Agregátor RSS
Kniha kryptologie, šifrování a tajná písma v prodeji !
Kniha byla v drívejším vydání v edici OKO zcela vyprodána a nebylo ji možné získat.
Nyní je tedy možnost ji zakoupit v e-shopu KYBERCENTRA. Ale pozor k prodeji touto cestou bylo uvolnen pouze omezený pocet 200 kusu .
Sháníte knihu : Kryptologie, šifrování a tajná písma ?
Kniha vyšla v 2006 v nákladu 8000 ks a byla brzy zcela vyprodána.
Kniha nyní vyjde pomocí Crowdfundingu v rámci projektu Centra kybernetické bezpe?nosti, z. ú. (KyberCentrum).
Podpo?te tento projekt a stanete se vlastníci této knihy.
Kryptologie, šifrování a tajná písma
Knihu lze získat v rámci projektu Kybercentra (Crowdfunding).
Update on NIST\'s Post-Quantum Cryptography Program
Rozluštil jsem nejtajemn?jší text sv?ta, tvrdí v?dec. Vojni??v rukopis je prý ženskou p?íru?kou pro královnu
Policie zatkla cizince, do bankomatu montovali ?te?ku karet
Jak tvo?it a pamatovat si hesla (2019)
P?ehled kvalitních bezplatných bezpe?nostních program?
P?ehled bezplatných silných antivirových a dalších bezpe?nostních program?, které vám mohou pomoci udržet vaše citlivé informace v bezpe?í.
How to encrypt email (Gmail, Outlook iOS, OSX, Android, Webmail)
So you want to start encrypting your email? Well, let’s start by saying that setting up email encryption yourself is not the most convenient process. You don’t need a degree in cryptography or anything, but it will take a dash of tech savvy. We’ll walk you through the process later on in this article.
Alternatively, you can use an off-the-shelf encrypted email client. Tutanota is one such secure email service, with apps for mobile and a web mail client. It even encrypts your attachments and contact lists. Tutanota is open-source, so it can be audited by third parties to ensure it’s safe. All encryption takes place in the background. While we can vouch for Tutanota, it’s worth mentioning that there are a lot of email apps out there that claim to offer end-to-end encryption, but many contain security vulnerabilities and other shortcomings. Do your research before choosing an off-the-shelf secure email app.
If you’d prefer to configure your own email encryption, keep reading.
Google: Security Keys Neutralized Employee Phishing
Security Keys are inexpensive USB-based devices that offer an alternative approach to two-factor authentication (2FA), which requires the user to log in to a Web site using something they know (the password) and something they have (e.g., a mobile device).
Crypto gripes, election security, and mandatory cybersec school: Uncle Sam´s cyber task force emits todo list for govt
The report [PDF], compiled by 34 people from six different government agencies, examines the challenges facing Uncle Sam´s agencies in enforcing the law and protecting the public from hackers. It also lays out what the government needs to do to thwart looming threats to its computer networks.
Let´s (not) Encrypt
If you´ve been following the news for the last few years it will come as no surprise that the Justice Department is not a fan of the common man having access to encryption.
The report bemoans the current state of encryption and its ability to keep the government from gathering and analyzing traffic for criminal investigations. The word ´encryption´ comes up 17 times in the report, not once in a favorable light.
In the past several years, the Department has seen the proliferation of default encryption where the only person who can access the unencrypted information is the end user, the report reads.
The advent of such widespread and increasingly sophisticated encryption technologies that prevent lawful access poses a significant impediment to the investigation of most types of criminal activity.
Quantum computing revenue to hit $15 billion in 2028 due to AI, R&D, cybersecurity
Cracking the Crypto War
Zimmerman and friends: ´Are you listening? PGP is not broken´
However, PGP´s creator Phil Zimmerman, Protonmail´s Any Yenn, Enigmail´s Patrick Brunschwig, and Mailvelope´s Thomas Oberndörfer are still concerned that misinformation about the bug remains in the wild.
Yenn tried to refute the EFAIL “don´t use PGP” on May 25, and the four have followed up with this joint post.
The FBI now says encryption is good for you
Apple has faced an unequal battle in recent years as some lawmakers, the FBI, and regulators insist that the company create backdoors through which to access messages and other parts of its platform.
Apple and others have always insisted that there is no such thing as a safe backdoor, and that if one person has access, then it’s only a matter of time until others gain access, too.
Use encryption for all your communicationsNow, the FBI seems to agree.
In a recent security warning, the FBI and the US Infrastructure Security Agency have warned people to use encrypted apps such as iMessage and FaceTime for communication in order to retain security resilience against foreign hackers.
They also warn people to avoid using Rich Communication Services (RCS) when sharing messages between iPhones and Android devices, as RCS does not yet provide end-to-end encryption. (It is allegedly coming eventually, according to RCS standards body, the GSMA). What this means is that Android and iPhone users should probably consider installing Signal for cross platform communications, which does provide cross-platform encryption.
Apple also continues to invest in encryption technologies to protect its customers, and recently introduced upgraded protection against future high-level attacks that use quantum computers to break into your communications.
An about face?What’s noteworthy about the FBI warning is that the agency has been battling Apple for years to convince it to put backdoors into its encryption — ostensibly to enable law enforcement. Apple has resisted so far, arguing that once you leave any form of vulnerability in any platform you are automatically placing customers at risk.
Knowledge of these back doors will inevitably slip outside the control of law enforcement into the hands of nation state attackers and — eventually — criminal groups, making everybody far less secure and placing personal, commercial, and national interest at risk. Not only does such weakened encryption directly threaten personal privacy, it also undermines national security.
A former head of UK national security agency MI5 warned of this almost a decade ago, while Apple software Vice President Craig Federighi has similarly warned: “Weakening security makes no sense when you consider that customers rely on our products to keep their personal information safe, run their businesses or even manage vital infrastructure like power grids and transportation systems.”
All the same, demands that Apple weaken platform security by diluting device encryption have remained. But with the attack environment now in a red zone, the FBI issued its warning about encryption.
It comes after a CISA warning concerning ongoing attacks by China-based hackers.
So, what is the FBI saying?“Our suggestion, what we have told folks internally, is not new here: Encryption is your friend, whether it’s on text messaging or if you have the capacity to use encrypted voice communication,” said Jeff Greene, executive assistant director for cybersecurity at the CISA. “Even if the adversary is able to intercept the data, if it is encrypted, it will make it impossible [to use].”
The FBI also shared a recipe for security that should be on the desk of every IT purchaser. It recommends you use mobile devices that automatically receive timely OS updates, have encryption built in, and use multi-factor authentication for most collaboration tools. In other words, use a higher-end smartphone in preference to a low-end land-fill wannabe. Or, given that the best way to ensure security in your tech is to invest in secure products, use an iPhone, which has built-in encryption and is designed with a security-first agenda.
That focus on security likely reflects how Apple approaches the topic.
The next big warAfter all, it was almost a decade ago that Apple CEO Tim Cook warned: “I think some of the top people predict that the next big war is fought on cybersecurity. With hacking getting more and more sophisticated, the hacking community has gone from the hobbyist in the basement to huge, sophisticated companies that are essentially doing this, or groups of people or foreign agents inside and outside the United States. People are running huge enterprises off of hacking and stealing data.
“So yes, every software release we do, we get more and more secure,” he said at the time.
Now, at last, the FBI seems to agree that encryption makes us safer. We really should keep using it, and reject arguments against doing so.
You can follow me on social media! Join me on BlueSky, LinkedIn, Mastodon, and MeWe.
Orange Pi 5 Ultra
Microsoft says premature patch could make Windows Recall forget how to work
Microsoft has pinned down why some eager Windows Insiders could not persuade the Recall preview to save any snapshots. It's all down to a pesky non-security preview.…
Hesla a záložky ze Safari můžete mít i v Chromu, Edgi nebo Firefoxu. Apple pro ně má rozšíření
Mobilní Datovka 2.2.0
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- …
- následující ›
- poslední »