Should I restart or power off/on a phone to clear malware in volatile memory? [closed]

Several sources claim one should power off and on mobile devices weekly. While the effect on overall security might be minor it should (among other things) clear temporary files where malicious code could be hidden and stop the execution o… Continue reading Should I restart or power off/on a phone to clear malware in volatile memory? [closed]

The Signal Chat Leak and the NSA

US National Security Advisor Mike Waltz, who started the now-infamous group chat coordinating a US attack against the Yemen-based Houthis on March 15, is seemingly now suggesting that the secure messaging service Signal has security vulnerabilities.

“I didn’t see this loser in the group,” Waltz told Fox News about Atlantic editor in chief Jeffrey Goldberg, whom Waltz invited to the chat. “Whether he did it deliberately or it happened in some other technical mean, is something we’re trying to figure out.”

Waltz’s implication that Goldberg may have hacked his way in was followed by a …

Continue reading The Signal Chat Leak and the NSA

Noscript: Where in the browser’s ‘inspector’ can I correlate a script source site with specific page functionality

NOT a duplicate of: NoScript: How to determine which sites/scripts to whitelist?
The above referenced question and its answers focused on how to "gauge the trust" of the various sites that provide scripts. This is hugely valuab… Continue reading Noscript: Where in the browser’s ‘inspector’ can I correlate a script source site with specific page functionality

North Korean hacking group makes waves to gain Mandiant, FBI spotlight

The newly designated APT45 pursues military intelligence but has been expanding its targets, Mandiant says.

The post North Korean hacking group makes waves to gain Mandiant, FBI spotlight appeared first on CyberScoop.

Continue reading North Korean hacking group makes waves to gain Mandiant, FBI spotlight

Drones and the US Air Force

Fascinating analysis of the use of drones on a modern battlefield—that is, Ukraine—and the inability of the US Air Force to react to this change.

The F-35A certainly remains an important platform for high-intensity conventional warfare. But the Air Force is planning to buy 1,763 of the aircraft, which will remain in service through the year 2070. These jets, which are wholly unsuited for countering proliferated low-cost enemy drones in the air littoral, present enormous opportunity costs for the service as a whole. In a set of comments posted on LinkedIn…

Continue reading Drones and the US Air Force

Does self-signed encryption certificate violate "no multi-use keys" principle?

Say that I have generated an RSA keypair, which I intend to publish only for use with RSA-KEM; I can see that this is provisioned for:

The intended application for the key MAY be indicated in the key usage certificate extension (see RFC 5… Continue reading Does self-signed encryption certificate violate "no multi-use keys" principle?