David A. Wheeler's Personal Home Page edit / delete

Includes several well-written, comprehensive postmortems on noteworthy security bugs (e.g. Heartbleed) -- probably of interest to security students.

to bugs security software ssl ... on 05 March 2015

Update on jQuery.com Compromises | Official jQuery Blog edit / delete

"Today at 11:15AM EDT, the jQuery Infrastructure team received widespread reports and confirmed a compromise of jquery.com." Using upstream's URLs for your Javascript libraries is only a good idea if you trust that site to never, ever be compromised or MITMd... (and even then I don't think it's a good idea.)

to javascript jquery security ... on 18 January 2015

C3TV - Cyber Necromancy edit / delete

The 31C3 presentation on reverse-engineering Metal Gear Online. You need to watch the video for this one.

to ag0907 ccc games mgo networking p2p reverse-engineering security ... on 18 January 2015

C3TV - Crypto Tales from the Trenches edit / delete

A group of journalists talk about how cryptography is useful to them -- and why it's a royal pain to use for the people they talk to. It's very encouraging to hear about the tools they use.

to ccc cryptography gpg journalism security tor whistleblowing ... on 18 January 2015

C3TV - Hacking Ethics in Education edit / delete

"At the University of Amsterdam, we have started an ethical committee for the System and Network Engineering Master." Interesting to me because I run the ethics committee for the department I'm in at work (and we're about to pick up a load of security-related student projects). I suspect a follow-up presentation next year might be more interesting, though, since it sounds like they didn't have any ethics framework in place before (?! -- how on earth do they do funded projects?). Comprehensible in audio only.

to academia ccc ethics security teaching ... on 18 January 2015

Why King George III Can Encrypt edit / delete

Coming up with better metaphors for how PGP signing and encryption works, and then *actually evaluating how effective they are with users*. The short answer: key/lock, seal/imprint. And tell a story about them.

to cryptography encryption gpg metaphors papers pgp security teaching ... on 18 January 2015

[SaveMGO] Tactical Revival Action edit / delete

Reverse-engineering the server for Metal Gear Online 1/2 -- there was an excellent presentation about this at 31C3 that explained how they did it. It's a peer-to-peer game, so the server actually isn't too complicated. AG0907 students will probably find it interesting to see what a real-world matchmaking protocol looks like.

to ag0907 games mgo networking p2p reverse-engineering security ... on 18 January 2015

KeySweeper edit / delete

"KeySweeper is a stealthy Arduino-based device, camouflaged as a functioning USB wall charger, that wirelessly and passively sniffs, decrypts, logs and reports back (over GSM) all keystrokes from any Microsoft wireless keyboard in the vicinity." So that's three reasons why I won't be buying a Microsoft wireless keyboard, then.

to arduino keyboard keylogger microcontroller security wireless ... on 18 January 2015

0xd6.org edit / delete

Marcus R. Brown's site on PS2 homebrew, now defunct, but with some useful information: how to add a serial port, how to patch the Linux abstraction layer so you can use the whole of a memory card, and the details of the "Independence Exploit" (using a buffer overflow in the PS1 emulator) that used to be used for homebrew. Reading between the lines here you can see how he came up with the exploit too...

to homebrew linux playstation ps2 security ... on 18 January 2015

Vulnerability: Infiltrating a network via Powerline (HomePlugAV) adapters - www.bentasker.co.uk edit / delete

Attacking HomePlugAV devices (not all of them, but a large subset). It's a key distribution problem.

to crypto homeplugav networking security ... on 18 January 2015

Browser bookmarks: tasty+ | tasty= Log in | Export | Atom

Tags related to security

- security
 
1 + academia
1 + access-control
1 + acme
1 + ag0700
1 + ag0803
2 + ag0907
6 + amusements
2 + api
1 + architecture
1 + arduino
3 + arm
1 + authentication
1 + autoconf
1 + avr
1 + backdoor
1 + bell-labs
1 + bitcoin
1 + blockchain
1 + bounds-checking
1 + bounty
1 + browser
2 + buffer
2 + buffer-overflow
2 + bug
2 + bugs
1 + build-systems
2 + c
2 + c++
4 + ca
1 + camera
1 + capability
1 + capsicum
4 + ccc
4 + certificate
1 + certificates
1 + cesrg
1 + checking
1 + chromium
1 + chroot
1 + clang
1 + cloud
1 + code
3 + compiler
1 + conference
2 + container
1 + coop
1 + coverage
1 + coverage-directed
1 + coverity
2 + cpu
1 + crime
10 + crypto
12 + cryptography
1 + cs
1 + cypherpunks
1 + debian
1 + debugging
1 + dect
1 + design
1 + dh
2 + djb
1 + ebooks
1 + ecc
1 + economics
1 + el0805
1 + elective
3 + electronics
3 + encryption
2 + ers
1 + ethereum
1 + ethical-hacking
1 + ethics
3 + exploit
1 + firefox
1 + folk-song
4 + formal-methods
1 + freedom
3 + fuzzing
2 + gameboy
5 + games
1 + gcc
1 + git
1 + goto
2 + gpg
1 + gsm
2 + hardening
5 + history
1 + homebrew
1 + homeplugav
1 + http
1 + https
1 + intel
1 + ip
1 + ipsec
1 + javascript
1 + journalism
1 + jquery
1 + kerberos
3 + kernel
1 + keyboard
1 + keylogger
1 + langsec
2 + language-design
1 + letsencrypt
1 + library
1 + licensing
12 + linux
1 + livecd
1 + lts
1 + luks
1 + lvm
1 + mac
1 + memory-safety
1 + metaphors
2 + mgo
1 + microcode
4 + microcontroller
1 + mmc
1 + mod-ers
1 + monitoring
3 + nacl
5 + network
6 + networking
1 + noise
1 + notary
1 + ocaml
1 + openssh
2 + openssl
1 + org
2 + os
2 + overflow
2 + p2p
1 + packet
1 + pam
2 + papers
1 + parser
1 + password
1 + patterns
1 + pgp
2 + philosophy
2 + phone
1 + phreaking
1 + pki
1 + playstation
1 + podcasts
2 + politics
1 + porting
1 + prime
2 + privacy
1 + privilege-separation
4 + programming
1 + proof
1 + ps2
2 + python
1 + radio
1 + ramensky
1 + random
1 + research
3 + retrocomputing
1 + retrotech
6 + reverse-engineering
1 + risc
1 + rop
1 + safe
2 + safety
4 + sandbox
1 + scanner
1 + scm
1 + scotland
1 + sd
1 + search
2 + seccomp
1 + shuffle
1 + sni
1 + snowden
14 + software
6 + software-engineering
3 + ssh
12 + ssl
4 + static-analysis
1 + stoll
1 + strategy
1 + support
1 + syscall
1 + systems
1 + tandy
1 + tcp
1 + tea
6 + teaching
1 + telecom
5 + testing
14 + tls
2 + tor
1 + tunnel
4 + unix
1 + usability
1 + usable-security
2 + usb
1 + validation
1 + varan
3 + verification
1 + video
1 + vlc
1 + vpn
1 + vulnerabilities
1 + vulnerability
3 + web
1 + webcam
1 + whistleblowing
2 + wireless
1 + wpa
1 + writing
1 + x86
1 + xbox