article thumbnail

The Independent Op-Ed: Australia’s social media ban won’t protect kids – it’ll put them more at risk

Joseph Steinberg

While there is little doubt that the elected officials hope to protect children with the aforementioned act, the reality is that – as Australia has already learned in a previous case described in the article – the new law is more likely to make children less safe than more safe.

Media 277
article thumbnail

Security Risks of Client-Side Scanning

Schneier on Security

I’m part of a group of cryptographers that has just published a paper discussing the security risks of such a system. (It’s It’s not a cryptographic backdoor, but it’s still a backdoor — and brings with it all the insecurities of a backdoor.

Risk 358
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Risks of Evidentiary Software

Schneier on Security

Over at Lawfare, Susan Landau has an excellent essay on the risks posed by software used to collect evidence (a Breathalyzer is probably the most obvious example). Bugs and vulnerabilities can lead to inaccurate evidence, but the proprietary nature of software makes it hard for defendants to examine it.

Software 359
article thumbnail

COVID-19 Risks of Flying

Schneier on Security

This is all a prelude to saying that I have been paying a lot of attention to the COVID-related risks of flying. This article interviewed 511 endocrinologists, and the general consensus was that flying is riskier than getting a haircut but less risky than eating in a restaurant.

Risk 279
article thumbnail

10 Behaviors That Will Reduce Your Risk Online

Daniel Miessler

I wrote an article recently on how to secure your home network in three different tiers of protection. What follows is a set of basic security hygiene steps that will significantly reduce your risk online. The more fringe the site, the higher the risk of bad things happening while you’re there. Stay on reputable websites.

Risk 345
article thumbnail

Risk reduction redefined: How compromise assessment helps strengthen cyberdefenses

SecureList

The primary objective of these services is risk reduction. In this article, we delve into the root causes of real-world cases from our practice, where despite having numerous security controls in place, the organizations still found themselves compromised. This is where compromise assessment enters the game.

Risk 107
article thumbnail

GUEST ESSAY: Where we stand on mitigating software risks associated with fly-by-wire jetliners

The Last Watchdog

Here’s what you should know about the risks, what aviation is doing to address those risks, and how to overcome them. It is difficult to deny that cyberthreats are a risk to planes. Risks delineated Still, there have been many other incidents since. Fortunately, there are ways to address the risks.

Software 264