SHA-1 Collision Found
Blog > Subscribe to comments on this entry Photo of Bruce Schneier by Per Ervland. Schneier on Security is a...
Read MoreBlog > Subscribe to comments on this entry Photo of Bruce Schneier by Per Ervland. Schneier on Security is a...
Read MoreThese days, it's rare that we learn something new from the Snowden documents. But Ben Buchanan found something interesting. The NSA penetrates...
Read MoreThis is interesting: The My Friend Cayla doll, which is manufactured by the US company Genesis Toys and distributed in Europe by Guildford-based...
Read MoreBlog > Friday Squid Blogging: The Strawberry Squid's Lopsided Eyes The evolutionary reasons why the strawberry squid has two different eyes. Additional articles. Original paper. As...
Read MoreVerizon's Data Brief Digest 2017 describes an attack against an unnamed university by attackers who hacked a variety of IoT devices and...
Read MoreDuqu 2.0 is a really impressive piece of malware, related to Stuxnet and probably written by the NSA. One of its security...
Read MoreInteresting article in Science discussing field research on how people are radicalized to become terrorists. The potential for research that can overcome existing...
Read MorePew Research just published their latest research data on Americans and their views on cybersecurity: This survey finds that a majority of Americans...
Read MoreNystagmusE • February 20, 2017 10:42 AM Retalitory hacking ("hacking back") is not a logical nor safe principle nor response. It should be avoided at all times. Also, it...
Read More