
schneier Ross Anderson liveblogged the Third Annual Cybercrime Conference …
By admin
schneier Krebs on Security is reporting that all 85,000 Google employees use two-factor authentication with a physical token. A Google spokesperson said Security Keys now form the basis of all …
Continue Reading about Google Employees Use a Physical Token as Their Second Authentication Factor →
Copyright © 2024 All rights reserved.