IOActive researcher Andrew Zonenberg said he has carried out previous hardware-based hacks against silicon chips that he believes could by used by the FBI to unlock the San Bernardino shooter’s iPhone 5c.
Browsing Category: Government
Security expert Dan Guido wrote that Apple has the technical capabilities to bypass or disable passcode protections on the San Bernardino shooter’s iPhone.
Apple chief executive Tim Cook opposes a court order mandating that Apple help the FBI crack an iPhone belonging to San Bernardino shooter Syed Farook.
Threatpost editor Mike Mimoso talks to HackerOne chief policy officer Katie Moussouris about the U.S. implementation of the Wassenaar Arrangement rules and where things stand close to seven months after the initial draft was pulled off the table for a rewrite.
Researchers from MalCrawler built a honeypot mimicking an energy management system at the heart of a power grid, exposing attackers’ behavior once they have access to critical infrastructure systems.
The security industry has done a good job of following the government’s lead when it comes to developing new approaches and strategies.
A National Security Council member promised Rep. Jim Langevin that a final U.S. rule on the Wassenaar Arrangement would not happen without another public comment period.
While the government still covets exceptional access to encrypted data, a Harvard paper says that plenty of surveillance opportunities remain, especially with the Internet of Things, metadata and more.
Mike Mimoso and Chris Brook discuss the news of the week, including the latest on the BlackEnergy APT Group, Amazon getting into the SSL certificate game, and government agencies being told to audit their systems for the Juniper backdoor.
Government agencies have until Feb. 4 to audit their IT infrastructure for the use of backdoored Juniper Networks’ Netscreen firewalls.