Agregátor RSS

What cryptographic key generation needs is a good source of entropy

Security News - 28 min 1 sek zpět
… algorithms, we know, are not always correctly implemented …
Kategorie: Aktuality

What is SSL/TLS? (And why it’s time to upgrade to TLS 1.3)

Security News - 28 min 1 sek zpět
The TLS protocol encrypts internet traffic of all types, making secure internet communication (and therefore internet commerce) possible. Here are the basics of how it works and what comes next.
Kategorie: Aktuality

Skype users are finally getting end-to-end encryption

Security News - 28 min 1 sek zpět
The move was announced on Thursday by Open Whisper Systems, the software organization behind the open source Signal Protocol, which has been implemented by Microsoft to offer the feature.

The option, named Private Conversations, is currently being tested by Skype Insiders and has some temporary limitations.
Kategorie: Aktuality

Germany´s proposed anti-cryptography bill: backdoors and hack-backs

Security News - 28 min 1 sek zpět
This week, German authorities will introduce a law that will allow law enforcement agencies to order companies to insert back doors into their products to assist in law enforcement queries; the law is backed by Thomas de Maizière, Germany´s Interior Minister.

Viz také : Germany Preparing Backdoor Law.
Kategorie: Aktuality

F5 DROWNing, not waving, in crypto fail

Security News - 28 min 1 sek zpět
If you're an F5 BIG-IP sysadmin, get patching: there's a bug in the company's RSA implementation that can give an attacker access to encrypted messages.
Kategorie: Aktuality

Will quantum computing break the Internet?

Security News - 28 min 1 sek zpět
While the principles of quantum computing are certainly complex, at a high level, the risk from quantum computing can be understood fairly quickly. Unlike a digital computer bit, which can only be a zero or one, a quantum bit, or qubit, can be a zero, one, and everything in between – all at the same time. For those who are not quantum physicists, this can be mind-blowing, but the result is that a quantum computer can offer such a huge speed-up to solving certain problems, that some problems previously thought to be nearly impossible to solve may soon be solved.
Kategorie: Aktuality

Your Browser Could Be Mining Cryptocurrency For a Stranger

Security News - 28 min 1 sek zpět
There´s something new to add to your fun mental list of invisible internet dangers. Joining classic favorites like adware and spyware comes a new, tricky threat called “cryptojacking,” which secretly uses your laptop or mobile device to mine cryptocurrency when you visit an infected site.
Kategorie: Aktuality

EU: No encryption backdoors but, eh, let´s help each other crack that crypto, oui? Ja?

Security News - 28 min 1 sek zpět
The European Commission has proposed that member states help each other break into encrypted devices by sharing expertise around the bloc.

In an attempt to tackle the rise of citizens using encryption and its effects on solving crimes, the commission decided to sidestep the well-worn, and well-ridiculed, path of demanding decryption backdoors in the stuff we all use.

Instead, the plans set out in its antiterrorism measures on Wednesday take a more collegiate approach – by offering member states more support when they actually get their hands on an encrypted device.
Kategorie: Aktuality

Hacknite digitálny podpis Kaliňáka. Firma vypísala odmenu

Security News - 28 min 1 sek zpět
Odmenu 1337 eur v piatok vypísala IT firma Hacktrophy za odhalenie podrobností o elektronickom podpise ministra vnútra Roberta Kaliňáka.
Urobila tak po tom, keď sám minister verejne vyzval k „hacknutiu“ svojho občianskeho preukazu s čipom, ktorý podľa oznámenia vedcov z Brna obsahuje vážne bezpečnostné riziko.

Viz také:
Kategorie: Aktuality

KRACK WPA2 protocol Wi-Fi attack: How it works and who\'s at risk

Security News - 28 min 1 sek zpět
A vulnerability in the WPA2 protocol used in secured Wi-Fi networks allows hackers to force devices to install arbitrary encryption keys. Here are the details of how the attack works.
Kategorie: Aktuality

Amber Rudd: The little people don´t need encryption

Security News - 28 min 1 sek zpět
An idiot speaks…
Kategorie: Aktuality

Facebook COO Sheryl Sandberg: Crypto ban won´t help trap terrorists

Security News - 28 min 1 sek zpět
Facebook´s chief operating officer Sheryl Sandberg has reiterated the social network´s position that weakening the encryption of messaging apps isn´t going to give governments what they want. Governments and law enforcement agencies are increasingly going public with their frustration that encryption prevents them accessing electronic messages.
Kategorie: Aktuality

True random numbers are here — what that means for data centers

Security News - 28 min 1 sek zpět
The Entropy Engine can deliver 350 Mbps of true random numbers—enough to give a data center enough random data to dramatically improve all cryptographic processes

For many decades, the term “random numbers” meant “pseudo-random numbers” to anyone who thought much about the issue and understood that computers simply were not equipped to produce anything that was truly random.

Manufacturers did what they could, grabbing some signals from the likes of mouse movement, keyboard activity, system interrupts, and packet collisions just to get a modest sampling of random data to improve the security of their cryptographic processes.
v And the bad guys worked at breaking the encryption.
We used longer keys and better algorithms.

And the bad guys kept at it. And life went on.

But something recently changed all that.
Kategorie: Aktuality

Quantum of encryption

Security News - 28 min 1 sek zpět
With computing power increasing faster than ever before, it´s possible to crack previously secure encryption, and with the advent of quantum computing, that possibility gets ever closer. So now you must ask: Is your encryption good enough?
Kategorie: Aktuality

Alice and Bob: A History Of The World’s Most Famous Couple

Security News - 28 min 1 sek zpět
Alice and Bob are the world’s most famous cryptographic couple. Since their invention in 1978, they have at once been called “inseparable,” and have been the subject of numerous divorces, travels, and torments. In the ensuing years, other characters have joined their cryptographic family. There´s Eve, the passive and submissive eavesdropper, Mallory the malicious attacker, and Trent, trusted by all, just to name a few.
Kategorie: Aktuality

Placatozemec Mike Hughes oznámil nové datum startu své rakety. Chce dokázat, že Země není kulatá

Živě.cz - 58 min 58 sek zpět
V listopadu loňského roku jsme vás informovali o tom, že úřady znemožnily placatozemci Mikeovi Hughesovi vznést se v jeho podomácku vyrobené raketě nad Mohavskou poušť. Agentura Bureau of Land Management (BLM) mu totiž nevydala povolení k provedení tohoto bizarního experimentu na veřejném ...
Kategorie: IT News

Specifikace Intel Coffee Lake-H v čele s Core i9-8950HK na 4,8GHz

CD-R server - 58 min 58 sek zpět
Intel toho chystá poměrně hodně a některé produkty dokonce už příští měsíc. Postupně se tak odhalují specifikace připravovaných mobilních procesorů Coffee Lake-H, kde kromě klasických Core bude i Xeon. Známe také ceny dalších Coffee Lake-S procesorů.
Kategorie: IT News

Apple Homepod se začne prodávat 9. února. Zatím jen ve třech státech

Živě.cz - 1 hodina 30 min zpět
Se zpožděním asi dvou měsíců začne Apple na začátku února prodávat svůj chytrý reproduktor Homepod. Ještě před spuštěním prodejů jej budou moci zájemci předobjednat od 26. ledna. Zatím však pouze ve Spojených státech, Spojeném království a Austrálii. Cena je stanovena na 349 dolarů. Vedle toho, ...
Kategorie: IT News

Konečně nástupce pro Macbook Air: Apple na letošek plánuje nový levný notebook

Živě.cz - 1 hodina 33 min zpět
Apple zanedbává nejlevnější Macy jak z kategorie stolních počítačů (Mac mini), tak notebooků (Macbook Air). Ve druhé polovině tohoto roku bychom se však mohli dočkat nástupce nejlevnějšího Macbooku. Zprávy přinesl web Digitimes s odkazem na zdroje mezi dodavateli displejů. Nový Macbook by měl ...
Kategorie: IT News

Expert Interview: Securing Your Third-Party Vendor Network

InfoSec Institute Resources - 1 hodina 45 min zpět

One of the most complex information security challenges is ensuring a proper level of protection when a third-party is involved. In most cases, there is no direct control over the vendor infrastructure. This means we must rely on contracts and/or agreements and, in the end, trust our partners will follow defined security requirements. Also, since […]

The post Expert Interview: Securing Your Third-Party Vendor Network appeared first on InfoSec Resources.

Expert Interview: Securing Your Third-Party Vendor Network was first posted on January 23, 2018 at 8:13 am.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security
Syndikovat obsah