Skip to main content

Encryption

Duqu May Have Targeted Certificate Authorities for Encryption Keys

posted onOctober 20, 2011
by l33tdawg

As Symantec continues its analysis of Duqu, the latest malware targeting industrial control firms and based on the Stuxnet worm, other security researchers believe that certificate authorities are among the affected victims.

Symantec posted its preliminary analysis of the Duqu worm on Oct. 18. Duqu's focus appears to be on industrial control systems, but unlike Stuxnet, its goal appears to be information gathering and not disabling hardware. However, a pair of researchers from McAfee noted that the team behind Duqu may have compromised certificate authorities along the way.

Laptop encryption is basic security measure

posted onOctober 7, 2011
by l33tdawg

Leaving laptops containing customers' personal details is a breach of Data Protection Act, Information watchdog says 

Two organisations -- the Association of School and College Leaders (ASCL) and Holly Park School in Barnet -- breached the Data Protection Act by failing to encrypt personal information on laptops that were later stolen, the Information Commissioner's Office (ICO) said.

Elcomsoft releases BlackBerry password cracking tool

posted onOctober 3, 2011
by l33tdawg

The BlackBerry OS is known for the many security safeguards it affords individual users and organizations, the most basic--and most important--of which is probably the device password. In fact, I've written countless mobile device security tips and tricks posts, and "Enable a password" is almost always atop my list of suggestions.

Bitcasa CEO Explains How Their Encryption Works

posted onSeptember 19, 2011
by l33tdawg

TechCrunch Disrupt finalist Bitcasa, a new cloud storage provider, was met with a healthy dose of skepticism last week when it claimed to be able to provide “infinite storage.”  How does it do that? It can’t do what it promises! That’s not how encryption works! And so on. VC firm Andreessen Horowitz, along with First Round Capital, Pelion Venture Partners, and TechCrunch founder Michael Arrington’s CrunchFund have invested $1.3 million in the technology, which seems to suggest there’s valuable IP behind the startup’s overly broad promises of cheap, infinite and secure storage.

Google Certificate Hackers May Have Stolen 200 Others

posted onSeptember 1, 2011
by l33tdawg

Hackers who obtained a fraudulent digital certificate for Google may have actually obtained more than 200 digital certificates for other top internet entities such as Mozilla, Yahoo and even the privacy and anonymizing service Tor.

Dutch certificate authority DigiNotar, which was hacked in July, has never acknowledged the number of fraudulent certificates the hackers managed to obtain, nor identified the possible targets other than Google.

Cryptography in software or hardware: It depends on the need

posted onAugust 29, 2011
by l33tdawg

Cryptographic algorithms are high-performance, secure engines that require considerable space in a design. When countermeasures are added to thwart security attacks, the space and memory requirements grow even more demanding.

For these reasons, cryptographic algorithms have traditionally been embedded as proprietary designs (i.e., intellectual property, IP) in hardware on smart cards or 8-bit chips. With recent improvements in core design and frequency performance, designers are now asking whether the customized IP blocks are still needed for these secure algorithms.