Skip to main content

Encryption

Why passwords have never been weaker - and crackers have never been stronger

posted onAugust 21, 2012
by l33tdawg

In late 2010, Sean Brooks received three e-mails over a span of 30 hours warning that his accounts on LinkedIn, Battle.net, and other popular websites were at risk. He was tempted to dismiss them as hoaxes—until he noticed they included specifics that weren't typical of mass-produced phishing scams. The e-mails said that his login credentials for various Gawker websites had been exposed by hackers who rooted the sites' servers, then bragged about it online; if Brooks used the same e-mail and password for other accounts, they would be compromised too.

Securing passwords with Blowfish

posted onAugust 15, 2012
by l33tdawg

During the past week, I had an idea on how to easily red flag potential employers: ask to see one row of their user table, and look at the password field. If the password is in plaintext, then run for the door.

When companies such as Blizzard are suffering from authentication system hacks, and appear to be vulnerable to dictionary-style attacks, then there exists a problem that is endemic across the industry.

RIM accused of giving Indian government keys to secure messaging

posted onAugust 2, 2012
by l33tdawg

Research in Motion refuted on Wednesday a new round of Indian media reports, which claim that the BlackBerry maker has granted the Indian government the encryption keys to its secure corporate email and messaging services.

India is one of the Canadian smartphone maker's few growing markets, where it is expanding aggressively. The company is facing falling sales elsewhere as customers abandon the BlackBerry in favour of Apple's iPhone and a slew of devices using Google Inc's Android software, leading to RIM's shares falling by more than 50 percent over the past one year.

LastPass users get TOR blocking security feature

posted onAugust 1, 2012
by l33tdawg

LastPass has added two new security features to its popular online password management system; access via TOR (The Onion Router) has been disabled and users can now limit logins to specific countries.

Premium users of the system can already enable two-factor authentication (or limit access to specific computers) as well as increase SHA-256 iterations to confuse brute-forcing of passwords but the company hopes that outlawing access via the anonymising TOR system will cut off another avenue of attack.