article thumbnail

More Detail on the Juniper Hack and the NSA PRNG Backdoor

Schneier on Security

Here’s me in 2007 on the NSA backdoor. We knew the basics of this story , but it’s good to have more detail. Here’s me in 2015 about this Juniper hack.

Hacking 343
article thumbnail

Airline Passenger Mistakes Vintage Camera for a Bomb

Schneier on Security

Back in 2007, I called this the “ war on the unexpected.” It turns out the would-be “bomber” was just a vintage camera aficionado and the woman who reported him made a mistake, sources said. Why in the world was the passenger in custody for “several hours”? They didn’t do anything wrong.

362
362
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Needless Panic Over a Wi-FI Network Name

Schneier on Security

I am also reminded of my 2007 essay, " The War on the Unexpected." A Turkish Airlines flight made an emergency landing because someone named his wireless network (presumably from his smartphone) "bomb on board.". In 2006, I wrote an essay titled " Refuse to be Terrorized." (I Progress, I suppose.

Wireless 246
article thumbnail

An Untrustworthy TLS Certificate in Browsers

Schneier on Security

Vostrom filed papers in 2007 to do business as Packet Forensics, according to Virginia state records. They estimated that those apps were downloaded more than 60 million times, including 10 million downloads of Muslim prayer apps. Measurement Systems’ website was registered by Vostrom Holdings, according to historic domain name records.

Spyware 331
article thumbnail

Ask Fitis, the Bear: Real Crooks Sign Their Malware

Krebs on Security

Prior to that, akafitis@gmail.com was used as the email address for the account “ Fitis ,” which was active on Exploit between September 2006 and May 2007. ru in its early years, but for a brief period in 2007 it appears this website was inadvertently exposing all of its file directories to the Internet. ru in 2008.

Malware 295
article thumbnail

Putting Undetectable Backdoors in Machine Learning Models

Schneier on Security

Second, we demonstrate how to insert undetectable backdoors in models trained using the Random Fourier Features (RFF) learning paradigm (Rahimi, Recht; NeurIPS 2007). Moreover, even if the distinguisher can request backdoored inputs of its choice, they cannot backdoor a new input­a property we call non-replicability.

349
349
article thumbnail

News alert: SquareX’s “Year of Browser Bugs” project exposes critical cybersecurity blind spots

The Last Watchdog

Notable projects included the Month of Browser Bugs (July 2006), Month of Kernel Bugs (November 2006), and Month of Apple Bugs (January 2007). MOB projects played a huge role in improving the gravity at which security and responsible disclosure are taken in these companies. However, unlike H.