Agregátor RSS

Crypto 2018 - August 19-23, 2018

Security News - 28 min 12 sek zpět
See Affiliated Events too.
Kategorie: Aktuality

Google: Security Keys Neutralized Employee Phishing

Security News - 28 min 12 sek zpět
Google has not had any of its 85,000+ employees successfully phished on their work-related accounts since early 2017, when it began requiring all employees to use physical Security Keys in place of passwords and one-time codes, the company told KrebsOnSecurity.

Security Keys are inexpensive USB-based devices that offer an alternative approach to two-factor authentication (2FA), which requires the user to log in to a Web site using something they know (the password) and something they have (e.g., a mobile device).
Kategorie: Aktuality

Crypto gripes, election security, and mandatory cybersec school: Uncle Sam´s cyber task force emits todo list for govt

Security News - 28 min 12 sek zpět
The US Department of Justice (DOJ) this week released the first report from its Cyber Digital Task Force – which was set up in February to advise the government on strengthening its online defenses.
The report [PDF], compiled by 34 people from six different government agencies, examines the challenges facing Uncle Sam´s agencies in enforcing the law and protecting the public from hackers. It also lays out what the government needs to do to thwart looming threats to its computer networks.

Let´s (not) Encrypt

If you´ve been following the news for the last few years it will come as no surprise that the Justice Department is not a fan of the common man having access to encryption.
The report bemoans the current state of encryption and its ability to keep the government from gathering and analyzing traffic for criminal investigations. The word ´encryption´ comes up 17 times in the report, not once in a favorable light.
In the past several years, the Department has seen the proliferation of default encryption where the only person who can access the unencrypted information is the end user, the report reads.
The advent of such widespread and increasingly sophisticated encryption technologies that prevent lawful access poses a significant impediment to the investigation of most types of criminal activity.
Kategorie: Aktuality

Quantum computing revenue to hit $15 billion in 2028 due to AI, R&D, cybersecurity

Security News - 28 min 12 sek zpět
The demand for quantum computing services will be driven by some process hungry research and development projects as well as by the emergence of several applications including advanced artificial intelligence algorithms, next-generation encryption, traffic routing and scheduling, protein synthesis, and/or the design of advanced chemicals and materials. These applications require a new processing paradigm that classical computers, bound by Moore’s law, cannot cope with. However, one should not expect quantum computers to displace their classical counterparts anytime soon.
Kategorie: Aktuality

Cracking the Crypto War

Security News - 28 min 12 sek zpět
Ray Ozzie thinks he has an approach for accessing encrypted devices that attains the impossible: It satisfies both law enforcement and privacy purists. (?)
Kategorie: Aktuality

Zimmerman and friends: ´Are you listening? PGP is not broken´

Security News - 28 min 12 sek zpět
EFAIL furore not over yet, even though it´s easy to fix.

However, PGP´s creator Phil Zimmerman, Protonmail´s Any Yenn, Enigmail´s Patrick Brunschwig, and Mailvelope´s Thomas Oberndörfer are still concerned that misinformation about the bug remains in the wild.

Yenn tried to refute the EFAIL “don´t use PGP” on May 25, and the four have followed up with this joint post.
Kategorie: Aktuality

Personal encryption usage is increasing

Security News - 28 min 12 sek zpět
According to a Venafi survey of 512 security professionals attending RSA Conference 2018, sixty-four percent of respondents say their personal encryption usage has increased due to recent geopolitical changes.
Kategorie: Aktuality

Wah, encryption makes policing hard, cries UK´s National Crime Agency

Security News - 28 min 12 sek zpět
Encryption is making it more difficult for law enforcement agencies to detect dangerous offenders, according the the National Crime Agency's (NCA) yearly assessment of serious organised crime in Britain.

Since 2010, communication service providers have migrated to encrypted services ´by default´, a process that accelerated following the Snowden disclosures, said the National Strategic Assessment of Serious and Organised Crime 2018
Kategorie: Aktuality

New law would stop Feds from demanding encryption backdoor

Security News - 28 min 12 sek zpět
US lawmakers from both major political parties came together on Thursday to reintroduce a bill that, if passed, would prohibit the American government from forcing tech product makers to undermine the security of their wares.
Kategorie: Aktuality

NIST starts down road toward IoT encryption

Security News - 28 min 12 sek zpět
The National Institute of Standards and Technology wants comments on the best way to design criteria to evaluate new encryption standards for small computing devices.

NIST will eventually ask researchers and cryptographers for algorithms that could be used to encrypt data on small, "constrained devices," such as sensors, RFID tags, industrial controllers and smart cards that are being incorporated into automobiles, internet-of-things devices, the smart grid and distributed control systems.

But first the agency needs to establish the requirements and evaluation criteria that will guide the review of the algorithms.
Kategorie: Aktuality

Protect sensitive data with these five free encryption apps

Security News - 28 min 12 sek zpět
Mark Kaelin: Protecting customers´ personal data is vitally important to the future success of every organization. Encrypting that data with one of these apps is a good place to start.
Numerous high-profile events in 2017 and early 2018 have made it abundantly clear that all enterprises and government agencies are responsible and liable for the protection of personal data collected from customers and clients—no exceptions. New regulations, such as the GDPR, which goes into effect May 25, 2018, will back those expectations of protection with substantial penalties and fines for the noncompliance.
To avoid potential fines, organizations need to demonstrate initiative by establishing measurable security protocols that protect collected personal data. One of most common methods for protecting stored data is encryption.
Kategorie: Aktuality

Některé převodové tabulky pro agenturní systémy z doby studené války

Security News - 28 min 12 sek zpět
Různé verze tabulky DEIN STAR, které byly používány agenty BND v NDR do roku 1989 lze vyhledat na tomto zajímavém webu.
Kategorie: Aktuality

A deep dive into blockchain and Bitcoin

Security News - 28 min 12 sek zpět
In (In)secure Magazine Issue 27, March 2018.

Blockchain technology promises to solve many complex problems across different business sectors and industries, and Bitcoin is breaking value records seemingly every hour. But many don’t understand how the two really work, and use the two words interchangeably as if they were synonymous.
One important thing to remember is that blockchain can exist without Bitcoin, but Bitcoin cannot exist without a blockchain.
Bitcoin is a digital currency that was created in 2009. Only 21 million Bitcoins can ever be created (mined), and it is estimated that the last coin will be produced in 2140.
It is exchanged on a decentralized, peer-to-peer network, meaning that there is no central server or authority (i.e., a central bank) that regulates it. In the beginning, the Bitcoin network was operated by volunteers who had a full Bitcoin protocol stack installed on their private computers. However, the network’s operation has mostly been taken over by specialized data centers.
Bitcoin operates on a cryptographic protocol, is fully transparent and open source. As it’s not backed by a real authority, the health of the system depends entirely on the trust people have in it. The value of Bitcoin is determined by the amount people are willing to pay for it.
Kategorie: Aktuality

Google expands work in quantum computing with 72-qubit Bristlecone processor

Security News - 28 min 12 sek zpět
Google has announced the release of the 72-qubit square array Bristlecone quantum processor, which the company believes is adequate to demonstrate quantum supremacy.

Bristlecone is the evolution of Google´s prior 9-qubit linear quantum processor, which had error rates of 1% for readout, 0.1% for single-qubit gates, and 0.6% for two-qubit gates.
Kategorie: Aktuality

Valve představilo nový Steam Play s integrovaným forkem Wine s názvem Proton

AbcLinuxu [zprávičky] - 1 hodina 16 min zpět
Pokud hra na Steamu podporuje Steam Play, lze ji koupit jednou, například ve Windows, a hrát kdekoli, například také v Linuxu. Společnost Valve včera představila novou beta verzi Steam Play. Hlavní novinkou je integrovaný fork Wine s názvem Proton umožňující v Linuxu přímo ze Steamu hrát hry dosud běžící pouze ve Windows.
Kategorie: GNU/Linux & BSD

NVIDIA GeForce RTX 2080 Ti, 2080 a 2070

AbcLinuxu [zprávičky] - 2 hodiny 44 min zpět
Společnost NVIDIA oficiálně představila novou řadu GeForce RTX 20 svých grafických karet postavených na architektuře NVIDIA Turing a modely 2080 Ti, 2080 a 2070. Referenční Founders Edition karty lze předobjednat za 32 700, 21 999 a 16 400 Kč.
Kategorie: GNU/Linux & BSD

MindMeld: In the Beginning – iBook Introduction on Artificial Intelligence

Home AI - 3 hodiny 5 min zpět

This is part of a series and introduction to artificial intelligence (AI) in the new ibook MindMeld: CEO & AI – Merging and Mental. The complete ibook …


Link to Full Article: Read Here

Kategorie: Transhumanismus

Why you should think twice about AI solutions

Home AI - 3 hodiny 17 min zpět

But whether you're talking about especially powerful technologies like deep learning algorithms, or more general AI software, traditional approaches …


Link to Full Article: Read Here

Kategorie: Transhumanismus

Which GPU(s) to Get for Deep Learning

Home AI - 4 hodiny 20 min zpět

You want a cheap high performance GPU for deep learning? In this blog post I will guide through the choices, so you can find the GPU which is best …


Link to Full Article: Read Here

Kategorie: Transhumanismus
Syndikovat obsah