Pakistan Hit By Targeted Attack Out Of India
Another reminder that cyberespionage isn't all about China targeting the U.S.: Researchers have discovered a family of information-stealing malware targeting Pakistan that appears to originate out of India.
Polluting Password Files Can Make Attacks Detectable: Researchers
By adding a large number of fake entries, or "honeywords," to the password database, researchers believe they can better detect attacks.
Wed May 15, 2013
Ephemeral: Encrypted Temporary Files ======== Ephemeral is a library that adds an encryption layer on top of python's standard ```tempfile``` module.
Tue May 14, 2013
A Polynomial Time Version of LLL With Deep Insertions
To insert individual citation into a bibliography in a word-processor, select your preferred citation style below and drag-and-drop it into the document.
New SPYRUS Patents Transparently Upgrade Legacy Security Solutions...
SPYRUS, Inc. announced today that Israeli patent 198362, "Method and System for Deploying Advanced Cryptographic Algorithms," has been issued to the company.
Should We Abandon Digital Certificates, Or Learn to Use Them Effectively?
A frightening trend is observable in the advance of targeted attacks. That is the realization on the part of attackers of the value of credentials; be they username password pairs, strong authentication tokens, or digital certificates.
Mon May 13, 2013
The Code Project
OTP (One Time Password) Demystified - Part 1
At the beginning of 2004, I was working with a small team of Gemplus on the EAP-SIM authentication protocol.
Dear hacker: Please help us eavesdrop on our customers
Mobily, a Saudi Arabian telecommunications company with 4.8 million subscribers, is working on a way to intercept encrypted data sent over the Internet by Twitter, Viber, and other mobile apps, a security researcher said Monday.
Startup Gridcom uses photons and quantum physics for smart grid security
Can quantum computing be the key to a much safer power grid? A California startup, GridCOM, plans to show just how quantum encryption could be a nearly fail-proof shield against cybersecurity breaches.
Say a final goodbye to SHA-1
Due to recent attacks on the SHA-1 hash function specified in FIPS 180-2, Secure Hash Standard, NIST is initiating an effort to develop one or more additional hash algorithms through a public competition, similar to the development process for the Advanced Encryption Standard .
When we say zero-knowledge we mean it
A true zero-knowledge web application knows nothing about its users and their data.
Sun May 12, 2013
Do We Even Have Strong Cryptography For Civilians Any More?
I don't know enough math, enough about crypto, or enough about the intersections between the two to make the judgement as to whether what this machine does has anything to do with cracking strong cryptographic systems.
The New Zealand Herald
Finance sleuths to speak on forensic accounting
The chief executive of Kim Dotcom's latest start-up, the boss of the Financial Markets Authority, a former police detective and a Buddhist nun are the among the speakers at a fraud and forensic accounting conference beginning in Auckland today.
Sat May 11, 2013
The Code Project
Counting how many times a letter appears in a string
This Tip doesn't invent anything new, brilliant or fancy. It just describes a little helper tool I wrote to learn a bit about the Caesar cipher , which I was told to get in touch with by my teacher.
NCP Virtual Private Network Client Supports Android BYOD Security
The NCP VPN Client for Android 4.x is a full-function virtual private network client.
Fri May 10, 2013
Faster curve25519 with precomputation
Diffie-Hellman is one of the most important public-key cryptographic primitives, even if it doesn't have the name recognition of, say, RSA.
Talking Points Memo
Can The Jihadi Geek Squad Secure The Web For Al Qaeda?
The Global Islamic Media Front Technical Center is a group of mysterious programmers with links to Al Qaeda who claim to be trying to arm jihadists with digital weaponry.
Remoter for Mac 1.4.0 - Remote Access For Mac Made Easy
Remoter Labs today is proud to announce the release of Remoter 1.4.0 for OS X Snow Leopard, Lion and Mountain Lion, an update to their productivity app that enables users to remotely control Macs via Screen Sharing, and Windows or Linux computers using the VNC or RDP.
How To Configure Apache To Use Radius For WiKID Two-Factor Authentication On Ubuntu
This document describes how to add WiKID two-factor authentication to Apache 2.x using mod_auth_radius on Ubuntu 12.04 Precise.
Thu May 09, 2013
Frost & Sullivan Applauds OneID for Developing a Secure Identity...
Based on its recent analysis of the identity and access management solutions market, Frost & Sullivan has recognized OneID with the 2013 North America Frost & Sullivan Award for New Product Innovation.