{"id":189,"date":"2008-03-09T09:38:45","date_gmt":"2008-03-09T17:38:45","guid":{"rendered":"http:\/\/cubist.cs.washington.edu\/Security\/2008\/03\/09\/in-the-news-this-week\/"},"modified":"2008-03-09T09:38:45","modified_gmt":"2008-03-09T17:38:45","slug":"in-the-news-this-week","status":"publish","type":"post","link":"https:\/\/secblog.cs.washington.edu\/Security\/2008\/03\/09\/in-the-news-this-week\/","title":{"rendered":"In the news this week&#8230;"},"content":{"rendered":"<p>There&#8217;s been a lot of security-related issues in the news this week (just like every week, actually).  I thought I&#8217;d fuel the discussions by listing a few of them.  I thought I&#8217;d also provide some links to topics that 3ric discussed on Friday.  Please create new blog entries for the topics you&#8217;d like to explore further:<\/p>\n<ul>\n<li> RFID cards to help prevent underage smoking in Japan:  <a href=\"http:\/\/www.taspo.jp\/english\/taspo\/Introduction.html\">http:\/\/www.taspo.jp\/english\/taspo\/Introduction.html<\/a><\/li>\n<li>Homemade robots patrol Atlanta streets:  <a href=\"http:\/\/hardware.slashdot.org\/article.pl?sid=08\/03\/07\/2029236&amp;from=rss\">http:\/\/hardware.slashdot.org\/article.pl?sid=08\/03\/07\/2029236<\/a><\/li>\n<li>Open source robot for household tasks:  <a href=\"http:\/\/hardware.slashdot.org\/article.pl?sid=08\/03\/07\/012207&amp;from=rss\">http:\/\/hardware.slashdot.org\/article.pl?sid=08\/03\/07\/012207<\/a><\/li>\n<li>Sat-nav dog collar that keeps track of Fido: <a href=\"http:\/\/women.timesonline.co.uk\/tol\/life_and_style\/women\/the_way_we_live\/article3501141.ece\">http:\/\/women.timesonline.co.uk\/tol\/life_and_style\/women\/the_way_we_live\/article3501141.ece<\/a><\/li>\n<li>Video of talk on reverse engineering crypto in an RFID chip:  <a href=\"http:\/\/www.hackaday.com\/2008\/01\/01\/24c3-mifare-crypto1-rfid-completely-broken\/\">http:\/\/www.hackaday.com\/2008\/01\/01\/24c3-mifare-crypto1-rfid-completely-broken\/<\/a><\/li>\n<li>H1kari&#8217;s work on intercepting GSM:  <a href=\"http:\/\/www.hackaday.com\/2008\/02\/15\/shmoocon-2008-intercepting-gsm-traffic\/\">http:\/\/www.hackaday.com\/2008\/02\/15\/shmoocon-2008-intercepting-gsm-traffic\/<\/a><\/li>\n<li>Brain scanner can tell what you&#8217;re looking at:  <a href=\"http:\/\/www.wired.com\/science\/discoveries\/news\/2008\/03\/mri_vision\">http:\/\/www.wired.com\/science\/discoveries\/news\/2008\/03\/mri_vision<\/a><\/li>\n<li>Attacking Chip &amp; Pin credit card transactions:  <a href=\"http:\/\/www.usenix.org\/events\/sec07\/tech\/drimer.html\">http:\/\/www.usenix.org\/events\/sec07\/tech\/drimer.html<\/a><\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>There&#8217;s been a lot of security-related issues in the news this week (just like every week, actually). I thought I&#8217;d fuel the discussions by listing a few of them. I thought I&#8217;d also provide some links to topics that 3ric &hellip; <a href=\"https:\/\/secblog.cs.washington.edu\/Security\/2008\/03\/09\/in-the-news-this-week\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[],"class_list":["post-189","post","type-post","status-publish","format-standard","hentry","category-current-events"],"_links":{"self":[{"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/posts\/189","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/comments?post=189"}],"version-history":[{"count":0,"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/posts\/189\/revisions"}],"wp:attachment":[{"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/media?parent=189"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/categories?post=189"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/tags?post=189"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}