Cryptography is one of the fundamental aspects of information security. We look at it through the lens of the silver screen.
ESET's Cassius Puodzius takes an in-depth look at cryptography, exploring quantum computing (one of the resources in the toolkit of cryptanalysts).
Boeing has unveiled a smartphone fit for James Bond - the Boeing Black, which can connect to satellites and secret government telecoms networks, will self-destruct if tampered with, deleting all data and rendering the device useless.
'The first thing you need to know about quantum cryptography is that it isn't cryptography. At least, not the quantum part,' writes Rob Slade, information security researcher, author and malware expert.
An $80m ‘quantum computer’ capable of breaking any encryption code, including those used to protect government information and banking systems - and thus ‘owning the net’ was planned by the NSA, according to leaked documents.
One of the recurring themes of the past few years in the UK is data lost by the public sector on USB drives, CDs and so on.
In the wake of the flood of recent mortgage/housing fraud, a police raid in Colorado resulted in a laptop seizure they feel may contain evidence to help a case. Turns out it’s encrypted. Citing suspicion of nastiness contained therein, the U.S. Government has asked a federal judge to compel the owner, Ramona Fricosu, to enter
In an effort to deal with the security woes of .com websites, the U.S. Government has a solution: build a new “internet” around .secure instead. The problem? Apparently, people have too much freedom on the .com’s, allowing cyber-dirtbags to skulk around anonymously. This would aim to cure all that by requiring “visitors to use certified
The results (released yesterday) from a study conducted by the Ponemon Institute yielded some interesting data points. The most visible of these was the finding that 85% of U.S. organizations experienced data breaches of varying magnitudes. This study, entitled “U.S. Enterprise Encryption Trends”, has completed its fourth annual publication. The data was directly obtained from
Lots of fuss was made about the paper presented at the Chaos Communication Congress in Berlin yesterday by Alexander Sotirov et al. The paper describes a proof-of-concept attack using a weakness in the MD5 cryptographic hash function to create a rogue Cerification Authority certificate using a hash collision (essentially, two messages with the same MD5
We’re closing in on the end of 2008 and about to start 7D9, or 2009 for those who do not speak hex. I thought it might be a good time to remind you to change your passwords. There are some important things to remember about passwords. Despite the IT policies that are prevalent throughout the