Check Your Halloween Candy For Malicious Payloads | Hackaday

We are living in the future.

“[MG] has produced a large quantity of these small devices, packaging them in anti-static wrappers. The wrappers contain a note instructing children to insert them into their parent’s work computers to access “game codes”, and to share them with their friends while hiding them from adults.”

Source: Check Your Halloween Candy For Malicious Payloads | Hackaday

Database Breaches Still Plague the Internet, But There’s Hope Ahead | WIRED

While companies commonly use these databases to store tempting troves of customer and financial data, they often do so with outdated and weak default security configurations. And while any type of database can be left open or unprotected, a string of breaches over the last few years have all centered around one type in particular: open-source “NoSQL” databases, particularly those using the popular MongoDB database program.

Source: Database Breaches Still Plague the Internet, But There’s Hope Ahead | WIRED

UVA Computer Science Professor Applies Genetic Engineering Principles to Cybersecurity | UVA Today

Double Helix is based on concept called structured diversity. It creates a number of functionally equivalent versions of a mission-critical system, but adjusts the binary code of some of these clones – the equivalent to changing their four-letter DNA code – so that properties needed for successful attacks are missing. When a cyberattack occurs, the behavior of the unprotected clones diverges from the protected ones. At this point, Double Helix will take action to recover from the attack by modifying the affected clones.

Source: UVA Computer Science Professor Applies Genetic Engineering Principles to Cybersecurity | UVA Today

Meet PocketBlock, the crypto engineering game for kids of all ages

When you’re a cryptographer, telling your preteen kids what you do isn’t easy.

“While suitable for kids eight and older, PocketBlock is by no means restricted to kids. Troutman said it’s also suitable for professional developers who want to deepen their understanding of the way cryptographic algorithms work, given that they’re often implementing them.”

Source: Meet PocketBlock, the crypto engineering game for kids of all ages

What’s driving Silicon Valley to become ‘radicalized’ – The Washington Post

“We have to keep as little [information] as possible so that even if the government or some other entity wanted access to it, we’d be able to say that we don’t have it,” said Gadea, founder and chief executive of Envoy. The 30-person company enables businesses to register visitors using iPads instead of handwritten visitor logs. The technology tracks who works at a firm, who visits the firm, and their contact information.

In Silicon Valley, there’s a new emphasis on putting up barriers to governmentrequests for data. The Apple-FBI case and its aftermath have tech firms racing to employ a variety of tools that would place customer information beyond the reach of a government-ordered search.

Source: What’s driving Silicon Valley to become ‘radicalized’ – The Washington Post

Binghamton University – Magazine: Your brain is your key

A new technology developed at Binghamton University can identify you simply by measuring your brain’s response to different stimuli. The technology has garnered attention from media outlets around the world, including National Geographic, which spent a day interviewing and filming on campus. It’s called brainprint, and it could revolutionize the security industry.

Source: Binghamton University – Magazine: Your brain is your key

MIT’s Teaching AI How to Help Stop Cyberattacks | WIRED

A system called AI2, developed at MIT’s Computer Science and Artificial Intelligence Laboratory, reviews data from tens of millions of log lines each day and pinpoints anything suspicious. A human takes it from there, checking for signs of a breach. The one-two punch identifies 86 percent of attacks while sparing analysts the tedium of chasing bogus leads.

Source: MIT’s Teaching AI How to Help Stop Cyberattacks | WIRED

Systems Admins: We Need To Talk. – Offensive Tech

I came across this excellent article while browsing Hacker News.  Putting it here so I can find it later if/when I need it.

Sysadmins, we need to talk. I know the struggle – I’ve been a systems administrator for 15 years. You have too few resources, too small a budget, and no respect. I get it. I do. Your users click links they shouldn’t, download things without forethought, and go to websites that you would firebomb from afar if you had your way. I understand that ransomware is a fast-changing, ever evolving beast that is mitigating your defenses as quickly as you’re mitigating its attacks. Its impossible to stop every attack. I get that. However, I’d like to pose question to you, and I ask this with as little snark as I can muster: Is that really an excuse? Can we really throw up our hands because “its hard,” and not even attempt good, basic security measures?

Admins, lend me your ears. With good, basic, and built-in tools, you can defend against ransomware. With just a few hours of configuration (at most!), you can stop this madness. Let’s talk turkey.

Source: Systems Admins: We Need To Talk. – Offensive Tech

A Typical Day in a Blockchain-Enabled World Circa 2030 | Blockchain Futures Lab

Although there is no question that governments and central authorities will continue to exist and play a meaningful role in the world’s future, much of the current work performed by these governments and other authorities is also needlessly repetitive and mundane.

Just as robots have helped the world reduce menial physical labor, so cryptocurrency technology now gives us the tools to automate the menial labor of bureaucracy. Optimistically, the entirety of humanity will benefit as a result.

Source: A Typical Day in a Blockchain-Enabled World Circa 2030 | Blockchain Futures Lab

Apple and the FBI think iPhones are safes. A philosopher explains what they really are.

Our electronic devices—or at least many of the processes that occur within them—are literally parts of our minds. And our consideration of Apple’s and the FBI’s arguments ought to flow from that fact.

This may sound ridiculous. But in an important co-authored essay and then in a book, the philosopher Andy Clark argued for something called the extended mind hypothesis. The basic idea was that we have no reason to treat the brain alone as the only place where mental processes can occur.

Source: Apple and the FBI think iPhones are safes. A philosopher explains what they really are.