Friday Squid Blogging: COVID Relief Funds

A town in Japan built a giant squid statue with its COVID relief grant.
One local told the Chunichi Shimbun newspap... schneier.com/blog/archives/202

Teaching Cybersecurity to Children

A new draft of an Australian educational curriculum proposes teaching children as young as five cybersecurity:
The proposed curriculum... schneier.com/blog/archives/202

New Spectre-Like Attacks

There’s new research that demonstrates security vulnerabilities in all of the AMD and Intel chips with micro-op caches, including the ones that were specifically engineere... schneier.com/blog/archives/202

Tesla Remotely Hacked from a Drone

This is an impressive hack:
Security researchers Ralf-Philipp Weinmann of Kunnamon, Inc. and Benedikt Schmotzle of Comsecuris GmbH have found remote zero-click security vulnerabilities in... schneier.com/blog/archives/202

-Fi

Identifying the Person Behind Bitcoin Fog

The person behind the Bitcoin Fog was identified and arrested. Bitcoin Fog was an anonymization service: for a fee, it mixed a bunch of people’s bitcoins u... schneier.com/blog/archives/202

-anonymization

Friday Squid Blogging: On Squid Coloration

Nice excerpt from Martin Wallin’s book Squid.
As usual, you can also use this squid post to talk about the security stories in the news that I haven’t c... schneier.com/blog/archives/202

Serious MacOS Vulnerability Patched

Apple just patched a MacOS vulnerability that bypassed malware checks.
The flaw is akin to a front entrance that’s barred and bolted ... schneier.com/blog/archives/202

Identifying People Through Lack of Cell Phone Use

In this entertaining story of French serial criminal Rédoine Faïd and his jailbreaking ways, there’s this bit about cell phone surveillance:
<blockquote... schneier.com/blog/archives/202

Second Click Here to Kill Everybody Sale

For a limited time, I am selling signed copies of Click Here to Kill Everybody in hardcover for just $6, plus shipping.
I have 600 copies of the b... schneier.com/blog/archives/202

Security Vulnerabilities in Cellebrite

Moxie Marlinspike has an intriguing blog post about Cellebrite, a tool used by police and others to break into smartphones. Moxie g... schneier.com/blog/archives/202

When AIs Start Hacking

If you don’t have enough to worry about already, consider a world where AIs are hackers.
Hacking is as old as humanity. We are creative problem solvers. We exploit loopholes, manipulate systems, and strive for more influence, power, a... schneier.com/blog/archives/202

Friday Squid Blogging: Squid-Shaped Bike Rack

There’s a new squid-shaped bike rack in Ballard, WA.
As usual, you can also use this squid post to talk about the security stories in the ... schneier.com/blog/archives/202

Details on the Unlocking of the San Bernardino Terrorist’s iPhone

The Washington Post has published a long story on the unlocking of the San Bernardino Terrorist’s iPhone 5C in 2016. We all th... schneier.com/blog/archives/202

Friday Squid Blogging: Blobs of Squid Eggs Found Near Norway

Divers find three-foot “blobs” — egg sacs of the squid Illex coindetii — off the coast of Norway.
As usual, you can also ... schneier.com/blog/archives/202

Cybersecurity Experts to Follow on Twitter

Security Boulevard recently listed the “Top-21 Cybersecurity Experts You Must Follow on Twitter in 2021.” I came in at... schneier.com/blog/archives/202

NSA Discloses Vulnerabilities in Microsoft Exchange

Amongst the 100+ vulnerabilities patch in this month’s Patch Tuesday, there are four in Microsoft Exchange that were <a href="https://... schneier.com/blog/archives/202

Show older
burn.capital mastodon

Toots for friends