Agregátor RSS

Policie zatkla cizince, do bankomatu montovali ?te?ku karet

Security News - 17 min 8 sek zpět
Policisté v Praze zadrželi dva cizince t?sn? po tom, co do bankomatu nainstalovali skimmovací za?ízení s cílem dostat se k pen?z?m klient?. U zadržených muž? pak policisté zajistili i celou ?adu nástroj? k páchání této trestné ?innosti a vysíla?ky, informoval ve st?edu policejní mluv?í Jan Dan?k.
Kategorie: Aktuality

Jak tvo?it a pamatovat si hesla (2019)

Security News - 17 min 8 sek zpět
Užite?ný p?ísp?vek "14 Ways to Create a Secure Password in 2019" na stále pot?ebné téma jak vytvá?et a pamatovat si hesla od Jacka Forstera.
Kategorie: Aktuality

P?ehled kvalitních bezplatných bezpe?nostních program?

Security News - 17 min 8 sek zpět
25+ Free Security Tools That You Need to Start

P?ehled bezplatných silných antivirových a dalších bezpe?nostních program?, které vám mohou pomoci udržet vaše citlivé informace v bezpe?í.
Kategorie: Aktuality

How to encrypt email (Gmail, Outlook iOS, OSX, Android, Webmail)

Security News - 17 min 8 sek zpět
Email was one of the earliest forms of communication on the internet, and if you’re reading this you almost undoubtedly have at least one email address. Critics today decry the eventual fall of email, but for now it’s still one of the most universal means of communicating with other people that we have. One of the biggest problems with this cornerstone of electronic communication is that it isn’t very private. By default, most email providers do not provide the means to encrypt messages or attachments. This leaves email users susceptible to hackers, snoops, and thieves.

So you want to start encrypting your email? Well, let’s start by saying that setting up email encryption yourself is not the most convenient process. You don’t need a degree in cryptography or anything, but it will take a dash of tech savvy. We’ll walk you through the process later on in this article.

Alternatively, you can use an off-the-shelf encrypted email client. Tutanota is one such secure email service, with apps for mobile and a web mail client. It even encrypts your attachments and contact lists. Tutanota is open-source, so it can be audited by third parties to ensure it’s safe. All encryption takes place in the background. While we can vouch for Tutanota, it’s worth mentioning that there are a lot of email apps out there that claim to offer end-to-end encryption, but many contain security vulnerabilities and other shortcomings. Do your research before choosing an off-the-shelf secure email app.

If you’d prefer to configure your own email encryption, keep reading.
Kategorie: Aktuality

Crypto 2018 - August 19-23, 2018

Security News - 17 min 8 sek zpět
See Affiliated Events too.
Kategorie: Aktuality

Google: Security Keys Neutralized Employee Phishing

Security News - 17 min 8 sek zpět
Google has not had any of its 85,000+ employees successfully phished on their work-related accounts since early 2017, when it began requiring all employees to use physical Security Keys in place of passwords and one-time codes, the company told KrebsOnSecurity.

Security Keys are inexpensive USB-based devices that offer an alternative approach to two-factor authentication (2FA), which requires the user to log in to a Web site using something they know (the password) and something they have (e.g., a mobile device).
Kategorie: Aktuality

Crypto gripes, election security, and mandatory cybersec school: Uncle Sam´s cyber task force emits todo list for govt

Security News - 17 min 8 sek zpět
The US Department of Justice (DOJ) this week released the first report from its Cyber Digital Task Force – which was set up in February to advise the government on strengthening its online defenses.
The report [PDF], compiled by 34 people from six different government agencies, examines the challenges facing Uncle Sam´s agencies in enforcing the law and protecting the public from hackers. It also lays out what the government needs to do to thwart looming threats to its computer networks.

Let´s (not) Encrypt

If you´ve been following the news for the last few years it will come as no surprise that the Justice Department is not a fan of the common man having access to encryption.
The report bemoans the current state of encryption and its ability to keep the government from gathering and analyzing traffic for criminal investigations. The word ´encryption´ comes up 17 times in the report, not once in a favorable light.
In the past several years, the Department has seen the proliferation of default encryption where the only person who can access the unencrypted information is the end user, the report reads.
The advent of such widespread and increasingly sophisticated encryption technologies that prevent lawful access poses a significant impediment to the investigation of most types of criminal activity.
Kategorie: Aktuality

Quantum computing revenue to hit $15 billion in 2028 due to AI, R&D, cybersecurity

Security News - 17 min 8 sek zpět
The demand for quantum computing services will be driven by some process hungry research and development projects as well as by the emergence of several applications including advanced artificial intelligence algorithms, next-generation encryption, traffic routing and scheduling, protein synthesis, and/or the design of advanced chemicals and materials. These applications require a new processing paradigm that classical computers, bound by Moore’s law, cannot cope with. However, one should not expect quantum computers to displace their classical counterparts anytime soon.
Kategorie: Aktuality

Cracking the Crypto War

Security News - 17 min 8 sek zpět
Ray Ozzie thinks he has an approach for accessing encrypted devices that attains the impossible: It satisfies both law enforcement and privacy purists. (?)
Kategorie: Aktuality

Zimmerman and friends: ´Are you listening? PGP is not broken´

Security News - 17 min 8 sek zpět
EFAIL furore not over yet, even though it´s easy to fix.

However, PGP´s creator Phil Zimmerman, Protonmail´s Any Yenn, Enigmail´s Patrick Brunschwig, and Mailvelope´s Thomas Oberndörfer are still concerned that misinformation about the bug remains in the wild.

Yenn tried to refute the EFAIL “don´t use PGP” on May 25, and the four have followed up with this joint post.
Kategorie: Aktuality

Personal encryption usage is increasing

Security News - 17 min 8 sek zpět
According to a Venafi survey of 512 security professionals attending RSA Conference 2018, sixty-four percent of respondents say their personal encryption usage has increased due to recent geopolitical changes.
Kategorie: Aktuality

Wah, encryption makes policing hard, cries UK´s National Crime Agency

Security News - 17 min 8 sek zpět
Encryption is making it more difficult for law enforcement agencies to detect dangerous offenders, according the the National Crime Agency's (NCA) yearly assessment of serious organised crime in Britain.

Since 2010, communication service providers have migrated to encrypted services ´by default´, a process that accelerated following the Snowden disclosures, said the National Strategic Assessment of Serious and Organised Crime 2018
Kategorie: Aktuality

New law would stop Feds from demanding encryption backdoor

Security News - 17 min 8 sek zpět
US lawmakers from both major political parties came together on Thursday to reintroduce a bill that, if passed, would prohibit the American government from forcing tech product makers to undermine the security of their wares.
Kategorie: Aktuality

NIST starts down road toward IoT encryption

Security News - 17 min 8 sek zpět
The National Institute of Standards and Technology wants comments on the best way to design criteria to evaluate new encryption standards for small computing devices.

NIST will eventually ask researchers and cryptographers for algorithms that could be used to encrypt data on small, "constrained devices," such as sensors, RFID tags, industrial controllers and smart cards that are being incorporated into automobiles, internet-of-things devices, the smart grid and distributed control systems.

But first the agency needs to establish the requirements and evaluation criteria that will guide the review of the algorithms.
Kategorie: Aktuality

It was totally Samsung's fault that crims stole your personal info from a Samsung site, says Samsung-blaming Sprint

The Register - Anti-Virus - 1 hodina 18 min zpět
Just in case we've not made ourselves clear, Samsung screwed you over, adds Sprint

Sprint has told some of its subscribers that a piss-poor Samsung website exposed their personal details to the internet.…

Kategorie: Viry a Červi

High school students are enjoying a week of neuroscience experiments at WVU

Home AI - 2 hodiny 5 min zpět

MORGANTOWN, W.Va. – West Virginia University Department of Neuroscience has teamed up with Rockefeller Neuroscience Institute for the first …


Link to Full Article: Read Here

Kategorie: Transhumanismus

Let's open the Mystery Data Security Blunder box, and see what's inside today... Ah! Hotel reservations and more

The Register - Anti-Virus - 2 hodiny 12 min zpět
Public-facing insecure ElasticSearch silo found, reported, hidden from view

Internal hotel biz documents and guest bookings were exposed to everyone on the public internet from an unsecured database managed by tech provider AavGo, it is claimed.…

Kategorie: Viry a Červi

Global Deep Learning in Machine Vision Market Research Report 2018-2025|Key: MVTEC …

Home AI - 2 hodiny 40 min zpět

Global Deep Learning in Machine Vision Market is expected to reach USD 997.27 million by 2025 and is projected to register a healthy CAGR in the …


Link to Full Article: Read Here

Kategorie: Transhumanismus

Co bude s vaším sirotčím důchodem, když jste ukončili studium?

Lupa.cz - články - 2 hodiny 46 min zpět
[6 minut čtení] Pokud pobíráte sirotčí důchod, velmi záleží na tom, jakým způsobem jste studium ukončili a kam vedou vaše další kroky. Vliv na výplatu má někdy i to, jestli si přivyděláváte. Projděte si jednotlivé příklady. Pokud vám Česká správa sociálního zabezpečení posílá sirotčí důchod, může se v závislosti na tom, jak studujete či kdy jste studium ukončili, výplata měnit.
Kategorie: IT News
Syndikovat obsah