| Sunday December 21st 2014

Feedburner

Subscribe by email:

We promise not to spam/sell you.


Search Amazon deals:

‘encryption’ Archives

The Fall of TrueCrypt

The Fall of TrueCrypt

Many have suggested intelligence agencies are behind this. A good conspiracy theory is always fun, but in this case, there may be an entirely prosaic justification. Some wonder if the coder behind TrueCrypt has taken offense to the security audit his code is currently undergoing, and in response, has spitefully decided to close down the entire [...]

Hackers break SSL encryption

Hackers break SSL encryption

Researchers have discovered a serious weakness in virtually all websites protected by the secure sockets layer protocol that allows attackers to silently decrypt data that's passing between a webserver and an end-user browser. The vulnerability resides in versions 1.0 and earlier of TLS, or transport layer security, the successor to the secure [...]

Geohot freestyles a message to Sony

Geohot (the iPhone jailbreaker) can rap! In case you hadn't heard, he moved his jailbreaking on to the Sony Playstation platform and Sony sued him. Maybe they should just sign him instead. Lyrics after the jump.... (more…)

VeriFone vs Square

VeriFone vs Square

VeriFone, a huge provider of credit card processing systems that's been around since time immemorial, has taken a huge swipe at upstart Square today, branding its free, headphone jack-based credit card readers "skimming devices" and demanding their immediate removal from the market. Crazy, right? Let me explain how easy it is to exploit the [...]

Root key for PS3 released

Root key for PS3 released

erk: C0 CE FE 84 C2 27 F7 5B D0 7A 7E B8 46 50 9F 93 B2 38 E7 70 DA CB 9F F4 A3 88 F8 12 48 2B E2 1B riv: 47 EE 74 54 E4 77 4C C9 B8 96 0C 7B 59 F4 C1 4D pub: C2 D4 AA F3 19 35 50 19 AF 99 D4 4E 2B 58 CA 29 25 2C 89 12 3D 11 D6 21 8F 40 B1 38 CA B2 9B 71 01 F3 AE B7 2A 97 50 19 R: 80 6E 07 8F A1 52 97 90 CE 1A AE 02 BA DD 6F AA A6 AF 74 17 n: [...]

Wikileaks “insurance file” password leaked?

Wikileaks “insurance file” password leaked?

Now we just need email 23.D (more…)

Obama administration wants encryption backdoors for domestic surveillance

Obama administration wants encryption backdoors for domestic surveillance

In a New York Times article today by Charlie Savage, news that the Obama administration is proposing new legislation that would provide the U.S. Government with direct access to all forms of digital communication, "including encrypted e-mail transmitters like BlackBerry, social networking Web sites like Facebook and software that allows [...]

Intel threatens lawsuits against HDCP jailbreakers

Intel threatens lawsuits against HDCP jailbreakers

Last week, the master key for the HDCP DRM scheme -- which prevents people from connecting unapproved monitors, recorders and switches to high-def players, computers and consoles -- leaked. Using this key, it is now possible to make more flexible and cheaper high-def equipment (for example, high-def recorders that save unrestricted [...]

Blu-ray falls: HDCP key crack confirmed

Blu-ray falls: HDCP key crack confirmed

Intel has confirmed that the rumored master key crack for HDCP (the high-definition video "copy protection" used in Blu-Ray, high def consoles, and many game consoles) is real. Blu-Ray and other systems that rely on HDCP are now terminally compromised. As a practical matter, the most likely scenario for a hacker would be to create a computer chip [...]

Wikileaks posts “Insurance” file to website

Wikileaks posts “Insurance” file to website

I thought this stuff only happened in bad movies. The huge file, posted on the Afghan War page at the WikiLeaks site, is 1.4 GB and is encrypted with AES256. The file’s size dwarfs the size of all the other files on the page combined. The file has also been posted on a torrent download site as well. It’s not known what the file contains [...]

Russian spy ring needed some serious IT help

Russian spy ring needed some serious IT help

Couldn't the unnecessarily complicated means of communicating easily have been replaced with any number of prolific and untraceable communication methods that have been developed since the cold war? The Russian ring charged this week with spying on the United States faced some of the common security problems that plague many companies -- [...]

Real world results: FBI cannot crack Truecrypt

Real world results: FBI cannot crack Truecrypt

The FBI failed to break the encryption code of hard drives seized by federal police at the apartment of banker Daniel Dantas, in Rio de Janeiro, during Operation Satyagraha. The operation began in July 2008. According to a report published on Friday (6.25.2010) by the newspaper Folha de S. Paulo, after a year of unsuccessful attempts, the U.S. [...]

A botnet with 6 to 12 million computers, employing the world’s most sophisticated encryption and peer-to-peer communication lies waiting, but for what?

A botnet with 6 to 12 million computers, employing the world’s most sophisticated encryption and peer-to-peer communication lies waiting, but for what?

My guess? They're gearing up for the biggest anti-Caltech prank in MIT's history. When the Conficker computer "worm" was unleashed on the world in November 2008, cyber-security experts didn’t know what to make of it. It infiltrated millions of computers around the globe. It constantly checks in with its unknown creators. It uses an encryption [...]

RSA encryption has not been broken

RSA encryption has not been broken

An Engadget article recently got hundreds of upvotes on social sites by claiming that RSA has been broken. Engadget may be great for showing you pictures of electronics, but it is far from a scientific publication. To break an encryption algorithm, you must find a feasible way to produce plaintext given only ciphertext--with NO access to the [...]

Ubisoft’s DRM authentication servers go down… punishing customers but not pirates

Ubisoft’s DRM authentication servers go down… punishing customers but not pirates

You remember Ubisoft's announcement that they were crippling their new games with a DRM system that would kick players out of their games if they couldn't connect continuously to Ubisoft's DRM servers? Now Ubisoft's servers have started to go down. Of course, pirates who break Ubisoft's DRM can still play. Way to correctly align the incentives, [...]

Ubisoft’s notorious “uncrackable” unfair game DRM falls in less than 24 hours

Ubisoft’s notorious “uncrackable” unfair game DRM falls in less than 24 hours

Games maker Ubisoft drew global ire when it announced that all its new titles, starting with Silent Hunter 5 and Assassin's Creed 2, would henceforth be crippled with a DRM that would kick you off the game and wipe out your play if your Internet connection dropped for even a moment. From soldiers on forward-fire bases to people who just don't want [...]

Pirate Bay’s VPN goes public: Ipredator

Pirate Bay’s VPN goes public: Ipredator

As governments around the world consider proposals to hand surveillance powers to the entertainment industry and twitchy cops, the Pirate Bay is striking back. Its new €5/month IPRedator service is an encrypted VPN that you can use to hide your traffic (whatever it may contain) from prying eyes. The name comes from Sweden's adoption of IPRED [...]

Crime ring that hit 280 cities’ ATMs at once, gets busted

Crime ring that hit 280 cities’ ATMs at once, gets busted

The global crime ring that hit ATMs in 280 cities worldwide last year simultaneously for $9 million have allegedly been busted. A federal grand jury in Atlanta has indicted eight men in connection with the scheme, including five Estonians, one Russian, one Moldovan and one unidentified man. Prosecutors allege that the men "used sophisticated [...]

SSL Still Mostly Misunderstood

SSL Still Mostly Misunderstood

Most users ensure their Web sessions are using Secure Sockets Layer (SSL) before entering their credit card information, but less than half do so when typing their passwords onto a Web page, according to a new survey. Just what SSL does and doesn't do isn't clear to many users, and the way Websites implement it doesn't help: "The biggest issue [...]

AES explained by stick figures

AES explained by stick figures

If you've always wondered how AES -- the Advanced Encryption Standard, the gold-standard for crypto -- works, and if you enjoy explanations in stick-figure cartoon form, you are in luck, for Moserware's "A Stick Figure Guide to the Advanced Encryption Standard (AES)" is funny, lucid and fascinating. (more…)

 Page 1 of 2  1  2 »