Monthly Archives: April 2014

Somebody Kill Flash, Already! Put It Out Of Its Misery!

Two new Flash zero-days. Currently being used in watering hole attacks… probably against Syrian dissidents complaining about their government. Notably, Kaspersky comments that “It’s likely that the attack was carefully planned and that professionals of a pretty high caliber were behind it. The use of professionally written 0-day exploits that were used to infect a […]

The “Un-Pickable” Bike Lock (and Lifehacking: Food, Music, etc)

Lifehacking: If you’re fat, it may be because you’ve fallen victim to foods that are engineered to make you eat more.[1] Solution: KILL ALL PROCESSED FOODS from your diet. (Organic raw food for the win!) Here’s how to generalize this principle… in a way that will let you discover some really neat (and sometimes totally […]

Anonymous Develops Illegal Ham Radio (and Lifehacking/Bach, Private Sector #badBIOS?)

Lifehacking tip: Bach. Specifically, Bach organ music. I swear, the stuff’s like toilet bowl cleaner for the mind. ’nuff said. Private sector using #badBIOS? Very strange story. http://www.reddit.com/r/privacy/comments/23ljti/private_investigators_hire_nsa_trained_hackers/ Looking to bypass the limitations of commercial communications, a group of hackers associated with Anonymous has put together some (currently not very usable) software to do encrypted […]

Norweigans Spending Big Money On Cryptanalytic Supercomputer

Whatever the big but secret cryptanalytic breakthroughs floating around the Western signals intellignece community, they’re useful enough that the Norwegian signals intelligence agency is buying their own supercomputer to better exploit them. The Norweigans have been relying on the NSA’s capability for a while but they’re now collecting so much encrypted data they need their […]

The Insane Vulnerability of Hospital Equipment… Continues

Not a new theme here, at all, but a just-completed two-year study into the security of hospital equipment produced results that are truly terrifying for anyone entrusting themselves to the care of such an institution. Bottom line: IT’S. ALL. VULNERABLE. Everything except the anaesthesia machines, and those presumably only due to a procedural fluke that […]

Most Data Breaches Rely On… Other Data Breaches (and Snowden/Glasgow)

Snowden inaugurated as University of Glasgow rector. First the honorary doctorate from the University of Rostock, now this. Who said you needed a high school diploma to make it in higher education…! http://freesnowden.is/2014/04/23/edward-snowdens-statement-on-his-inauguration-as-rector-at-the-university-of-glasgow/index.html Results from the 2014 Verizon Data Breach Investigations Report show that 2 in 3 online breaches made use of stolen or misused […]

When Your Heartbleed Fix Isn’t

Overconfidence… one of the biggest problems in defensive security. Which is not to say you have to assume the adversary is omnipotent. But, as this article shows, it’s always a good idea to take the same approach to protecting yourself as the NSA takes to watching you masturbate. Specifically, think belt and suspenders. RSA believed […]