Cryptography Newswire

Cryptography Newswire

Comprehensive Real-Time News Feed for Cryptography.

Results 1 - 20 of 1,842 in Cryptography

  1. NIST Proposes Ban of SMS-Based Two-Factor AuthenticationRead the original story w/Photo

    7 min ago | CNet News

    While Google has encouraged users to enable two-step authentication within Google Apps, to add "an extra layer of security," the U.S. National Institute of Standards and Technology updated it Digital Authentication Guidelines July 27 and now reports that two-factor verification over SMS isn't secure and should be banned. "If the out-of-band verification is to be made using an SMS message on a public mobile telephone network, the verifier SHALL verify that the pre-registered telephone number being used is actually associated with a mobile network and not with a VoIP service.

    Comment?

  2. snoopy 0.4.4Read the original story

    48 min ago | Python

    If your files reside on a server without HTTP/S access snoopy can access this but will require samtools to be installed and in your path. Snoopy requires the python package paramiko which in turn requires cryptography.

    Comment?

  3. Flaw in HTTPS encryption enables network operators to eavesdrop on web usersRead the original story w/Photo

    3 hrs ago | Computing.co.uk

    The attack works by bypassing the HTTPS encryption, which is supposed to prevent this happening. HTTPS would normally prevent the operator seeing the URLs visited by users, but a new technique abuses web proxy auto-discovery and exposes browser requests to any code the network owner wants to throw at it.

    Comment?

  4. Media Alert: Kaspersky Lab Research Team to Participate in Reddit AMA on July 27, 2016Read the original story

    4 hrs ago | Information Technology

    ... overseeing research efforts in the EEMEA region. Some of his hobbies include chess, high precision arithmetic, cryptography, chemistry, photography and Science Fiction literature. Ryan Naraine: Director, Global Research & Analysis Team, US Ryan ...

    Comment?

  5. 'Mr. Robot': Does anyone actually like hallucination theory?Read the original story w/Photo

    20 hrs ago | Entertainment Weekly's PopWatch

    ... like me, a mystery story isn't a thing to be enjoyed by a puzzle that must be solved. Theorizing is palliative cryptography. We enjoy twist narrative mystery, like , but I think we might resent their disorienting effects, too. It subverts my ...

    Comment?

  6. HTTPs attack airs browsing habits of Linux, Mac and Windows usersRead the original story w/Photo

    4 hrs ago | The Inquirer

    A NEW ATTACK allows network operators, including anyone who owns a WiFi hotspot, to snoop on people's browsing habits and see any webpage they visit. Fortunately, readers of the INQUIRER look at nothing more incriminating than the latest, hottest tech news, but other, less noble, netizens will no doubt be quaking in their onesies about now.

    Comment?

  7. SMS-based two-factor authentication is being phased outRead the original story w/Photo

    18 hrs ago | TechSpot

    ... that end the National Institute for Standards and Technology, the US agency that sets guidelines and rules in cryptography and security matters, has proposed to deprecate SMS-based and will no longer allow it in future guidelines. The current draft ...

    Comment?

  8. Wire open-sources messaging client, woos developersRead the original story w/Photo

    Monday | JavaWorld

    ... in building out a secure messaging component to their applications had the choice of trying to roll their own cryptography and create their application from scratch or try to license it from another party. Encryption expert Moxie Marlinspike offers ...

    Comment?

  9. flake8-import-order 0.9Read the original story

    22 hrs ago | Python

    In general stdlib comes first, then 3rd party, then local packages, and that each group is individually alphabetized, see Configuration section for details. This plugin is under somewhat active development and is heavily influenced by the personal preferences of the developers of cryptography .

    Comment?

  10. US government agency calls for the end of SMS authenticationRead the original story w/Photo

    Yesterday | Engadget

    The US agency that sets guidelines and rules in cryptography and security matters is discouraging the use of text messaging in two-factor authentication. In the latest draft of its Digital Authentication Guideline, the National Institute of Standards and Technology states that "[out of band authentication] using SMS is deprecated, and will no longer be allowed in future releases of this guidance."

    Comment?

  11. Service Integration Via a Distributed LedgerRead the original story w/Photo

    Yesterday | Phil Windley's Technometria

    ... for a job - all with your permission, of course. Security and privacy is ensured by the proper application of cryptography, including public-private key pairs, digital signatures, and cryptographic hashes. This isn't easy, but it's doable. There's ...

    Comment?

  12. Kudelski Security to Present on SGX Secure Enclaves at Black Hat USA 2016Read the original story w/Photo

    Monday | Freshnews

    Kudelski Security today announced that Jean-Philippe Aumasson, principal cryptographer and Luis Merino, senior security engineer, will contribute their industry expertise in a session titled "SGX Secure Enclaves in Practice: Security and Crypto Review," on Thursday, August 4 at Black Hat USA 2016 in Las Vegas, Nevada. What: Discussion on "SGX Secure Enclaves in Practice: Security and Crypto Review".

    Comment?

  13. Blockchains: Focusing on Bitcoin Misses Real Revolution in Digital TrustRead the original story w/Photo

    Monday | Scientific Computing/Instrument.

    ... the world quickly and at minimal cost. It is often called a "cryptocurrency," as it is purely digital and uses cryptography to protect against counterfeiting. The software that executes this cryptography runs simultaneously on computers around the ...

    Comment?

  14. Good pointRead the original story

    Monday | Brad Ideas

    ... done. This is the only way to truly secure a WIFI link. This works because the RADIUS server uses public key cryptography, and has a certificate for its key. The RADIUS tells you its certificate and public key, and that lets the program on your ...

    Comment?

  15. NIST Recommends Deprecation Of SMS Two-Factor AuthenticationRead the original story w/Photo

    Monday | Tom's Hardware

    The National Institute for Standards and Technology , a U.S. agency in charge of setting cryptography and security standards, proposed to deprecate SMS-based authentication for out of band authenticators in its latest standards draft. Out of band authentication is a form of two-factor authentication that requires another device to complete the authentication.

    Comment?

  16. Lawsuit Raises Questions About The Right ...Read the original story w/Photo

    Monday | InformationWeek

    ... an assistant professor in the computer science department at Johns Hopkins University, who specializes in cryptography and computer security. Green had to seek a DMCA exemption last year to be assured that his security research was lawful. The ...

    Comment?

  17. SafeZone IoT Security Framework from INSIDE Secure delivers an...Read the original story w/Photo

    Monday | Design And Reuse

    Aix-en-Provence, France, July 25, 2016, – INSIDE Secure , a leader in embedded security solutions for mobile and connected devices, today announced its SafeZone™ IoT Security Framework, which delivers all of the basic security ingredients needed to build a secure device. It includes a common cryptographic framework providing FIPS140-2 certified cryptography in hardware or software integrated with security protocols such as TLS, DTLS, SSH and IPsec.

    Comment?

  18. Cryptography as Democratic Weapon Against DemagogueryRead the original story w/Photo

    Monday | Counterpunch

    ... there is a modern analogue to Orwell's 'simple' and 'democratic weapon', which 'gives claws to the weak' it is cryptography, the basis for the mathematics behind Bitcoin and the best secure communications programs. Bitcoin's underlying technology ...

    Comment?

  19. Cyber security course for teachers includes lessons on hackingRead the original story w/Photo

    Monday | ESchool News

    ... week. The course included training in subjects like cyber threats, vulnerabilities, security risk management, cryptography and online safety practices. "We learned about encryption and decryption and how to hack computers on a small scale," Sigler, ...

    Comment?

  20. SafeZone IoT Security Framework from INSIDE Secure Delivers an Integrated Suite of Products...Read the original story w/Photo

    Sunday | Freshnews

    SafeZonea IoT Security Framework from INSIDE Secure Delivers an Integrated Suite of Products That Addresses the Broad Spectrum of Critical IoT Security Needs INSIDE Secure , a leader in embedded security solutions for mobile and connected devices, today announced its SafeZonea IoT Security Framework, which delivers all of the basic security ingredients needed to build a secure device. It includes a common cryptographic framework providing FIPS140-2 certified cryptography in hardware or software integrated with security protocols such as TLS, DTLS, SSH and IPsec.

    Comment?