Securology

(noun) securology. Latin: se cura logia
Literally translated: the study of being without care or worry

Saturday, March 31, 2012

Stanford University Online Cryptography Course

›
Stanford University has a free online Cryptography Course . Looks very interesting for someone who wants to peel back the layers of the oni...
Thursday, March 29, 2012

Using VPNs to Bypass Content Restrictions

›
Some content providers, like Hulu , have restrictions on certain content to make it only available in specific countries. They implement t...
Thursday, March 22, 2012

In Memory: Bill Zeller

›
Having just caught up on the positive achievements of Alex Halderman, we have discovered that another promising young mind has been lost for...
Wednesday, March 21, 2012

Alex Halderman on Internet Voting

›
Computer Science Professor J. Alex Halderman is an upcoming academic star that we at Securology have been watching for awhile now , since ...
3 comments:
Sunday, March 4, 2012

Detecting Social Network Connectivity

›
This is a creative implementation that discovers several information flow theory violations. The end result is a website that is not part o...
Thursday, March 1, 2012

Brute Forcing Credit Card Numbers

›
PCI Regulations allow merchants to store the first 6 digits plus the last 4 digits of a customer's credit card number. Ever wonder jus...
Wednesday, February 29, 2012

Traveling Light in a Time of Digital Thievery

›
This sounds exciting, like intrigue for spy fiction : When Kenneth G. Lieberthal, a China expert at the Brookings Institution, travel...

DIY Drones

›
Do It Yourself Surveillance Drone Aircraft . Why? Because you still can. Adjust your one-liner: "if guns drones are outlawed, then...
Thursday, February 23, 2012

John Nash Crypto Letters

›
John Nash (inspiration for A Beautiful Mind ) wrote letters to the US Government in the 1950s which have recently been de classified and r...
Tuesday, February 7, 2012

Verisign Hacked!

›
Verisign was breached according to an SEC report (Reuters), yet they report almost no details and act like it's no big deal! An exce...
Wednesday, February 1, 2012

DNSCrypt

›
This is a very premature response to what I believe is the single best solution to dangers like SOPA, PIPA, and ACTA: DNSCrypt . To be fa...
2 comments:
Friday, December 23, 2011

DIY Lock Pick Set

›
Here's another very interesting post on lock-picking, like making a padlock shim out of soda can : How to make your own lock-picking to...
2 comments:
Tuesday, December 20, 2011

How to Shim Open a Padlock On the Cheap

›
This is a quick, cheap, and simple way to crack open a padlock with a homemade shim from a soda can . Not a new idea, but a well-described ...
Wednesday, March 23, 2011

RSA SecurID Breach - Seed Record Threats

›
The following is a threat model that assumes the RSA SecurID seed records have been stolen by a sophisticated adversary , which is probably ...
4 comments:
Tuesday, March 22, 2011

More RSA SecurID Reactions

›
RSA Released a new Customer FAQ regarding the RSA SecurID breach. Let's break it down ... Customer FAQ Incident Overview 1. What h...
1 comment:
Friday, March 18, 2011

RSA SecurID Breach - Initial Reactions

›
RSA, the security division of EMC, was breached by a sophisticated adversary who stole something of value pertaining to RSA SecurID two fac...
1 comment:
Friday, February 18, 2011

Seven Types of Hackers

›
This could also be titled "Taxonomies are Difficult". ... Roger Grimes at InfoWorld has a Seven Types of Hackers article. Ta...
Sunday, January 30, 2011

Visualize Irony

›
What's the point of the heavy-duty chain and lock if one of the chain's links is just a zip-tie?
Thursday, July 1, 2010

Schneier vs PCI

›
Bruce Schneier just echoed what I wrote back in December 2008 that the encryption key management aspects of PCI 1.2 and earlier are flat-ou...
‹
›
Home
View web version
Powered by Blogger.