Agregátor RSS

Cracking the Crypto War

Security News - 16 min 16 sek zpět
Ray Ozzie thinks he has an approach for accessing encrypted devices that attains the impossible: It satisfies both law enforcement and privacy purists. (?)
Kategorie: Aktuality

Zimmerman and friends: ´Are you listening? PGP is not broken´

Security News - 16 min 16 sek zpět
EFAIL furore not over yet, even though it´s easy to fix.

However, PGP´s creator Phil Zimmerman, Protonmail´s Any Yenn, Enigmail´s Patrick Brunschwig, and Mailvelope´s Thomas Oberndörfer are still concerned that misinformation about the bug remains in the wild.

Yenn tried to refute the EFAIL “don´t use PGP” on May 25, and the four have followed up with this joint post.
Kategorie: Aktuality

Personal encryption usage is increasing

Security News - 16 min 16 sek zpět
According to a Venafi survey of 512 security professionals attending RSA Conference 2018, sixty-four percent of respondents say their personal encryption usage has increased due to recent geopolitical changes.
Kategorie: Aktuality

Wah, encryption makes policing hard, cries UK´s National Crime Agency

Security News - 16 min 16 sek zpět
Encryption is making it more difficult for law enforcement agencies to detect dangerous offenders, according the the National Crime Agency's (NCA) yearly assessment of serious organised crime in Britain.

Since 2010, communication service providers have migrated to encrypted services ´by default´, a process that accelerated following the Snowden disclosures, said the National Strategic Assessment of Serious and Organised Crime 2018
Kategorie: Aktuality

New law would stop Feds from demanding encryption backdoor

Security News - 16 min 16 sek zpět
US lawmakers from both major political parties came together on Thursday to reintroduce a bill that, if passed, would prohibit the American government from forcing tech product makers to undermine the security of their wares.
Kategorie: Aktuality

NIST starts down road toward IoT encryption

Security News - 16 min 16 sek zpět
The National Institute of Standards and Technology wants comments on the best way to design criteria to evaluate new encryption standards for small computing devices.

NIST will eventually ask researchers and cryptographers for algorithms that could be used to encrypt data on small, "constrained devices," such as sensors, RFID tags, industrial controllers and smart cards that are being incorporated into automobiles, internet-of-things devices, the smart grid and distributed control systems.

But first the agency needs to establish the requirements and evaluation criteria that will guide the review of the algorithms.
Kategorie: Aktuality

Protect sensitive data with these five free encryption apps

Security News - 16 min 16 sek zpět
Mark Kaelin: Protecting customers´ personal data is vitally important to the future success of every organization. Encrypting that data with one of these apps is a good place to start.
Numerous high-profile events in 2017 and early 2018 have made it abundantly clear that all enterprises and government agencies are responsible and liable for the protection of personal data collected from customers and clients—no exceptions. New regulations, such as the GDPR, which goes into effect May 25, 2018, will back those expectations of protection with substantial penalties and fines for the noncompliance.
To avoid potential fines, organizations need to demonstrate initiative by establishing measurable security protocols that protect collected personal data. One of most common methods for protecting stored data is encryption.
Kategorie: Aktuality

Některé převodové tabulky pro agenturní systémy z doby studené války

Security News - 16 min 16 sek zpět
Různé verze tabulky DEIN STAR, které byly používány agenty BND v NDR do roku 1989 lze vyhledat na tomto zajímavém webu.
Kategorie: Aktuality

A deep dive into blockchain and Bitcoin

Security News - 16 min 16 sek zpět
In (In)secure Magazine Issue 27, March 2018.

Blockchain technology promises to solve many complex problems across different business sectors and industries, and Bitcoin is breaking value records seemingly every hour. But many don’t understand how the two really work, and use the two words interchangeably as if they were synonymous.
One important thing to remember is that blockchain can exist without Bitcoin, but Bitcoin cannot exist without a blockchain.
Bitcoin is a digital currency that was created in 2009. Only 21 million Bitcoins can ever be created (mined), and it is estimated that the last coin will be produced in 2140.
It is exchanged on a decentralized, peer-to-peer network, meaning that there is no central server or authority (i.e., a central bank) that regulates it. In the beginning, the Bitcoin network was operated by volunteers who had a full Bitcoin protocol stack installed on their private computers. However, the network’s operation has mostly been taken over by specialized data centers.
Bitcoin operates on a cryptographic protocol, is fully transparent and open source. As it’s not backed by a real authority, the health of the system depends entirely on the trust people have in it. The value of Bitcoin is determined by the amount people are willing to pay for it.
Kategorie: Aktuality

Google expands work in quantum computing with 72-qubit Bristlecone processor

Security News - 16 min 16 sek zpět
Google has announced the release of the 72-qubit square array Bristlecone quantum processor, which the company believes is adequate to demonstrate quantum supremacy.

Bristlecone is the evolution of Google´s prior 9-qubit linear quantum processor, which had error rates of 1% for readout, 0.1% for single-qubit gates, and 0.6% for two-qubit gates.
Kategorie: Aktuality

Crypto-gurus: Which idiots told the FBI that Feds-only backdoors in encryption are possible?

Security News - 16 min 16 sek zpět
Four cryptography experts have backed a US Senator´s campaign to force the FBI to explain how exactly a Feds-only backdoor can be added to strong and secure encryption.

The four are: Stanford professor Martin Hellman, of Diffie-Hellman fame and who helped invent the foundations of today´s crypto systems; Columbia professor and USENET co-creator Steve Bellovin; top cryptographer Paul Kocher; and information security guru Bruce Schneier.

All four this week signed a letter (link in article) to Senator Ron Wyden (D-OR) applauding his "effort to find out with whom the bureau has been consulting and which cryptographic experts believe an exceptional access system can be built securely."
Kategorie: Aktuality

Report finds little being done about security threat posed by quantum computing

Security News - 16 min 16 sek zpět
A report, conducted by the Quantum Safe Security Working Group (QSS WG) within the Cloud Security Alliance (CSA), looks to assess the overall awareness and understanding of quantum security risk and is part of the group's larger effort to develop a future framework for addressing quantum computing threats.
Kategorie: Aktuality

18 Cryptography Attacks to Watch Out For

Security News - 16 min 16 sek zpět
Cryptanalysis is the study of ciphertext, ciphers and cryptosystems with the aim of understanding how they work and finding and improving techniques for defeating or weakening them. For example, cryptanalysts seek to decrypt ciphertexts without knowledge of the plaintext source, encryption key or the algorithm used to encrypt it; cryptanalysts also target secure hashing, digital signatures and other cryptographic algorithms.
Kategorie: Aktuality

Cryptographic Hashes: What They Are, and Why You Should be Friends

Security News - 16 min 16 sek zpět
Description of cryptographic hashes and practical examples of how to calculate them.
Kategorie: Aktuality

Threat Hunting for Suspicious Registry and System File Changes

InfoSec Institute Resources - 2 hodiny 55 min zpět

Information security professionals are normally tasked with hunting threats that have been detected on their respective networks. What happens when you think that your network is under attack, but you’re not quite sure where the malware is or what they will do next? This article will detail how to threat hunt on your network by […]

The post Threat Hunting for Suspicious Registry and System File Changes appeared first on InfoSec Resources.

Threat Hunting for Suspicious Registry and System File Changes was first posted on July 20, 2018 at 5:51 pm.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security

Threat Hunting for DDoS Activity and Geographic Irregularities

InfoSec Institute Resources - 3 hodiny 2 min zpět

Introduction So there you are, sitting at your desk at the organization where you work as an information security professional. You are performing your usual monitoring duties when you notice that you have a high volume of network traffic coming from a part of the world that your organization does not do business with. This […]

The post Threat Hunting for DDoS Activity and Geographic Irregularities appeared first on InfoSec Resources.

Threat Hunting for DDoS Activity and Geographic Irregularities was first posted on July 20, 2018 at 5:44 pm.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security

The Current Job Outlook for Threat Hunters

InfoSec Institute Resources - 3 hodiny 35 min zpět

Introduction Demand for cybersecurity professionals is on the rise, and even specialized niche positions are seeing an increase in popularity. This makes threat hunting an especially sought-after job role, particularly in big corporations that are looking to identify and neutralize threats that are not easily detected by traditional security measures. This ensures that they keep […]

The post The Current Job Outlook for Threat Hunters appeared first on InfoSec Resources.

The Current Job Outlook for Threat Hunters was first posted on July 20, 2018 at 5:11 pm.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security

Událo se v týdnu 29/2018

AbcLinuxu [články] - 3 hodiny 45 min zpět
Ucelený přehled článků, zpráviček a diskusí za minulých 7 dní.
Kategorie: GNU/Linux & BSD

Komiks: buďme racionální

ROOT.cz - 3 hodiny 46 min zpět
[čtení do minuty] Čísla jsou přirozená, celá, reálná, racionální, iracionální i imaginární. Nula sice sem tam trochu dělá potíže, ale nic, co bychom z definice nemohli vyřešit. Ale dejte pár čisel dohromady a nastane mazec.
Kategorie: GNU/Linux & BSD
Syndikovat obsah