Tag: joseph cox

  • We cannot ignore the increased use of IoT in domestic abuse cases

    Smart home technology is increasingly being used in domestic abuse cases. In more than 30 interviews with The New York Times , domestic abuse victims, their lawyers, shelter workers and emergency responders have described how the technology is becoming an alarming new tool. Security concerns over smart homes, and more generally the Internet of Things (IoT),…

  • We cannot ignore the increased use of IoT in domestic abuse cases

    Smart home technology is increasingly being used in domestic abuse cases. In more than 30 interviews with The New York Times , domestic abuse victims, their lawyers, shelter workers and emergency responders have described how the technology is becoming an alarming new tool. Security concerns over smart homes, and more generally the Internet of Things (IoT),…

  • Alleged author of creepy FruitFly macOS malware arrested

    It is almost a year since the mysterious FruitFly malware for macOS was discovered . Malware targeting macOS is still uncommon enough to be newsworthy, but FruitFly seemed particularly interesting: its spying capabilities, combined with the fact that it had managed to stay under the radar for many years, led many to postulate that it…

  • Alleged author of creepy FruitFly macOS malware arrested

    It is almost a year since the mysterious FruitFly malware for macOS was discovered . Malware targeting macOS is still uncommon enough to be newsworthy, but FruitFly seemed particularly interesting: its spying capabilities, combined with the fact that it had managed to stay under the radar for many years, led many to postulate that it…

  • VB2017 paper: The sprawling market of consumer spyware

    Nation states, criminals and bored teenagers are the various kinds of adversaries the security community is used to facing, and they are all well understood. There is one type of adversary, however, that is less well understood: that of an abusive partner or ex-partner. Yet, for many people, this is a very real threat: the…

  • VB2017 paper: The sprawling market of consumer spyware

    Nation states, criminals and bored teenagers are the various kinds of adversaries the security community is used to facing, and they are all well understood. There is one type of adversary, however, that is less well understood: that of an abusive partner or ex-partner. Yet, for many people, this is a very real threat: the…

  • Transparency is essential when monitoring your users’ activities

    The inspection of HTTPS traffic is a sensitive issue among security experts. On the one hand, there are those who argue that this breaks the important end-to-end principle of secure connections, while others argue that it is essential if one wants to block malicious network traffic, which is increasingly using HTTPS. I tend to side…

  • Transparency is essential when monitoring your users’ activities

    The inspection of HTTPS traffic is a sensitive issue among security experts. On the one hand, there are those who argue that this breaks the important end-to-end principle of secure connections, while others argue that it is essential if one wants to block malicious network traffic, which is increasingly using HTTPS. I tend to side…