Why one executive order won't be enough to secure the federal government
January 27, 2017 | Timothy B. Lee, Vox
Press
Weaver notes, “the real threats are often nongovernmental systems — things like the power grid and telecommunications infrastructure. All of that is in private hands.”
Cyber Week in Review: January 27, 2017
January 27, 2017 | Adam Segal, CFR
“A Galaxy S3 does not meet the security requirements of the average teenager, let alone the purported leader of the free world,” writes Nicholas Weaver in Lawfare.
Security expert: Trump should throw his unsecured Android phone into an incinerator
January 26, 2017 | Melanie Ehrenkranz, .Mic
One potential security threat: The unsecured device can be hacked and turned into an active live microphone, Weaver mentioned. If anyone is bringing this phone into important government meetings, the consequences could be catastrophic.
How secure are VPN apps really?
January 25, 2017 | Stephen Withers, Bit
"Our results show that – in spite of the promises for privacy, security and anonymity given by the majority of VPN apps – millions of users may be unawarely subject to poor security guarantees and abusive practices inflicted by VPN apps."
Crypto Experts Say Discussed WhatsApp Feature Is Not a Backdoor
January 20, 2017 | Joseph Cox, Motherboard Contributor
“The threat is remote, quite limited in scope, applicability (requiring a server or phone number compromise) and stealthiness (users who have the setting enabled still see a warning—even if after the fact),” the letter reads.
Report alleging Trump's Russian links and 'perverted sexual acts' showered with criticism
January 11, 2017 | Jason Murdock, International Business Times
Nicholas Weaver, a leading security expert at the International Computer Science Institute (ICSI), noted he was not surprised many news outlets refused to publish the Russia/Trump report as it is essentially made up of "unsubstantiated accusations that Trump is practically a Russian agent".
Trump’s Cyber-Appeasement Policy Might Encourage More Hacks
January 10, 2017 | Kaveh Waddell
“Mistrust of attribution would make hacking easier, since it means retribution is harder: You need to have attribution for retribution, both to know that you are retaliating against the right actor and to convince the public you are justified in doing so if it is a public retaliation,” wrote Nicholas Weaver.
Daniel Ellsberg hopes Trump, Putin can avoid doomsday scenario
January 7, 2017 | David Talbot, San Francisco Chronicle
“Healthy skepticism is a good thing, but at this point it’s no longer healthy and bordering on ‘jet fuel can’t melt steel,” Nicholas Weaver, a UC Berkeley computer science lecturer, emailed me. “There is simply a ton of evidence showing that Russia hacked the Democrats and released that information."
Hiding your tracks from Trump: Online privacy worries heat up
December 26, 2016 | Laura Hautala, Cnet
Privacy expert Serge Egelman said chat is light-years ahead of email when it comes to keeping messages private. The system for encrypting emails sent from any email provider -- called "Pretty Good Privacy" or PGP -- is cumbersome to put it mildly. The system's "been around for the better part of 30 or 40 years," said Egelman, who directs usable security and privacy research at the International Computer Science Institute. "No one uses it because the tools are hard to use."
IEEE 5G Initiative Aims to Bring Industry, Policy, Academic Heads Together
December 24, 2016 | Diana Goovaerts
Chaired by Ashutosh Dutta, lead member of AT&T's technical staff, and Gerhard Fettweis, senior research scientist at the International Computer Science Institute and Vodafone chair professor at TU Dresden, IEEE said the 5G Initiative is meant to engage professionals worldwide to address the challenges associated with 5G and “lay the foundation to realize its many opportunities.”