Posts Tagged ‘security’

The Secret Life of Passwords – NYTimes.com

March 8, 2015

Secret life of passwords http://www.nytimes.com/2014/11/19/magazine/the-secret-life-of-passwords.html Our habit to use one secret to encode another & how this was helpful in the aftermath of 911

Privacy in Pharmacogenetics: An End-to-End Case Study of Personalized Warfarin Dosing | USENIX

February 20, 2015

Privacy in Pharmacogenetics…Personalized Warfarin Dosing
https://www.usenix.org/conference/usenixsecurity14/technical-sessions/presentation/fredrikson_matthew Model-inversion attack; differential privacy doesn’t help

Authors:
Matthew Fredrikson, Eric Lantz, and Somesh Jha, University of Wisconsin—Madison; Simon Lin, Marshfield Clinic Research Foundation; David Page and Thomas Ristenpart, University of Wisconsin—Madison

Awarded Best Paper!

How My Mom Got Hacked – NYTimes.com

January 10, 2015

How My Mom Got Hacked http://www.nytimes.com/2015/01/04/opinion/sunday/how-my-mom-got-hacked.html The Cryptowall #crime business, complete w/ customer support & #Bitcoin payment suggestions

Compiling a list of Truecrypt alternatives – Ars Technica OpenForum

November 16, 2014

A list of #Truecrypt alternatives http://arstechnica.com/civis/viewtopic.php?t=1245367 Shockingly, key program defunct after 10yrs. Now onto #FileVault , BitLocker & #PGP

Google – Recent Activity – Account Settings

September 21, 2014

https://security.google.com/settings/security/activity
Useful Google/Gmail page with lots of relevant security history

The NSA and Snowden: Securing the All-Seeing Eye | May 2014 | Communications of the ACM

June 2, 2014

The #NSA & #Snowden: Argues 2-factor authentication & 2-person authorization would’ve stopped theft of 1.7M documents
http://cacm.acm.org/magazines/2014/5/174340-the-nsa-and-snowden/fulltext

Sign in, sign out, and change your password – Gmail Help

January 6, 2014

Password change on mobile

https://support.google.com/mail/answer/3114694?hl=en
+
http://www.google.com/settings/security

LastPass vs. iCloud Keychain | Mac.AppStorm

January 6, 2014

#LastPass vs. #iCloud Keychain: fairly negative on $APPL’s approach, which is too safari-centric http://enva.to/K7lsQf via @macappstorm http://mac.appstorm.net/reviews/synchronization/lastpass-vs-icloud-keychain

A Call to Cyber Arms

November 19, 2013

http://www.sciencemag.org/content/339/6123/1026

A Call to Cyber Arms: Highlights the effectiveness of #stuxnet & the potential of future cyberweapons
http://www.sciencemag.org/content/339/6123/1026 #security

Interesting discussion of various bits of computer security in relation to the United States and China. There is mention that by far the most successful weapon developed thus far is the Stuxnet virus, which has not been publicly claimed by the United States or Israel but is suggested to have originated with them. There is also mention of a Snowden-like character from China who gave an interview to a US publication in relation to the extent of Chinese hacking.

N.S.A. Foils Much Internet Encryption – NYTimes.com

September 7, 2013

#NSA Foils Much Internet Encryption, hurting credibility of
private-company solutions v opensource http://nyti.ms/1aaj0QI MT @BrianBrownNet

http://www.nytimes.com/2013/09/06/us/nsa-foils-much-internet-encryption.html