Hiking in the Grossglockner Region

Infosec Reading List – August 2019

On a monthly basis I will publish my reading recommendations which mainly focus on Information Security and Outdoor Sports.

All InfoSec Reading Lists can be found here.

Best of Twitterverse

tweet1


tweet2


tweet3


tweet4


tweet5

InfoSec

  • Logging made easy (LME) – free project in order to make logging easy sponsored by the UK government – link
  • UBports 16.04 on a Nexus 5 – interesting project – however, I’m confused that full disk encryption is not available by default – don’t claim that your OS focuses on security & privacy when you do not provide FDE for a mobile phone OS: “The honest answer is that there is no full disk encryption support yet and providing it would not be as simple as one might think.”linklink
  • Unveiling 11 New Adversary Playbookslink
  • On Facebook’s pictures watermarkinglink
  • What We Can Learn from the Capital One Hack – SSRF – link
  • The New WildernessUntil recently, ambient privacy was a simple fact of life. Recording something for posterity required making special arrangements, and most of our shared experience of the past was filtered through the attenuating haze of human memory. Even police states like East Germany, where one in seven citizens was an informer, were not able to keep tabs on their entire population. Today computers have given us that power. – one of the better articles I read about privacy within the last weeks – link
  • Revealed: Microsoft Contractors Are Listening to Some Skype Calls – why should Microsoft be different here? – link
  • Causality Research in AI How Does My Car Make Decisions? link
  • GDPR After One Year: Costs and Unintended Consequenceslink
  • Supply Chain Attack on Wipro Highlights Service Provider Vulnerabilitieslink
  • He tried to prank the DMV. Then his vanity license plate backfired big time – the story is full of WTFs – link
  • Pink Slips To Million Dollar Salaries: Are CISOs Underappreciated Or Overpaid?link
  • Cybersecurity pros name their price as data hacking attacks swell link
  • A Technical Analysis of the Capital One Hack – interesting speculations (yes, these are only speculations, not facts) about the CapitalOne compromise based on the FBI indictment – link1link2
  • The Myth of Consumer-Grade Security“The thing is, that distinction between military and consumer products largely doesn’t exist. All of those “consumer products” Barr wants access to are used by government officials — heads of state, legislators, judges, military commanders and everyone else — worldwide.” – and old topic which still gets discussed and most probably will never stop being discussed – link
  • Alleged “snake oil” crypto company sues over boos at Black Hatlink
  • From unstructured data to actionable intelligence: Using machine learning for threat intelligence“Trained on documentation of known threats, this system takes unstructured text as input and extracts threat actors, attack techniques, malware families, and relationships to create attacker graphs and timelines.”link
  • ECB Says One of Its Websites Was Hacked, Data Possibly Capturedlink
  • Hundreds of exposed Amazon cloud backups found leaking sensitive datalink
  • Calibration Fingerprint Attacks for Smartphoneslink

Outdoors

  • Affordable Satellite Phones: We Test 3 of the Best link
  • Bikepacking Rescue in The Desertlink
  • Are we ‘liking’, sharing and swiping the great outdoors to death?link
  • Cambodian Man Survives 4 Days Stuck Between Rockslink

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s