| Wednesday April 16th 2014

Feedburner

Subscribe by email:

We promise not to spam/sell you.


Search Amazon deals:

‘encryption’ Archives

Chinese hackers break iTunes gift card algorithm

Chinese hackers break iTunes gift card algorithm

$200 iTunes Gift Certificates are selling for less than $3 in China now that a group of local hackers has circumvented Apple's algorithm for creating the digital vouchers and built their own gift certificate generators. According to Outdustry, a website which describes itself as a music industry consultancy specializing in the Chinese music [...]

Secure file deletion: A single overwrite will do it

Secure file deletion: A single overwrite will do it

The myth that to delete data really securely from a hard disk you have to overwrite it many times, using different patterns, has persisted for decades, despite the fact that even firms specializing in data recovery, openly admit that if a hard disk is overwritten with zeros just once, all of its data is irretrievably lost. Craig Wright, a [...]

Why forced change password policies are ridiculous

Why forced change password policies are ridiculous

Forced password-changing policies lead to two things: More frustrated users locked out of their accounts, leading to more painful support requirements A huge number of unenecrypted text files on local filesystems called "mystupidnewpassword.txt" I study IT Security in the graduate program of UNC Charlotte. For the most part, UNCC is a [...]

sslstrip: hijacking SSL in network

sslstrip: hijacking SSL in network

Last week at Black Hat DC, Moxie Marlinspike presented a novel way to hijack SSL. You can read about it in this Forbes article, but we highly recommend you watch the video. sslstrip can rewrite all https links as http, but it goes far beyond that. Using unicode characters that look similar to / and ? it can construct URLs with a valid certificate [...]

Encryption Security

Encryption Security

(more…)

Misconceptions About Laptop Encryption May Put Data At Risk

Misconceptions About Laptop Encryption May Put Data At Risk

Now that they have encryption capabilities on their laptops, many end users may be overconfident about the safety of the data that resides on them, according to a study published this week. The laptop encryption study, conducted by Ponemon Institute and sponsored by security vendor Absolute Software, found that many workers think the data on [...]

Steganography made simple

Steganography made simple

As programmers, our code should be readable, not cryptic; but sometimes it’s fun to surprise, obfuscate or conceal. Wikipedia says: Steganography is the art and science of writing hidden messages in such a way that no-one apart from the sender and intended recipient even realizes there is a hidden message. By contrast, cryptography obscures the [...]

New State Laws Could Make Encryption Widespread

New State Laws Could Make Encryption Widespread

New laws that took effect in Nevada on Oct. 1 and will kick in on Jan. 1 in Massachusetts may effectively mandate encryption for companies' hard drives, portable devices, and data transmissions. The laws will be binding on any organization that maintains personal information about residents of the two states. (Washington and Michigan are [...]

Create an Encrypted Private Directory with eCryptfs

Create an Encrypted Private Directory with eCryptfs

eCryptfs is a kernel-native cryptographic filesystem. It’s also a stacked filesystem, eCryptfs must work on top of another filesystem such as Ext3. This means that you don’t need to allocate space for eCryptfs, it will grow and shrink as you add files to it. eCryptfs will be used in Ubuntu 8.10 to provide an encrypted private [...]

Kevin Mitnick detained then released after Colombia trip

Kevin Mitnick detained then released after Colombia trip

Since being released from prison eight years ago, Kevin Mitnick's brushes with the law have consisted of a few parking tickets and a citation for driving without a front license plate--that is, until he returned from a trip to Colombia two weeks ago. After landing at the Atlanta airport for a security conference, Mitnick was detained for four [...]

PGP and others team up to renovate Bletchley Park

PGP and others team up to renovate Bletchley Park

A group of companies, led by PGP, have ponied up a bunch of money to renovate and restore Bletchley Park, the crumbling site of the birthplace of modern cryptography. There's a lot of charm in the present, mouldering campus, but I can only imagine what a nice shot of cash could do for the place. The fund-raising campaign will be led by [...]

User Buys Millions of Bank Records (and a PC) on eBay

User Buys Millions of Bank Records (and a PC) on eBay

When Andrew Chapman bought a PC on eBay for about $150, he didn't expect the added bonus -- the personal records of millions of customers of a major international bank. Chapman says he found "several million" personal records on the PC. The records, which belonged to the National Bank of Scotland, its NatWest subsidiary, and American Express, [...]

DEFCON 16 – The Tools

DEFCON 16 – The Tools

DEFCON, the 9000+ attendee hacker conference in Vegas has become a sort of hydra conference. It has become more like a global fair than what most people think of conferences; even the badge is highly unique. I say this because there are so many things to do at DEFCON, other than going to talks, that you could spend your whole weekend looking at [...]

Google Releases an Open Source Cryptography Toolkit

Google Releases an Open Source Cryptography Toolkit

Google has just released an open source cryptographic toolkit: Keyczar. The company is aiming to make inherently complex cryptography easier and safer for developers to implement. In addition to the Google Code page where you can get the toolkit, there is this information page, and a link to a discussion group. Keyczar is released under an Apache [...]

The Pirate Bay Wants to Encrypt the Entire Internet

The Pirate Bay Wants to Encrypt the Entire Internet

The team behind the popular torrent site The Pirate Bay has started to work on a new encryption technology that could potentially protect all Internet traffic from prying eyes. The project, which is still in its initial stages, goes by the name "Transparent end-to-end encryption for the Internets," or IPETEE for short. It tackles encryption not on [...]

Geekiest song ever: A Cryptography song entitled “Crypto”

Geekiest song ever: A Cryptography song entitled “Crypto”

"I looked through my mp3 collection and found some really geeky and funny songs. I thought, why not add a little more fun to my blog! The songs are really geeky and my readers might like them. I’ll be posting a song each Friday until I run out of songs (I have 6 songs at the moment, and maybe I find some more). I’ll also try to [...]

Encryption Legislation Goes Overboard

Encryption Legislation Goes Overboard

Bills pending in the Michigan and Washington state legislatures would mandate that personal information stored in business computers be “encrypted.” Legislatures are unwise to engage in such micro-management. Pending Michigan Senate Bill (SB) 1022 would forbid a business from storing personally identifiable information in a database [...]

Researchers: Disk Encryption Not Secure

A team from Princeton University has developed ways to break disk encryption, including Bitlocker, Truecrypt, Apple encryption, and Linux encryption, if the computer is in sleep mode or sitting at a password prompt, or even if it's just been turned off. (more…)

Encrypted Laptop Poses Legal Dilemma

Encrypted Laptop Poses Legal Dilemma

BURLINGTON, Vt. (AP) — When Sebastien Boucher stopped at the U.S.-Canadian border, agents who inspected his laptop said they found files containing child pornography.But when they tried to examine the images after his arrest, authorities were stymied by a password-protected encryption program. Now Boucher is caught in a cyber-age [...]

 Page 2 of 2 « 1  2