Cryptography’s Human Problem [Video]

17usererror

“The primary weakness in any modern security mechanism tends to be the modern consumers utilizing it.” If you’ve got security issues, there’s a nonzero chance it’s your fault. Or, if you’re especially vigilant, the fault of another person in the chain of people who control account security. In this new video from our friends at […]

Ur car cd b stolen by txt

A security consultant has shown it’s possible to steal some cars simply by sending a specially crafted series of text messages. Don Bailey of iSEC Partners was speaking at the Black Hat security conference in Las Vegas. It’s an annual event designed to inform security professionals about the latest threats, and has become known for […]

Internet IDs: Yea or Nay?

pointcounter

Internet IDs are a hot topic recently, particularly in light of LulzSec’s aggressive (but abbreviated) campaign against , like, everyone ever. Proponents argue that a system of “trusted credentials”–as they’re ambiguously called now because the technology is still mostly in development–would allow for safer, more secure online transactions. The opposition says that these efforts are […]

Virtual Warfare to Get Physical Response

A cyberattack on the United States could result in a physical military retaliation under a revised Pentagon strategy. The move probably won’t mean modern-day David Lightmans should expect to see tanks outside their doors, but it could mean some decisive responses: in the words of an unnamed official speaking to the Wall Street Journal, “If […]