Cyber Brief: Cryptolog
https://nsarchive.gwu.edu/briefing-book/cyber-vault/2018-12-04/cyber-brief-cryptolog [nsarchive.gwu.edu]
2018-12-08 00:44
tags:
archive
crypto
history
opsec
security
Five years ago, the National Security Agency (NSA) released 136 issues of its internal Cryptolog periodical spanning 1974 through 1997. The collection offered a look into the some of the discussions being held within one of America’s most secretive intelligence agencies. Today the GWU-based National Security Archive is providing a complete index of all 1,504 items in the declassified collection, including but not limited to articles, interviews, and puzzles.
source: SOS
Advanced Protection Program
https://landing.google.com/advancedprotection/ [landing.google.com]
2017-11-01 14:45
tags:
auth
cloud
security
To provide the strongest defense against phishing, Advanced Protection goes beyond traditional 2-Step Verification. You will need to sign into your account with a password and a physical Security Key. Other authentication factors, like codes sent via SMS or the Google Authenticator app, will no longer work.
source: SOS
Zero-Day Vulnerabilities against Windows in the NSA Tools Released by the Shadow Brokers
https://www.schneier.com/blog/archives/2017/07/zero-day_vulner.html [www.schneier.com]
2017-07-29 03:39
tags:
development
exploit
policy
security
windows
So of the five serious zero-day vulnerabilities against Windows in the NSA’s pocket, four were never independently discovered.
I think this is an interesting data point in the debate about the risks of hoarding, etc.
source: SOS
Extending the Airplane Laptop Ban
https://www.schneier.com/blog/archives/2017/05/extending_the_a.html [www.schneier.com]
2017-05-25 06:17
tags:
flying
policy
Dividing security checks into haves and have-nots is bad social policy
Probably a dead on arrival policy, but nevertheless.
source: SOS
Stealing sensitive browser data with the W3C Ambient Light Sensor API
https://blog.lukaszolejnik.com/stealing-sensitive-browser-data-with-the-w3c-ambient-light-sensor-api/ [blog.lukaszolejnik.com]
2017-04-28 18:59
tags:
browser
security
sidechannel
web
Your privacy leaking feature of the day.
source: SOS
Encryption Workarounds
https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2938033 [papers.ssrn.com]
2017-03-22 21:54
tags:
crypto
essay
opsec
pdf
policy
security
It begins with a taxonomy of the different ways investigators might try to bypass encryption schemes. We classify six kinds of workarounds: find the key, guess the key, compel the key, exploit a flaw in the encryption software, access plaintext while the device is in use, and locate another plaintext copy.
source: SOS
Security and Privacy Guidelines for the Internet of Things
https://www.schneier.com/blog/archives/2017/02/security_and_pr.html [www.schneier.com]
2017-02-09 15:37
tags:
development
ioshit
links
security
They all largely say the same things: avoid known vulnerabilities, don’t have insecure defaults, make your systems patchable, and so on.
So basically, do all the things you’re not doing but know you should.
source: SOS
Cracking Android Pattern Lock in Five Attempts
http://www.lancaster.ac.uk/staff/wangz3/publications/ndss_17.pdf [www.lancaster.ac.uk]
2017-01-30 00:25
tags:
android
auth
opsec
paper
pdf
security
Pattern lock is widely used as a mechanism for authentication and authorization on Android devices. In this paper, we demonstrate a novel video-based attack to reconstruct Android lock patterns from video footage filmed using a mobile phone camera.
source: SOS