Linux Cryptography - Page 17
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
Alternative tokenless 2FA technologies may offer much greater levels of security, especially in light of the recent news that hackers have stolen data related to RSA secure tokens
According to Tor developer Jacob Appelbaum and a blog posting by the Mozilla Foundation, the Comodo SSL Certification Authority may have been compromised. As a consequence, criminals apparently obtained nine certificates for web sites that already existed, including addons.mozilla.org.
API requests for Google Documents List, Google Spreadsheets, and Google Sites will be required to use secure sockets layer connections.
Vulnerabilities in implementations of the STARTTLS protocol for establishing an encrypted TLS connection could allow commands to be injected into a connection. According to a description by the discoverer of the problem, Postfix developer Wietse Venema, the key point is that commands are injected into the connection before it has been secured/encrypted, but are only executed once the secure connection has been established.
The most secure P2PE option is to replace existing payment terminals with newer hardware devices offering built-in encryption capabilities. With encryption at the read head, all mag stripe data is encrypted on the hardware terminal itself as soon as the consumer swipes his or her card. No readable data ever leaves the unit, eliminating the risk of theft as it traverses the merchant network. This strategy completely defuses the threat of online attacks.
What's "pervasive memory scraping" and why is it considered by SANS Institute security researchers to be among the most dangerous attack techniques likely to be used in coming the coming year?
Florian Yanez, manager of technical systems for Helzberg Diamonds, is among those attending RSA Conference 2011. CSO recently caught up with him for a discussion on his company's efforts to adopt tokens as a way to address PCI DSS' rules on stored customer data.
Researchers have found a cheaper, faster way to process SSL/TLS with off-the-shelf hardware, a development that could let more Web sites shut down cyber threats posed by the likes of the Firesheep hijacking tool.
OpenSSH 5.7 has just been released. OpenSSH is a 100% complete SSH protocol version 1.3, 1.5 and 2.0 implementation and includes sftp client and server support. Read on for a description of the improvements, including Elliptic Curve Cryptography, sftp performance improvements, and much more.
A hacker claims he's used Amazon's cloud services to bust open SHA-1, a wireless network security standard, and he says he'll be demonstrating his process at an upcoming Black Hat get-together. Malicious hackers could quickly set up brute-force attack systems using the cloud, but critics say real-world password cracks might not come so easily.
Federal restrictions will be relaxed on the export of open-source software that incorporates strong encryption, the US government announced on Friday in a lengthy disclosure. The effect of the changes announced in the US Federal Register is that cryptography software now may be exported to Cuba, Iran, North Korea, Syria, and Sudan as long as the source code from which it was derived is already
Use of the Domain Name System Security Extensions (DNSSEC) specifications for securing domain names increased by 340% from 2009 to 2010. Even so, only 0.02% of Internet zones are now being signed with DNSSEC, and 23% of those are using expired signatures.
Google has begun shipping a feature called False Start in its Chrome browser to speed up secure communications. False Start essentially cuts out one set of the back-and-forth conversation needed to set up a secure channel between a Web browser and Web pages.
Giesecke & Devrient (G&D) is introducing a new microSD card to prevent cell phone tapping. The Mobile Security Card VE 2.0 contains a cryptocontroller which encrypts cell phone conversations and securely authenticates the user. The microSD card was developed by Giesecke & Devrient Secure Flash Solutions (G&D SFS), a joint venture of G&D and Phison Electronics.
Recently, I wanted to investigate when and how A5/2 has been withdrawn from both GSM networks and GSM phones alike. Unfortunately there was no existing article discussing this history online, so I went through dozens of meeting reports and other documents that I could find online to recover what had happened.
Red Hat security team rates the vulnerability 'important'. The OpenSSL server has now been patched to fix a critical flaw which could be used to remotely execute code or cause an application to crash.
Calling it a "nuclear-powered bulldozer", yesterday, Amazon announced and blogged about its newest cloud infrastructure service, the "Cluster GPU Instance", which delivers supercomputer calculation power for as little as $2.10 per hour. The new instance type employs the same NVIDIA Tesla processor used in three of the five fastest supercomputers.
New Ponemon Institute study commissioned by Symantec finds 84 percent of U.S. organizations either deploying encryption or in the process of doing so. Most U.S. organizations are currently encrypting data or are in the process of doing so, and the No. 1 driver for this is compliance.
Quantum cryptography has been around since the 1980's but up until now only very small packets of information have been able to be encrypted at one time. Now a breakthrough that identifies the angle and rotation of photon particles is taking this technology to the next level.
An open-source Firefox extension called Firesheep has shined a spotlight on just how insecure it is to use unprotected WiFi networks. It's widely known that unprotected WiFi networks make sensitive data readily available for anyone with the technical skill necessary to find it, as demonstrated by Google's four-year Street View WiFi data gathering odyssey.