Tuesday, March 19, 2019
Bruce Schneier

Crypto-Gram February 15, 2019

In this issue: Evaluating the GCHQ Exceptional Access Proposal Public-Interest Tech at the RSA Conference Blockchain and Trust from the February 15, 2019 Crypto-Gram Newsletter by Bruce Schneier read by Dan Henage
Bruce Schneier

Crypto-Gram January 15, 2019

In this issue: New Attack Against Electrum Bitcoin Wallets Machine Learning to Detect Software Vulnerabilities Using a Fake Hand to Defeat Hand-Vein Biometrics from the January 15, 2019 Crypto-Gram Newsletter by Bruce Schneier read by Dan Henage
Bruce Schneier

Crypto-Gram 15 December 2018

In this issue: Information Attacks against Democracies How Surveillance Inhibits Freedom of Expression Propaganda and the Weakening of Trust in Government from the December 15, 2018 Crypto-Gram Newsletter by Bruce Schneier read by Dan Henage
Bruce Schneier

Crypto-Gram 15 November 2018

In this issue: Cell Phone Security and Heads of State New IoT Security Regulations Oracle and "Responsible Disclosure" from the November 15, 2018 Crypto-Gram Newsletter by Bruce Schneier read by Dan Henage
Bruce Schneier

Crypto-Gram 15 October 2018

In this issue: Security in a World of Physically Capable Computers from the October 15, 2018 Crypto-Gram Newsletter by Bruce Schneier read by Dan Henage
Bruce Schneier

Crypto-Gram 15 September 2018

In this issue: Five-Eyes Intelligence Services Choose Surveillance Over Security Security Risks of Government Hacking Quantum Computing and Cryptography from the September 15, 2018 Crypto-Gram Newsletter by Bruce Schneier read by Dan Henage
Bruce Schneier

Crypto-Gram 15 August 2018

In this issue: New Book Announcement: Click Here to Kill Everybody Reasonably Clever Extortion E-mail Based on Password Theft Defeating the iPhone Restricted Mode 1Password's Travel Mode SpiderOak's Warrant Canary Died Don't Fear the TSA Cutting Airport Security. Be...
Bruce Schneier

Crypto-Gram 15 July 2018

In this issue: Ridiculously Insecure Smart Lock Are Free Societies at a Disadvantage in National Cybersecurity Perverse Vulnerability from Interaction between 2-Factor Authentication and iOS AutoFill The Effects of Iran's Telegram Ban Bypassing Passcodes in iOS Manipulative Social Media...
Bruce Schneier

Crypto-Gram 15 June 2018

In this issue: Router Vulnerability and the VPNFilter Botnet E-Mail Vulnerabilities and Disclosure Russian Censorship of Telegram Another Spectre-Like CPU Vulnerability An Example of Deterrence in Cyberspace New Data Privacy Regulations from the June 15, 2018 Crypto-Gram Newsletter by...
Bruce Schneier

Crypto-Gram 15 May 2018

In this issue: Securing Elections Details on a New PGP Vulnerability Two NSA Algorithms Rejected by the ISO Ray Ozzie's Encryption Backdoor Supply-Chain Security from the May 15, 2018 Crypto-Gram Newsletter by Bruce Schneier read by Dan Henage
Bruce Schneier

Crypto-Gram 15 April 2018

In this issue: Facebook and Cambridge Analytica Israeli Security Company Attacks AMD by Publishing Zero-Day Exploits Obscure E-Mail Vulnerability The Digital Security Exchange Is Live from the April 15, 2018 Crypto-Gram Newsletter by Bruce Schneier read by Dan Henage
Bruce Schneier

Crypto-Gram 15 March 2018

In this issue: Artificial Intelligence and the Attack/Defense Balance Can Consumers' Online Data Be Protected? from the March 15, 2018 Crypto-Gram Newsletter by Bruce Schneier read by Dan Henage
SC Magazine

Norwegian aluminum producer Norsk Hydro hit by an unspecified cyberattack

Norwegian aluminum producer Norsk Hydro was hit by a cyber attack which began Monday evening and escalated into the night. The Norwegian National Security Authority (NSM) declined to comment on what type of attack it was but said the extent...
SC Magazine

Glitch exposes Sprint customer data to other users

A bug has allowed some Sprint customers to see the personal data of other customers from their online accounts. The information visible includes names, cell phone numbers as well as calls made by other users and, and a Tech Crunch report cited...

6 Ways Mature DevOps Teams Are Killing It in Security

New survey shows where "elite" DevOps organizations are better able to incorporate security into application security.
The Register

Ransomware drops the Lillehammer on Norsk Hydro: Aluminium giant forced into manual mode after systems scrambled

Norway the power and metals wrangler could have seen this one coming Norwegian power and metals giant Norsk Hydro is battling an extensive ransomware infection on its computers.…

Old Tech Spills Digital Dirt on Past Owners

Researcher buys old computers, flash drives, phones and hard drives and finds only two properly wiped devices out of 85 examined.