background preloader

Schneier on Security

Schneier on Security
Related:  GeekTips

Raymond Wang: How germs travel on planes -- and how we can stop them Close Help with subtitles Desktop / laptop users: please make sure you have the most updated versions of your browser and Flash player, and that Flash is enabled when you visit TED.com. iOS users: to access subtitles, start playing the video, then tap the speech bubble icon that appears in the bottom row of video controls. Android users: although Android devices do not support subtitles, you can download the TED app from the Google Play store. Whose Line Online Rebecca Herold | SIMBUS360 Software Solutions Rebecca Herold, CISM, CISSP, CISA, CIPP, FLMI Rebecca is an information privacy, security and compliance consultant, author and instructor who has provided assistance, advice, services, tools and products to organizations in a wide range of industries during the past two decades. Rebecca is a widely recognized and respected information security, privacy and compliance expert. Some of her awards and recognitions include the following: Rebecca’s Most Recent Book Rebecca was one of the first practitioners to be responsible for both information security and privacy within a large organization, in 1994 in a multi-national insurance and financial organization. In 2008 Rebecca helped the European ENISA to create their well received “Obtaining support and funding from senior management,” which used much of her “Managing and Information Security and Privacy Awareness and Training Program” information. Rebecca Herold, CISM, CISSP, CISA, CIPP, FLMI Rebecca’s Most Recent Book

ONLINE | Nachrichten, Hintergründe und Debatten Undocumented iOS Features left Hidden Backdoors Open in 600 Million Apple Devices A well known iPhone hacker and forensic scientist has unearthed a range of undocumented and hidden functions in Apple iOS mobile operating system that make it possible for a hacker to completely bypass the backup encryption on iOS devices and can steal large amounts of users’ personal data without entering passwords or personal identification numbers. Data forensics expert named Jonathan Zdziarski has posted the slides (PDF) titled “Identifying Backdoors, Attack Points, and Surveillance Mechanisms in iOS Devices” showing his findings, from his talk at the Hackers On Planet Earth (HOPE X) conference held in New York on Friday. Jonathan Zdziarski, better identified as the hacker "NerveGas" in the iPhone development community, worked as dev-team member on many of the early iOS jailbreaks and is also the author of five iOS-related O'Reilly books including "Hacking and Securing iOS Applications." EVERY SET OF INFORMATION OF iOS USERS IS AT RISK

Rebecca Herold & Associates, LLC sunny vegan Meet KeySweeper, the $10 USB charger that steals MS keyboard strokes It sounds like the stuff of a James Bond flick or something described in documents leaked by former NSA subcontractor Edward Snowden. In fact, the highly stealthy keystroke logger can be built by someone with only slightly above-average technical skills for as little as $10. Called KeySweeper, it's a device disguised as a functioning USB wall charger that sniffs, decrypts, logs, and transmits all input typed into a Microsoft wireless keyboard. KeySweeper is the brainchild of Samy Kamkar, a hacker who has a track record of devising clever exploits that are off the beaten path. The namesake of the Samy worm that inadvertently knocked MySpace out of commission in 2005, Kamkar has concocted drones that seek out and hack other drones and devised exploits that use Google Streetview and Google Wi-Fi location data to stalk targets. KeySweeper follows the same path. The guts of the hardware is an Arduino or Teensy microcontroller and an nRF24L01+ radio frequency chip.

Planet Freitagsrunde Stealthy malware targeting air-gapped PCs leaves no trace of infection Researchers have discovered highly stealthy malware that can infect computers not connected to the Internet and leaves no evidence on the computers it compromises. USB Thief gets its name because it spreads on USB thumb and hard drives and steals huge volumes of data once it has taken hold. Unlike previously discovered USB-born malware, it uses a series of novel techniques to bind itself to its host drive to ensure it can't easily be copied and analyzed. It uses a multi-staged encryption scheme that derives its key from the device ID of the USB drive. "In addition to the interesting concept of self-protecting multi-stage malware, the (relatively simple) data-stealing payload is very powerful, especially since it does not leave any evidence on the affected computer," Tomáš Gardoň, a malware analyst with antivirus provider Eset, wrote in a blog post published Wednesday. Bridging the (air) gap Preventing copycat attacks Gardoň wrote: This post originated on Ars Technica

quora About amnesia, noun: forgetfulness; loss of long-term memory. incognito, adjective & adverb: (of a person) having one's true identity concealed. Tails is a live system that aims to preserve your privacy and anonymity. It helps you to use the Internet anonymously and circumvent censorship almost anywhere you go and on any computer but leaving no trace unless you ask it to explicitly. It is a complete operating system designed to be used from a DVD, USB stick, or SD card independently of the computer's original operating system. Tails comes with several built-in applications pre-configured with security in mind: web browser, instant messaging client, email client, office suite, image and sound editor, etc. Tor Tails relies on the Tor anonymity network to protect your privacy online: all software is configured to connect to the Internet through Torif an application tries to connect to the Internet directly, the connection is automatically blocked for security. Using Tor you can: See the contact page.

Google Search Operators The following table lists the search operators that work with each Google search service. Click on an operator to jump to its description — or, to read about all of the operators, simply scroll down and read all of this page. The following is an alphabetical list of the search operators. This list includes operators that are not officially supported by Google and not listed in Google’s online help. Each entry typically includes the syntax, the capabilities, and an example. Some of the search operators won’t work as intended if you put a space between the colon (:) and the subsequent query word. allinanchor: If you start your query with allinanchor:, Google restricts results to pages containing all query terms you specify in the anchor text on links to the page. Anchor text is the text on a page that is linked to another web page or a different place on the current page. allintext: allintitle: allinurl: In URLs, words are often run together. author: cache: define: ext: filetype: group: id: inanchor:

Related: