Friday Squid Blogging: Squid Purses
Friday Squid Blogging: Squid Purses Squid-shaped purses for sale. As usual, you can also use this squid post to talk...
Friday Squid Blogging: Squid Purses Squid-shaped purses for sale. As usual, you can also use this squid post to talk...
My TED Talks I have spoken at several TED conferences over the years. I’m putting this here because I want...
Rare Interviews with Enigma Cryptanalyst Marian Rejewski The Polish Embassy has posted a series of short interview segments with Marian...
The UK Bans Default Passwords The UK is the first country to ban default passwords on IoT devices. On Monday,...
20 years ago, antivirus softwares were primarily focused on generic trojan viruses and malware while also boosting system performance. However,...
AI Voice Scam Scammers tricked a company into believing they were dealing with a BBC presenter. They faked her voice,...
HomeBlog WhatsApp in India Meta has threatened to pull WhatsApp out of India if the courts try to force it...
Ever felt like there’s a tiny, invisible threat lurking in your pocket? Well, guess what? You might be pretty close....
Whale Song Code During the Cold War, the US Navy tried to make a secret code out of whale song....
Multiple Brocade SANnav SAN Management SW flaws allow device compromise Pierluigi Paganini April 29, 2024 Multiple flaws in Brocade SANnav...
Friday Squid Blogging: Searching for the Colossal Squid A cruise ship is searching for the colossal squid. As usual, you...
Long Article on GM Spying on Its Cars’ Drivers Kashmir Hill has a really good article on how GM tricked...
The web has become so interwoven with everyday life that it is easy to forget what an extraordinary accomplishment and...
Law professor Dan Solove has a new article on privacy regulation. In his email to me, he writes: “I’ve been...
Microsoft and Security Incentives Former senior White House cyber policy director A. J. Grotto talks about the economic incentives for...