Infosec Reading List - February 2017

On a monthly basis I will publish my reading recommendations which mainly focus on Information Security (InfoSec) and Outdoor Sports. All InfoSec Reading Lists can be found here. Text in italic represent quotes from the original article.

Quotes from the Twitterverse

Desktop View

Desktop View

Desktop View


  • Dutch secret service tries to recruit TOR admin - interesting story but not limited to NL only - [link]
  • Discarded laptop yields revelations on network behind Brussels, Paris attacks - comment - [link]
  • Agile Development & Security - [link]
  • Origin Of Wireless Security: The Marconi Radio Hack Of 1903 - the story about one of the first wireless hacks - [link]
  • After 3 Years, Why Gmail’s End-to-End Encryption Is Still Vapor - story behind Google’s story of implementing end-2-end encryption for Gmail - [link]
  • Bypassing Telekom FON hotspot authentication - [link]
  • Sunny with a chance of stolen credentials: Malicious weather app found on Google Play - capability to lock phone and hold it as ransom besides harvesting banking credentials and intercept messages - [link]
  • Who Ran - comment - [link]
  • Data from connected CloudPets teddy bears leaked and ransomed, exposing kids’ voice messages - [link]
  • List of Computer Science related contacts for PhD applicants from US-banned countries - [link]
  • Hotel guests locked out of their rooms due to ransomware - “However the hotel management decided to limit exposure to future attacks by rolling back to regular locks and keys, also answering requests of some customers looking for a more traditional and home-like atmosphere.” – while the trend tends to connect everything to the Internet (see IoT mess), there will be a smaller group disconnecting specific environments in order to avoid risks - being “offline” will potentially become a hipster trend - [link]
  • Twitter Activist Security - OpSec guidelines for “Twitter Activist Security” - [link]
  • “I have nothing to hide. Why should I care about my privacy?” - read the article in case you hear this sentence often - specifically the practical reasons mentioned in the article are worth to consider - [link]
  • Printer Security - nice work by former colleagues from the RUB - [link]
  • PGP - why giving up on PGP - why not giving up on PGP - comment - [link] - [link]
  • Pragmatic thoughts on #CloudBleed - [link]
  • Announcing the first SHA1 collision - [link]


  • 30 Terrifying Trails - [todo] fill up your bucket lists - [link]
  • Scottish Bothy Bible guide book - [link]
  • Long Before McCandless, John Hornby Tested Himself in Northern Canada - and Failed - [link]
This post is licensed under CC BY 4.0 by the author.