Securology

(noun) securology. Latin: se cura logia
Literally translated: the study of being without care or worry

Friday, December 23, 2011

DIY Lock Pick Set

›
Here's another very interesting post on lock-picking, like making a padlock shim out of soda can : How to make your own lock-picking to...
2 comments:
Tuesday, December 20, 2011

How to Shim Open a Padlock On the Cheap

›
This is a quick, cheap, and simple way to crack open a padlock with a homemade shim from a soda can . Not a new idea, but a well-described ...
Wednesday, March 23, 2011

RSA SecurID Breach - Seed Record Threats

›
The following is a threat model that assumes the RSA SecurID seed records have been stolen by a sophisticated adversary , which is probably ...
4 comments:
Tuesday, March 22, 2011

More RSA SecurID Reactions

›
RSA Released a new Customer FAQ regarding the RSA SecurID breach. Let's break it down ... Customer FAQ Incident Overview 1. What h...
1 comment:
Friday, March 18, 2011

RSA SecurID Breach - Initial Reactions

›
RSA, the security division of EMC, was breached by a sophisticated adversary who stole something of value pertaining to RSA SecurID two fac...
1 comment:
Friday, February 18, 2011

Seven Types of Hackers

›
This could also be titled "Taxonomies are Difficult". ... Roger Grimes at InfoWorld has a Seven Types of Hackers article. Ta...
Sunday, January 30, 2011

Visualize Irony

›
What's the point of the heavy-duty chain and lock if one of the chain's links is just a zip-tie?
Thursday, July 1, 2010

Schneier vs PCI

›
Bruce Schneier just echoed what I wrote back in December 2008 that the encryption key management aspects of PCI 1.2 and earlier are flat-ou...
Friday, May 21, 2010

Verisign Turns Yellow

›
On the heels of turning PGP corp Yellow , now Verisign is turning Yellow, too . Symantec is acquiring Verisign, too. These overpriced ...
Monday, March 29, 2010

SSL & Big Government. Where's Phil Zimmerman?

›
What an interesting year 2010 is already turning out to be in technology, politics, and life as we know it. More censorship battles are goi...
2 comments:
Thursday, February 25, 2010

Earth Shattering Attacks on Disk Encryption

›
Trusted Platform Modules (TPMs) are were the last hope of truly secure distributed computing endpoints. The idea behind TPMs is that they...
4 comments:
Wednesday, December 2, 2009

The Reality of Evil Maids

›
There have been many attacks on whole disk encryption recently: Cold Boot attacks in which keys hang around in memory a lot longer than m...
1 comment:
Wednesday, November 4, 2009

Selecting a Pistol Safe

›
NOTE: In the name of "all things security", because this blog is intended to be about physical security, too, not just information...
30 comments:
‹
›
Home
View web version
Powered by Blogger.