720-891-1663

Mitigating Over-Enthusiastic Airport Security

Katie Moussouris, formerly an executive at Microsoft and Symantec and now an executive at HackerOne, which as best as I can tell manages bug coordination with third parties for very large, well respected companies, tells a story about an over enthusiastic security person at Charles de Gaulle airport in Paris.  She was tapped for secondary […]

Continue reading → [DISPLAY_ACURAX_ICONS]

Why fingerprints should not be used for access control

A presentation at the Chaos Communication Congress (a large hacker convention in Hamburg, Germany that attracted about 10,000 visitors this year – sort of, kind of, like  Defcon here) demonstrated the ability to reproduce fingerprints of a target subject from just photographs.  Reports in PC Magazine say that the researcher, Jan Krissler, took photographs of Ursula von […]

Continue reading → [DISPLAY_ACURAX_ICONS]

Is your encryption secure? – Sure, just like flying pigs (keep reading)

Der Spiegel wrote an article on efforts by the NSA and GCHQ (their British equivalent) to crack encryption of various sorts. Take the article at what it is worth;  it is based on documents that Snowden released, so it is a little bit old. I apologize that this post is pretty long, but there is […]

Continue reading → [DISPLAY_ACURAX_ICONS]

Hackers break in to German steel mill and cause “serious damage”

BBC and others are reporting that a German steel mill was hacked.  The report came not from the news media or the mill, but rather the German Federal Office for Information Security (BSI). As a result, not a lot of details are known, but the posting are new, so perhaps more information will come out […]

Continue reading → [DISPLAY_ACURAX_ICONS]

SS7 flaws enable listening to cell phone calls and reading texts

SC Magazine is reporting that a flaw signaling System 7, the telephone industry standard for setting up, managing and tearing down phone calls allows anyone to listen in on cell phone calls, read texts and locate a user. Two separate researchers have identified the flaw and are going to demonstrate it at a hackers conference […]

Continue reading → [DISPLAY_ACURAX_ICONS]