Agregátor RSS

Autorem Voynichova rukopisu psaného neznámým jazykem je Jiří III. z Lichtenštejna

Security News - 24 min 2 sek zpět
Irena Hanzíková přeložila třetinu tzv. Voynichova rukopisu. Obsah ji vede k závěru, že autorem rukopisu je podle textu a s vědomím let, kdy vznikl, i z dalších indicií moravský šlechtic Jiří III. z Lichtenštejna, původem z Mikulova, tridentský biskup a římský kardinál.

Všimněte si ale pochybností (těch seriózněji formulovaných) v diskuzi k článku.
Kategorie: Aktuality

17 Security Tips for Smarter Smartphone Banking (Android)

Security News - 24 min 2 sek zpět
Dobré a přehledné rady jak zabezpečit svůj Smartphone(Android)pro využívání pro internetové bankovnictví.
Kategorie: Aktuality

Post-Quantum RSA

Security News - 24 min 2 sek zpět
Daniel J. Bernstein, Nadia Heninger, Paul Lou, and Luke Valenta: Post-Quantum RSA

Abstract: This paper proposes RSA parameters for which (1) key generation, encryption, decryption, signing, and verification are feasible on today´s computers while (2) all known attacks are infeasible, even assuming highly scalable quantum computers. As part of the performance analysis, this paper introduces a new algorithm to generate a batch of primes. As part of the attack analysis, this paper introduces a new quantum factorization algorithm that is often much faster than Shor´s algorithm and much faster than pre-quantum factorization algorithms. Initial pqRSA implementation results are provided.
Kategorie: Aktuality

End-to-end email encryption with no central point of attack

Security News - 24 min 2 sek zpět
A seamless, easy-to-use, and secure end-to-end encrypted business collaboration tool with no central point of attack is a holy grail for every business, and Boston-based security company PreVeil believes they have the right solution on hand.
Kategorie: Aktuality

The Ultimate Guide to SSL Inspection- Uncover Threats in SSL Traffic

Security News - 24 min 2 sek zpět
Encrypted traffic accounts for a large and growing percentage of all network traffic. While the adoption of SSL, and its successor, Transport Layer Security (TLS), should be cause for celebration – as encryption improves confidentiality and message integrity – it also puts organizations at risk. This is because hackers can leverage encryption to conceal their exploits from security devices that do not inspect SSL traffic.

How serious is the threat? According to a recent Gartner survey, “less than 20% of organizations with a firewall, an intrusion prevention system (IPS) or a unified threat management (UTM) appliance decrypt inbound or outbound SSL traffic.”1 This means that hackers can evade over 80% of companies’ network defenses simply by tunneling attacks in encrypted traffic.

To stop cyber attacks, organizations must gain insight into encrypted data, and to do this, they need a dedicated security platform that can decrypt inbound and outbound SSL traffic.
Kategorie: Aktuality

Cryptography: The codes that got away

Security News - 24 min 2 sek zpět
About new book:

The History and Mystery of the World´s Greatest Ciphers from Ancient Egypt to Online Secret Societies

Craig Bauer Princeton University Press: 2017.
Kategorie: Aktuality

Enigma: Why the fight to break Nazi encryption still matters

Security News - 24 min 2 sek zpět
A mystery inside an Enigma

The Enigma has a surprisingly understated design for being such a deadly tool. It could easily be mistaken for a typewriter with a few extra parts, housed in a plain wooden box.
Kategorie: Aktuality

E-Mail Encryption 2017 Global Market Outlook,Research,Trends and Forecast to 2020

Security News - 24 min 2 sek zpět
The report covers the present scenario and the growth prospects of the global e-mail encryption market for the period 2016-2020. To calculate the market size, the report considers the revenues generated from e-mail encryption solutions provided to organizations including large organizations, small and medium-sized businesses (SMBs), and government organizations for encrypting business e-mails.
Kategorie: Aktuality

Five Eyes nations stare menacingly at tech biz and its encryption

Security News - 24 min 2 sek zpět
US, UK, Australia, New Zealand and Canada mull leaning hard for access to your info.

Officials from the United States, the United Kingdom, Canada, Australia and New Zealand will discuss next month plans to force tech companies to break encryption on their products.

The so-called Five Eyes nations have a long-standing agreement to gather and share intelligence from across the globe. They will meet in Canada with a focus on how to prevent \"terrorists and organized criminals\" from \"operating with impunity ungoverned digital spaces online,\" according to Australian prime minister Malcolm Turnbull.\"

Viz také - When is ´not a backdoor´ just a backdoor? Australia´s struggle with encryption.

Dále: Backdoors, encryption and internet surveillance: Which way now?
Kategorie: Aktuality

Číňané spustili „kvantový kosmický závod“. Zatím s přehledem vedou

Security News - 24 min 2 sek zpět
Čínskému výzkumnému týmu se podařilo demonstrovat postup, který by mohl zaručit z dnešního pohledu téměř dokonale bezpečnou komunikaci. Vyslali proud vzájemně „provázaných“ párů částic z oběžné dráhy k Zemi.

Viz také Chinese quantum satellite Micius breaks record for distribution distance of quantum entangled photons.
Kategorie: Aktuality

NSA Says New Encryption Standards Needed to Resist Quantum Computing

Security News - 24 min 2 sek zpět
NEWS ANALYSIS: Quantum computing's potential for cracking encryption worries the National Security Agency, so it is developing standards and strategies to support encryption in a post-quantum world.
Kategorie: Aktuality

Samsung Galaxy S8 iris scanner can be fooled with a printed photo

Security News - 24 min 2 sek zpět
After demonstrating how easily Apple’s Touch ID can be fooled with a user fingerprint photographed from a glass surface, Chaos Computer Club (CCC) hacker “Starbug” has proven that the iris recognition system in Samsung’s Galaxy S8 smartphone can be fooled by using a printed photo of the user’s eye(s).
Kategorie: Aktuality

How quantum computing increases cybersecurity risks

Security News - 24 min 2 sek zpět
5 ways your information and property will be compromised when quantum computers arrive.
Kategorie: Aktuality

Top 5: Things to know about quantum computers

Security News - 24 min 2 sek zpět
Five basic informations. And other links.
Kategorie: Aktuality

2017 Global Encryption Trends Study

Security News - 24 min 2 sek zpět
This twelfth installment of the Global Encryption Trends Study, conducted by the Ponemon Institute and sponsored by Thales e-Security, reveals both deployment plans and pains associated with increasingly aggressive cloud and data protection strategies.

KEY FINDINGS

Strategy and Adoption of Encryption
Trends in Encryption Adoption
Threats, Main Drivers and Priorities
Deployment Choices
Encryption Features Considered Most Important
Attitudes About Key Management
Importance of Hardware Security Modules (HSMs)
Budget Allocations
Cloud Encryption
Kategorie: Aktuality

Coursera co-founder, Andrew Ng, quits Baidu to launch AI startup

Home AI - 57 min 17 sek zpět

Coursera co-founder, Andrew Ng, quits Baidu to launch AI startup

… which are used by search engines to find content; the keywords are: AI, andrew ng, artificial intelligence, deep learning, and machine learning.

Link to Full Article

Kategorie: Transhumanismus

Google to stop scanning personal Gmail accounts for ad targeting

Home AI - 59 min 25 sek zpět

Google to stop scanning personal Gmail accounts for ad targeting

In its report on Google’s decision, Variety reporter, Janko Roettgers, pointed out Google’s Smart reply feature uses machine learning to figure out the …

Link to Full Article

Kategorie: Transhumanismus

Juniper Research projects retailers could lose $71B in card-not-present fraud

Home AI - 1 hodina 1 min zpět

Juniper Research projects retailers could lose $71B in card-not-present fraud

Juniper specifically cited machine learning as a key tool in identifying genuine users, while the shift to mobile eCommerce would rely on 3DS 2.0 and …

Link to Full Article

Kategorie: Transhumanismus

WannaCrypt blamed for speed camera re-boot frenzy, despite lack of ransom debands

The Register - Anti-Virus - 1 hodina 36 min zpět
USB-toting admin 'upgraded' Windows and Linux systems with something nasty that Police can't really explain

A contractor in the Australian State of Victoria has managed to infect an unknown number of speed cameras with a virus, over sneakernet.…

Kategorie: Viry a Červi

SUSECON 2017, světová konference o open source, 25. až 27. září 2017 poprvé v Praze!

AbcLinuxu [články] - 2 hodiny 23 min zpět
Přihlaste se na globální akci zaměřenou na Linux, OpenStack, CEPH, Cloud Foundry, kontejnerová řešení Docker, NFV a další open-source technologie.
Kategorie: GNU/Linux & BSD
Syndikovat obsah