Linux Cryptography - Page 16
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
Researchers have discovered a serious weakness in virtually all websites protected by the secure sockets layer protocol that allows attackers to silently decrypt data that's passing between a webserver and an end-user browser.
At this year's Black Hat Conference, crypto expert Karsten Nohl of SRLabs demonstrated the degate tool that can be used to take a closer look at applications stored on smartcards, such as credit cards and SIM cards.
The ongoing furor over fake SSL certificates continued to dominate security headlines, while increasing SpyEye botnet activity and leaked patient health information also drew attention the week of Sept. 5.
The OpenSSH development team has announced the release of version 5.9 of its open source SSH (Secure Shell) implementation. Compared to the OpenSSH 5.8 release from 7 months ago, which was primarily a security update, the latest update includes a wider variety of changes including the addition of new SHA256-based HMAC (Hash-based Message Authentication Code) transport integrity modes.
Ever since security giant RSA was hacked last March, anti-virus researchers have been trying to get a copy of the malware used for the attack to study its method of infection. But RSA wasn
A team of researchers has discovered a first vulnerability in the AES encryption standard that shortens the algorithm's effective key length by two bits. This means that the usual key lengths of 128, 192 and 256 bits are reduced to 126, 190 and 254 bits.
A theme that appears anytime the cloud is discussed in the context of IT is security. The general direction of this concern is the prevention of unauthorized access to cloud-hosted data and apps. If the topic is pursued, rather than just acknowledged as an issue, it generally forks into two main threads: preventing access by outside parties (hackers, crackers, protesters, and the like) and preventing access by inside parties, such as unauthorized employees.
Truecrypt, is a free and open-source disk encryption software. In this post we will show you how to encrypt all your data using Truecrypt in 11 easy steps.
Security researchers have discovered a "timing attack" that creates a possible mechanism for a hacker to extract the secret key of a TLS/SSL server that uses elliptic curve cryptography (ECC).
AN INDEPENDENT insecurity researcher says there are multiple security vulnerabilities in the business social network Linkedin, due to the way it handles and transmits cookies over SSL.
Popular cloud storage service Dropbox is misleading users into thinking it is more secure than it really is, says a security researcher and academic, who has asked for the FTC to investigate.
As more applications turn to SSL to help keep users secure, they may also be inadvertently hampering the ability of enterprises to ensure malicious code and exploits are not slithering through network traffic from the endpoint.
One-third of security professionals who handle encryption don't understand self-encrypting hard disk drives. In particular, they're unsure whether the drives are better or worse than software-based encryption for preventing tampering, managing encryption, or handling authentication keys.
Here comes the fastest public-key algorithm that most people have never heard of: It's called NTRUEncrypt and this month was approved by the financial services standards body, the Accredited Standards Committee X9.
Toshiba has extended its range of 2.5-inch drives with hardware data encryption
Back in the mid 70s, the use of encryption in enterprises was pretty much unheard of. Soon companies started to introduce some encryption in limited instances, such as encoders on communication lines to encrypt financial transactions.
Every year or so, a crisis or three exposes deep fractures in the system that's supposed to serve as the internet's foundation of trust. In 2008, it was the devastating weakness in SSL, or secure sockets layer, certificates issued by a subsidiary of VeriSign.
This discussion about enterprise mobility is one of the five themes we will be focusing on at theVentureBeat Mobile Summit, on April 25-26. We
A long-known but little-discussed vulnerability in the modern Internet's design was highlighted yesterday by a report that hackers traced to Iran spoofed the encryption procedures used to secure connections to Google, Yahoo, Microsoft, and other major Web sites.