Agregátor RSS

Amber Rudd: The little people don´t need encryption

Security News - 27 min 19 sek zpět
An idiot speaks…
Kategorie: Aktuality

Facebook COO Sheryl Sandberg: Crypto ban won´t help trap terrorists

Security News - 27 min 19 sek zpět
Facebook´s chief operating officer Sheryl Sandberg has reiterated the social network´s position that weakening the encryption of messaging apps isn´t going to give governments what they want. Governments and law enforcement agencies are increasingly going public with their frustration that encryption prevents them accessing electronic messages.
Kategorie: Aktuality

True random numbers are here — what that means for data centers

Security News - 27 min 19 sek zpět
The Entropy Engine can deliver 350 Mbps of true random numbers—enough to give a data center enough random data to dramatically improve all cryptographic processes

For many decades, the term “random numbers” meant “pseudo-random numbers” to anyone who thought much about the issue and understood that computers simply were not equipped to produce anything that was truly random.

Manufacturers did what they could, grabbing some signals from the likes of mouse movement, keyboard activity, system interrupts, and packet collisions just to get a modest sampling of random data to improve the security of their cryptographic processes.
v And the bad guys worked at breaking the encryption.
We used longer keys and better algorithms.

And the bad guys kept at it. And life went on.

But something recently changed all that.
Kategorie: Aktuality

Quantum of encryption

Security News - 27 min 19 sek zpět
With computing power increasing faster than ever before, it´s possible to crack previously secure encryption, and with the advent of quantum computing, that possibility gets ever closer. So now you must ask: Is your encryption good enough?
Kategorie: Aktuality

Alice and Bob: A History Of The World’s Most Famous Couple

Security News - 27 min 19 sek zpět
Alice and Bob are the world’s most famous cryptographic couple. Since their invention in 1978, they have at once been called “inseparable,” and have been the subject of numerous divorces, travels, and torments. In the ensuing years, other characters have joined their cryptographic family. There´s Eve, the passive and submissive eavesdropper, Mallory the malicious attacker, and Trent, trusted by all, just to name a few.
Kategorie: Aktuality

Let´s harden Internet crypto so quantum computers can´t crack it

Security News - 27 min 19 sek zpět
Draft blends asymmetric public/private key encryption and one-time pad analogs.
In case someone manages to make a general purpose quantum computer one day, a group of IETF authors have put forward a proposal to harden Internet key exchange.

While only an “informational” document at this stage, what the authors describe is how to extend Internet Key Exchange v2 (RFC 7296*, IKEv2) to support a quantum-safe key exchange.
Kategorie: Aktuality

Autorem Voynichova rukopisu psaného neznámým jazykem je Jiří III. z Lichtenštejna

Security News - 27 min 19 sek zpět
Irena Hanzíková přeložila třetinu tzv. Voynichova rukopisu. Obsah ji vede k závěru, že autorem rukopisu je podle textu a s vědomím let, kdy vznikl, i z dalších indicií moravský šlechtic Jiří III. z Lichtenštejna, původem z Mikulova, tridentský biskup a římský kardinál.

Všimněte si ale pochybností (těch seriózněji formulovaných) v diskuzi k článku.
Kategorie: Aktuality

17 Security Tips for Smarter Smartphone Banking (Android)

Security News - 27 min 19 sek zpět
Dobré a přehledné rady jak zabezpečit svůj Smartphone(Android)pro využívání pro internetové bankovnictví.
Kategorie: Aktuality

Post-Quantum RSA

Security News - 27 min 19 sek zpět
Daniel J. Bernstein, Nadia Heninger, Paul Lou, and Luke Valenta: Post-Quantum RSA

Abstract: This paper proposes RSA parameters for which (1) key generation, encryption, decryption, signing, and verification are feasible on today´s computers while (2) all known attacks are infeasible, even assuming highly scalable quantum computers. As part of the performance analysis, this paper introduces a new algorithm to generate a batch of primes. As part of the attack analysis, this paper introduces a new quantum factorization algorithm that is often much faster than Shor´s algorithm and much faster than pre-quantum factorization algorithms. Initial pqRSA implementation results are provided.
Kategorie: Aktuality

End-to-end email encryption with no central point of attack

Security News - 27 min 19 sek zpět
A seamless, easy-to-use, and secure end-to-end encrypted business collaboration tool with no central point of attack is a holy grail for every business, and Boston-based security company PreVeil believes they have the right solution on hand.
Kategorie: Aktuality

The Ultimate Guide to SSL Inspection- Uncover Threats in SSL Traffic

Security News - 27 min 19 sek zpět
Encrypted traffic accounts for a large and growing percentage of all network traffic. While the adoption of SSL, and its successor, Transport Layer Security (TLS), should be cause for celebration – as encryption improves confidentiality and message integrity – it also puts organizations at risk. This is because hackers can leverage encryption to conceal their exploits from security devices that do not inspect SSL traffic.

How serious is the threat? According to a recent Gartner survey, “less than 20% of organizations with a firewall, an intrusion prevention system (IPS) or a unified threat management (UTM) appliance decrypt inbound or outbound SSL traffic.”1 This means that hackers can evade over 80% of companies’ network defenses simply by tunneling attacks in encrypted traffic.

To stop cyber attacks, organizations must gain insight into encrypted data, and to do this, they need a dedicated security platform that can decrypt inbound and outbound SSL traffic.
Kategorie: Aktuality

Cryptography: The codes that got away

Security News - 27 min 19 sek zpět
About new book:

The History and Mystery of the World´s Greatest Ciphers from Ancient Egypt to Online Secret Societies

Craig Bauer Princeton University Press: 2017.
Kategorie: Aktuality

Enigma: Why the fight to break Nazi encryption still matters

Security News - 27 min 19 sek zpět
A mystery inside an Enigma

The Enigma has a surprisingly understated design for being such a deadly tool. It could easily be mistaken for a typewriter with a few extra parts, housed in a plain wooden box.
Kategorie: Aktuality

E-Mail Encryption 2017 Global Market Outlook,Research,Trends and Forecast to 2020

Security News - 27 min 19 sek zpět
The report covers the present scenario and the growth prospects of the global e-mail encryption market for the period 2016-2020. To calculate the market size, the report considers the revenues generated from e-mail encryption solutions provided to organizations including large organizations, small and medium-sized businesses (SMBs), and government organizations for encrypting business e-mails.
Kategorie: Aktuality

Five Eyes nations stare menacingly at tech biz and its encryption

Security News - 27 min 19 sek zpět
US, UK, Australia, New Zealand and Canada mull leaning hard for access to your info.

Officials from the United States, the United Kingdom, Canada, Australia and New Zealand will discuss next month plans to force tech companies to break encryption on their products.

The so-called Five Eyes nations have a long-standing agreement to gather and share intelligence from across the globe. They will meet in Canada with a focus on how to prevent \"terrorists and organized criminals\" from \"operating with impunity ungoverned digital spaces online,\" according to Australian prime minister Malcolm Turnbull.\"

Viz také - When is ´not a backdoor´ just a backdoor? Australia´s struggle with encryption.

Dále: Backdoors, encryption and internet surveillance: Which way now?
Kategorie: Aktuality

XFree KWin

AbcLinuxu [zprávičky] - 1 hodina 1 min zpět
Martin Flöser představil na svém blogu projekt XFree KWin. Cílem projektu je rozběhnout správce oken KWin na Waylandu bez XWaylandu [reddit].
Kategorie: GNU/Linux & BSD

Opera si myslí, že ví, co chceme za programy, a tak vytvořila PC Apps Hub

Živě.cz - 1 hodina 34 min zpět
Na webu dnes najdete nepřeberné množství katalogů s aplikacemi, z těch českých třeba Stahuj, a tak si v norské Opeře řekli, že udělají další. Tedy tak trochu. Říkají mu Opera PC Apps Hub a má to být výběr toho nejlepšího a bezplatného s přihlédnutím k tomu, co vývojáři Opery sami ...
Kategorie: IT News

Sensitive client emails, usernames, passwords exposed in Deloitte hack

The Register - Anti-Virus - 1 hodina 40 min zpět
Oops, did someone forget to turn on 2FA?

Deloitte, one of the world's "big four" accountancy firms, has fallen victim to a cyberattack that compromised sensitive emails.…

Kategorie: Viry a Červi

Chris Vickery on Amazon S3 Data Leaks

Threatpost - 1 hodina 1 min zpět
Mike Mimoso talks to Chris Vickery of Upguard of the recent rash of Amazon S3 data leaks.
Kategorie: Hacking & Security

Chris Vickery on Amazon S3 Data Leaks

VirusList.com - 1 hodina 1 min zpět
Mike Mimoso talks to Chris Vickery of Upguard of the recent rash of Amazon S3 data leaks.
Kategorie: Viry a Červi
Syndikovat obsah