Secret life of passwords http://www.nytimes.com/2014/11/19/magazine/the-secret-life-of-passwords.html Our habit to use one secret to encode another & how this was helpful in the aftermath of 911
Posts Tagged ‘security’
The Secret Life of Passwords – NYTimes.com
March 8, 2015Privacy in Pharmacogenetics: An End-to-End Case Study of Personalized Warfarin Dosing | USENIX
February 20, 2015Privacy in Pharmacogenetics…Personalized Warfarin Dosing
https://www.usenix.org/conference/usenixsecurity14/technical-sessions/presentation/fredrikson_matthew Model-inversion attack; differential privacy doesn’t help
Authors:
Matthew Fredrikson, Eric Lantz, and Somesh Jha, University of Wisconsin—Madison; Simon Lin, Marshfield Clinic Research Foundation; David Page and Thomas Ristenpart, University of Wisconsin—Madison
Awarded Best Paper!
How My Mom Got Hacked – NYTimes.com
January 10, 2015How My Mom Got Hacked http://www.nytimes.com/2015/01/04/opinion/sunday/how-my-mom-got-hacked.html The Cryptowall #crime business, complete w/ customer support & #Bitcoin payment suggestions
Compiling a list of Truecrypt alternatives – Ars Technica OpenForum
November 16, 2014A list of #Truecrypt alternatives http://arstechnica.com/civis/viewtopic.php?t=1245367 Shockingly, key program defunct after 10yrs. Now onto #FileVault , BitLocker & #PGP
Google – Recent Activity – Account Settings
September 21, 2014https://security.google.com/settings/security/activity
Useful Google/Gmail page with lots of relevant security history
The NSA and Snowden: Securing the All-Seeing Eye | May 2014 | Communications of the ACM
June 2, 2014The #NSA & #Snowden: Argues 2-factor authentication & 2-person authorization would’ve stopped theft of 1.7M documents
http://cacm.acm.org/magazines/2014/5/174340-the-nsa-and-snowden/fulltext
Sign in, sign out, and change your password – Gmail Help
January 6, 2014Password change on mobile
https://support.google.com/mail/answer/3114694?hl=en
+
http://www.google.com/settings/security
LastPass vs. iCloud Keychain | Mac.AppStorm
January 6, 2014#LastPass vs. #iCloud Keychain: fairly negative on $APPL’s approach, which is too safari-centric http://enva.to/K7lsQf via @macappstorm http://mac.appstorm.net/reviews/synchronization/lastpass-vs-icloud-keychain
A Call to Cyber Arms
November 19, 2013http://www.sciencemag.org/content/339/6123/1026
A Call to Cyber Arms: Highlights the effectiveness of #stuxnet & the potential of future cyberweapons
http://www.sciencemag.org/content/339/6123/1026 #security
Interesting discussion of various bits of computer security in relation to the United States and China. There is mention that by far the most successful weapon developed thus far is the Stuxnet virus, which has not been publicly claimed by the United States or Israel but is suggested to have originated with them. There is also mention of a Snowden-like character from China who gave an interview to a US publication in relation to the extent of Chinese hacking.
N.S.A. Foils Much Internet Encryption – NYTimes.com
September 7, 2013#NSA Foils Much Internet Encryption, hurting credibility of
private-company solutions v opensource http://nyti.ms/1aaj0QI MT @BrianBrownNet
http://www.nytimes.com/2013/09/06/us/nsa-foils-much-internet-encryption.html