The Week That Was – 10/8/2012

Light load this week, folks.  I was out scaring trout in the Pisgah National Forrest instead of reading up on current events.  Only commentary I have is that we now have SHA-3 [3] and someone takes one more kick at the dead horse that is password technology. [1] I suppose the Mega Droid project is worth note too.  [4]

Link Dump

1.
Peterson G. Infosec Slowly Puts Down Its Password Crystal Meth Pipe [Internet]. Dark Reading 2012;[cited 2012 Oct 8] Available from: http://www.darkreading.com/blog/240008647/infosec-slowly-puts-down-its-password-crystal-meth-pipe.html
2.
McCullagh D. Justice Dept. to defend warrantless cell phone tracking [Internet]. CNet News 2012;[cited 2012 Oct 2] Available from: http://news.cnet.com/8301-13578_3-57524109-38/justice-dept-to-defend-warrantless-cell-phone-tracking/
3.
Schneier B. Keccak is SHA-3 [Internet]. Schneier on Security 2012;[cited 2012 Oct 8] Available from: https://www.schneier.com/blog/archives/2012/10/keccak_is_sha-3.html
4.
Mimoso M. Sandia Lab’s MegaDroid Project Builds Out Massive Android Test Platform [Internet]. ThreatPost 2012;[cited 2012 Oct 8] Available from: https://threatpost.com/en_us/blogs/sandia-labs-megadroid-project-builds-out-massive-android-test-platform-100312
5.
Fisher D. SHA-1 Hash Collision Could Be Within Reach of Attackers By 2018 [Internet]. ThreatPost 2012;[cited 2012 Oct 8] Available from: https://threatpost.com/en_us/blogs/sha-1-hash-collision-could-be-within-reach-attackers-2018-100512
6.
Donohue B. Social Engineers Launch New Attack on Embattled Banks [Internet]. ThreatPost 2012;[cited 2012 Oct 8] Available from: https://threatpost.com/en_us/blogs/social-engineers-launch-new-attack-embattled-banks-100512
7.
Sterart S. Terrorism Tradecraft [Internet]. Stratfor 2012;[cited 2012 Oct 8] Available from: http://www.stratfor.com/weekly/terrorism-tradecraft
8.
Using OAuth 2.0 to Access Google APIs – Google Accounts Authentication and Authorization [Internet]. Google Developers 2012;[cited 2012 Oct 8] Available from: https://developers.google.com/accounts/docs/OAuth2
9.
Nather W. When Monitoring Becomes a Liability [Internet]. Dark Reading 2012;[cited 2012 Oct 8] Available from: http://www.darkreading.com/security-monitoring/167901086/security/news/240008609/when-monitoring-becomes-a-liability.html

Leave a Reply

%d bloggers like this: