Infosecurity.US

Information Security & Occasional Forays Into Adjacent Realms

  • Web Log

Leonardo Torres y Quevedo’s fascinating Chess Automata, via History of Computers

Artificial Intelligence, The True Beginning Occurred In 1912

January 06, 2020 by Marc Handelman in Artificial Intelligence, Computer Science, Research

Well crafted blog entry authored by Professor Herbert Bruderer at the Communications of the ACM blog, detailing the true start of Artificial Intelligence in 1912.

'If one takes chess as a yardstick for artificial intelligence, however, this branch of research begins much earlier, at the latest in 1912 with the chess automaton of the Spaniard Leonardo Torres Quevedo (cf. Fig. 1). In the chess playing Turk (1769) of Wolfgang von Kempelen, a human player was hidden." - via Herbert Bruderer, retired lecturer of Didactics in Computer Science at ETH Zürich

Reportedly, Professor. Bruderer is now retired from his lecturer role in Didactics of Computer Science at ETH Zürich, and recently, he has fulfilled the role of Historian of Technology.

January 06, 2020 /Marc Handelman
Artificial Intelligence, Computer Science, Research

DEF CON 27, Wireless Village, Besim Altinok's & Legendary Nacar's 'Edu Driving' →

December 23, 2019 by Marc Handelman in Conferences, DEF CON 27, Education, Information Security, Research, Wireless Security, Wireless Networks

Thanks to Def Con 27 Volunteers, Videographers and Presenters for publishing their superlative conference videos via their YouTube Channel for all to see, enjoy and learn.

December 23, 2019 /Marc Handelman
Conferences, DEF CON 27, Education, Information Security, Research, Wireless Security, Wireless Networks

BlueHat IL 2018, Marion Marschalek 's 'The Wolf in SGX Clothing' →

February 07, 2018 by Marc Handelman in Education, Information Security, Malware, Malware Detection, Research, Security Research, BlueHat IL, Conferences
February 07, 2018 /Marc Handelman
Education, Information Security, Malware, Malware Detection, Research, Security Research, BlueHat IL, Conferences

Dok'd

July 26, 2017 by Marc Handelman in Research, Malware

MAC users take note, there's evil malware in the wild - and - according to Checkpoint's Ofer Caspi of the highly competent Checkpoint Malware Research Team, the bits in question are not just pernicous, but tenacious as well, and, interestingly, specifically targeting Mac users. Dubbed OSX/Dok it's time to update your virus prophylaxis on your MAC, forthwith.

The OSX/Dok malware is distributed via a phishing campaign, which is usually not a new or surprising attack vector, however this time it targets specifically macOS users, who are mostly perceived as malware-proof. This phishing campaign is combined with a MiTM attack, allowing complete access to all victim communication, even if it’s SSL encrypted. - via Checkpoint's Ofer Caspi - Checkpoint Malware Research Team

July 26, 2017 /Marc Handelman
Research, Malware

LuciuOS →

August 26, 2016 by Marc Handelman in All is Information, Alternate Attack Analysis, Information Security, Research

In which, the new malware-focused development framework for malware research and mitigation is introduced. Enjoy.

August 26, 2016 /Marc Handelman
All is Information, Alternate Attack Analysis, Information Security, Research

Robert Waldinger, What Builds...

January 01, 2016 by Marc Handelman in All is Information, Brilliant, Research
January 01, 2016 /Marc Handelman
All is Information, Brilliant, Research

Blackhat 2015, Peculiarities of Nation-State Malware Research

September 16, 2015 by Marc Handelman in Information Security, Espionage, All is Information, Malware, Research, Security Research
September 16, 2015 /Marc Handelman /Source
Information Security, Espionage, All is Information, Malware, Research, Security Research

USENIX Research, Behavior Comparison of Security Experts vs. Non-Experts

July 29, 2015 by Marc Handelman in All is Information, Information Security, Research

via the Google (NasdaqGS: GOOG) Online Security Blog comes this interesting USENIX Research Paper, detailing security related behaviors between and betwixt so-called 'security experts' and laymen... Enjoy.

July 29, 2015 /Marc Handelman
All is Information, Information Security, Research

Researched Research on Anti-Drone Research

April 30, 2015 by Marc Handelman in All is Information, Cyberwar, Electronic Warfare, Information Security, Sarcasm, Research

News, via Aliya Sternstein, writing at NextGov, details research regarding anti-drone activities fueled by published research. A drone research conundrum, of sorts...

April 30, 2015 /Marc Handelman
All is Information, Cyberwar, Electronic Warfare, Information Security, Sarcasm, Research
36-actionable-evidence.jpg

Anti-Forensics and Actionable Evidence →

April 15, 2015 by Marc Handelman in All is Information, Education, Forensics, Information Security, Research, Security Education

News, brought to my attention by Steve Hailey, CEO of the Cybersecurity Institute, is todays MustRead, focusing on Anti-Forensics. Examine, if you will, the affect anti-forensics has on investigatory professionals when performing examinations targeting computational systems. If you read anything today regarding forensics, read Steve's posting on LinkedIn, and the paper published by the three University of Washington researchers responsible for this superlative effort. Namely, Justin Brecese MSIM , Aaron Alva MISM and Casey Rodgers MISM. You may also download the documents from the CyberSecurity Insitute here in a compressed file, or from UW's Capstone Archives.

April 15, 2015 /Marc Handelman
All is Information, Education, Forensics, Information Security, Research, Security Education

Noah's Ark, Москва Style

January 05, 2015 by Marc Handelman in Research, Physical Sciences, Physical Security

News' has reached the New World, of a fascinating endeavor - led by researchers at Moscow State University -  to locate, gather, categorize and store all Deoxyribonucleic Acid on Earth. A new form of Russian Hegemony, or a commendable and valid scientific effort to preserve the genetic code of nearly all living things in a veritable snap-shot of life? You be the judge...

"I call the project ‘Noah’s Ark.’ It will involve the creation of a depository – a databank for the storing of every living thing on Earth, including not only living, but disappearing and extinct organisms. This is the challenge we have set for ourselves,” MSU rector Viktor Sadivnichy told journalists. " - via RT News

January 05, 2015 /Marc Handelman
Research, Physical Sciences, Physical Security

Name'd →

December 05, 2014 by Marc Handelman in All is Information, Code, Complexity, Information Security, Research, Security, Vulnerabilities

Everything you would want to know about the naming of malware, via Violet Blue for Zero Day. Enjoy.

 

December 05, 2014 /Marc Handelman
All is Information, Code, Complexity, Information Security, Research, Security, Vulnerabilities

XKCD, Proteins →

October 13, 2014 by Marc Handelman in All is Information, Humor, Mathematics, Natural Science, Physical Sciences, Research, Sarcasm, Science, XKCD

via Randall Munroe, at XKCD.

October 13, 2014 /Marc Handelman
All is Information, Humor, Mathematics, Natural Science, Physical Sciences, Research, Sarcasm, Science, XKCD

DARPA's Therapeutic Implantable Memory →

August 29, 2014 by Marc Handelman in All is Information, Memory, National Security, Research, Science, Veterans, DARPA, Physical Sciences

The Defense Advanced Research Projects Agency has announced an astounding project targeting implantable memory prosthetics to assist service-members and other patients whose memory has suffered degradation due to PTSD. Outstanding.

August 29, 2014 /Marc Handelman
All is Information, Memory, National Security, Research, Science, Veterans, DARPA, Physical Sciences

Traffic Infrastructure, Security of

August 21, 2014 by Marc Handelman in All is Information, Information Security, Physical Security, Research

via the SCADASEC mail list, comes this well crafted paper entitled, appropriately enough: Green Lights Forever: Analyzing the Security of Traffic Infrastructure, authored by Branden Ghena, William Beyer, Allen Hillaker, Jonathan Pevarnek, and J. Alex Halderman [all members of the University of Michigan's Electrical Engineering and Computer Science Department]. Detailing the both the obvious, and necessarily, the not so obvious nature of the movable feast we have created on our nations, and the world' streets. Today's' Must Read.

August 21, 2014 /Marc Handelman
All is Information, Information Security, Physical Security, Research

Mnemonic Wheel

July 23, 2014 by Marc Handelman in All is Information, Computation, Cryptography, Information Sciences, Information Security, Physical Security, Network Security, Research, Science

 

An aged mnemonic given new life. In this case, the utilization of artifacts [color wheels] which inform memory regarding password data entry. Today's' Must Read.

July 23, 2014 /Marc Handelman
All is Information, Computation, Cryptography, Information Sciences, Information Security, Physical Security, Network Security, Research, Science

Internet of Untrusted Things...

July 17, 2014 by Marc Handelman in All is Information, Blatant Stupidity, Data Security, Demise of Privacy, Sarcasm, Research, Network Security

via the superlative journalism of Dan Goodin at ArsTechnica, comes the sad tale of flawed light bulbs; in which, the internet of things are coupled to, evidently, the interweb-of-less-than-secure-objects-with-little-need-to-be-on-the-internet-in-the-first-place.

July 17, 2014 /Marc Handelman
All is Information, Blatant Stupidity, Data Security, Demise of Privacy, Sarcasm, Research, Network Security

Android Cryptography Woes

July 01, 2014 by Marc Handelman in Cryptography, Information Security, Messaging Security, Research, Cruft, Web Security

Once more unto the breach, dear friends, once more.*  Apparently all the makings [crypto flaws] of an extraordinary breach of sensitive data, this time contained within an enormous number of Android devices, has been discovered. Astonishingly, upwards of eighty-six percentile of all Android devices may be vulnerable.

*[Cry God for Harry, England, and Saint George!' speech of Shakespeare's Henry V, Act III, 1598., evidently all the more relevant today...]

July 01, 2014 /Marc Handelman
Cryptography, Information Security, Messaging Security, Research, Cruft, Web Security

Distribution, Quantum Key, that is...

May 27, 2014 by Marc Handelman in Quantum Mathematics, Web Security, National Security, Cryptography, Science, Research, Information Security, Messaging Security, Identity Theft

via Nature [Toshihiko Sasaki, Yoshihisa Yamamoto and Masato Koashi) and reported by Wired's Chris Lee comes this fascinating tale of the tribulations enveloping quantum key distribution [QKD]. The proof, as they say in the vernacular, resides within the experiment...

May 27, 2014 /Marc Handelman
Quantum Mathematics, Web Security, National Security, Cryptography, Science, Research, Information Security, Messaging Security, Identity Theft

Mickens: Computers are a Sadness, I am the Cure...

May 16, 2014 by Marc Handelman in Computer Science, Computation, Information Sciences, Research, Science

via Monitorama PDX 2014 an exposition of sorts, presented by the eponymous James Mickens of  Microsoft Corporation (NasdaqGS: MSFT) Research. Hat Tip -Trey at Firewall Consultants.

May 16, 2014 /Marc Handelman
Computer Science, Computation, Information Sciences, Research, Science