Linux Cryptography - Page 18
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
The Electronic Frontier Foundation (EFF) reports that it has filed lawsuits against three agencies of the US Department of Justice demanding the release of documents justifying the need for stronger internet surveillance measures.
Public-key cryptography is widely used to secure online transactions. The math behind the technology was devised by U.K. Government Communications Headquarters scientists in the late 1960s and early 1970s.
Public key cryptography is widely used to secure online transactions. The maths behind the technology was invented by UK Government Communications Headquarters scientists in the late 1960s and early 1970s.
On the new MysteryTwister C3 web site, crypto fans can practice cracking various encryption mechanisms. Jointly created by the German universities of Siegen, Bochum and Duisburg-Essen, the site currently offers 27 challenges organised into four levels of difficulty.
At the 2010 Hacker Halted Conference in Miami on October 13, 2010, SECNAP Network Security will demonstrate the ease with which cyber sniffers, eavesdroppers and hackers can intercept email messages, despite widespread user trust that email messages are private and secure.
The PCI Security Standards Council (PCI SSC) issued its first guidance document outlining the point-to-point encryption market, warning merchants of the possibility of vendor lock-in and calling current implementations too immature to properly evaluate.
I was drawn to security in the early 90s during the crypto battle against the U.S. government, which was trying to force companies to adopt broken encryption with built in backdoors, like the failed Clipper Chip. Fortunately, the crypto wars were won by the side of reason, not least because of activists hoarding crypto technology in offshore locations.
As usual, the Free/Open Source software world provides the best security utilities for Windows, and for Linux and Mac as well. Eric Geier rounds up four encryption utilities for both local and network storage.
Encryption is hot. Perhaps that's because its been around so long it's no longer seen as a black art. Or perhaps security issues have grown so prevalent, everyone wants some sort of encryption as a truly secure way of stopping the pain of those problems.
On Friday, in the Bethel Methodist Chapel in Angelsey, the funeral was held of Gareth Williams. In life, he was a mathematician and an encryption specialist so highly regarded that he was seconded from GCHQ in Cheltenham to work at MI6 in London.
Typically, implementing two factor authentication means buying tokens or smart cards for all of your users. This can be expensive (from what I have seen $50/user is typical in smaller deployments) and it is only manageable for users with whom you have an existing relationship (employees, in some cases customers).
Flaws in the way web applications handle encrypted session cookies might leave online banking accounts open to attack. The security risk stems from a cryptographic weakness in web applications developed using Microsoft's ASP.Net framework.
Norwegian computer scientists have perfected a laser-based attack against quantum cryptography systems that allows them to eavesdrop on communications without revealing their presence.
Quantum cryptography is absolutely unbreakable, as it relies on the laws of physics to rat out eavesdroppers. But like other encryption methods, it is sometimes only as good as the users and their hardware.
With Visa releasing its tokenization best practices guide earlier this summer, security professionals and encryption vendors have debated the strengths and weaknesses of the guide. As one of the most debated topics in encryption-land, tokenization still has a long way to go before it achieves any kind of true standardization of best practices.
OpenSSH 5.6 has just been released. It will be available from the mirrors listed at http://http://www.openssh.com// shortly. OpenSSH is a 100% complete SSH protocol version 1.3, 1.5 and 2.0 implementation and includes sftp client and server support.
In this video from the OWASP AppSec Research conference in Sweden, security researcher Ivan Ristic of Qualys discusses practical methods for breaking SSL.
Linux Full Disk Encryption (LFDE) is a tool designed to provide Linux with a means to do true full disk encryption (FDE).
Lots of code excitement will spring from the Black Hat hacker conference this week, but already a huge controversy is erupting: Black Hat's founder thinks SSL--the security code making much of online commerce safe--is broken.
Though encryption is a strong way to safeguard passwords, personal information, and other sensitive data, it can be confusing due to the acronyms and technobabble that surround the topic. Many encryption utilities--such as the BitLocker feature in Windows 7 Ultimate, or the Rohos Mini Drive utility for protecting info on a thumb drive--are available.