"Islamic State Probably Isn't Using Bitcoin and, If So, They're Dumb"
November 25, 2015 | Justin O'Connell, CryptoCoinNews.com
Press
News that Bitcoin can be tied to the Islamic State circulated on the internet in the wake of the Paris attacks. European Union leaders even held a so-called “emergency meeting” on virtual currencies themselves, reportedly investigating how to better control the currency.
"Paris ISIS Attacks: Tech Industry Says 'Anti-Terror' Back Doors Would Make US Less Safe"
November 18, 2015 | Salvador Rodriguez and Kerry Flynn, International Business Times
The Islamic State group’s deadly attacks in Paris have reignited a debate between Washington and Silicon Valley as some lawmakers push tech companies to create so-called back doors to their services that would allow law enforcement to break encryption in their efforts to identify and apprehend terrorists.
"Paris Attack Could Renew Debate Over Encrypted Messaging Apps"
November 16, 2015 | Keith Wagstaff, NBC News
The deadly terrorist attacks in Paris could reignite a long-running debate over whether tech companies should be required to allow law enforcement a "back door" to encrypted communications — a request some experts say may not be technically possible.
"What Does Tor's Allegation Against the FBI Mean for Computer Research?"
November 13, 2015 | Sean Lyngaas, FCW
Representatives of the Web anonymity service The Onion Router, better known as Tor, this week accused the FBI of paying researchers at Carnegie Mellon University to unmask Tor users.
"Court Docs Show a University Helped FBI Bust Silk Road 2, Child Porn Suspects"
November 11, 2015 | Joseph Cox, Motherboard, Vice
An academic institution has been providing information to the FBI that led to the identification of criminal suspects on the dark web, according to court documents reviewed by Motherboard. Those suspects include a staff member of the now-defunct Silk Road 2.0 drug marketplace, and a man charged with possession of child pornography.
"Make Big Bucks Distributing Malware (But Don't)"
October 21, 2015 | Neil J. Rubenking, PC Mag
It turns out that with a really large-scale Internet attack, it's not effective to protect every PC or other endpoint. Instead, you infiltrate the attacker and defeat it from within.
"Cops Don’t Need a Crypto Backdoor to Get Into Your iPhone"
October 12, 2015 | Andy Greenberg, Wired
Late last week, the privacy community scored a victory in a year-long battle over the future of encryption: In internal discussions, the White House quietly overruled law enforcement and intelligence officials, deciding that it won’t pursue a policy of pushing tech companies to put “backdoors” in their encryption that would allow government agencies to access decrypted private data.
"Cookie Handling in Browsers Can Break HTTPS Security"
September 25, 2015 | Lucian Constantin, Computerworld
Cookies, the files that websites create in browsers to remember logged-in users and track other information about them, could be abused by attackers to extract sensitive information from encrypted HTTPS connections.
"New Attacks Recall Old Problems with Browser Cookies"
September 25, 2015 | Michael Mimoso, Threat Post
In case didn’t know or need a reminder, browser cookies aren’t exactly impervious to attack.
"Weaponized Wikileaks: Nick Reads Wikileaks So You Don't Have To"
September 24, 2015 | Nicholas Weaver, Lawfare Blog
One of the most powerful ways to damage an institution is what Bruce Schneier calls “organizational doxing”, obtain the target’s secrets and spread them to the world.