Security

Why the Security of USB Is Fundamentally Broken | Threat Level | WIRED

Computer users pass around USB sticks like silicon business cards. Why the Security of USB Is Fundamentally Broken http://www.wired.com/2014/07/usb-security/ article tells that we typically depend on antivirus scans and the occasional reformatting to keep our thumbdrives from becoming the carrier for the next digital epidemic. But the security problems with USB devices run deeper than

Anniversary of the NSA revelations

This week marks the year of Edward Snowden NSA revelations began. I have covered news on NSA relevations on my blog pretty much (Security trends 2013 and Security trends 2014). Register magazine article NSA: Inside the FIVE-EYED VAMPIRE SQUID of the INTERNET is a good wrap-up of what has been revealed over the years and

Creating Secure Software for Linux

Are you writing software that needs to be secure? Quite probably. Security critical programs include application programs used as viewers of remote data, web applications (including CGI scripts), network servers, and setuid/setgid programs.  Secure Programming for Linux and Unix HOWTO — Creating Secure Software on-line book provides a set of design and implementation guidelines for

The NSA Archive

The suspicions the National Security Agency has gone far beyond its mandate of gathering information for counter-terrorism and foreign intelligence purposes were confirmed when, on June 5, 2013, The Guardian released the first in a series of documents provided by Edward Snowden detailing the NSA’s unlawful spying activities. The American Civil Liberties Union (ACLU) has

Home Routers a Big Consumer Cyberthreat?

Home routers and firewalls are supposed to make users easy and safely connect many devices to their Internet connection. Those devices were advertised to make your Internet safer. In many cases they helped, but more and more often they itself be a real security problem. Strange but saddly true. Home Routers Pose Biggest Consumer Cyberthreat