Skip to main content

Encryption

Diamonds used against internet eavesdropping

posted onMay 18, 2006
by hitbsecnews

THE University of Melbourne has announced a $9 million international joint venture to commercialise anti-eavesdropper technology based on quantum cryptography.“Using a unique diamond-based device which produces a single photon of light, we will be able to detect eavesdroppers and stop highly sensitive information being intercepted or stolen,” said Quantum Communications Victoria (QCV) CEO and University of Melbourne researcher Dr Shane Huntington.

Encryption Isn’t Enough: Five Vital Protection Steps

posted onMay 17, 2006
by hitbsecnews

While still considered the most crucial aspect of data protection, encryption alone will no longer keep your data safe from hackers and thieves. If businesses don’t develop a multi-faceted arsenal of security weapons, they are easy targets for data theft.

Encryption is a powerful weapon in the CIO’s data protection arsenal. But the multi-faceted threats abound today reveal that it is not the only way to reliably protect your data.

Quantum cryptography record broken

posted onApril 20, 2006
by hitbsecnews

Scientists have reported an important speed breakthrough which brings closer the day when quantum encryption becomes a usable part of communications security.

The National Institute of Standards and Technology (NIST), a U.S. government agency, has reported that it has managed to shift quantum-encrypted information at a "raw" throughput of 4 million bits per second across a 1 km-long fiber link.

This is at least twice NIST's previous record, which has been rising since the agency announced it had broken the 1 million bits per second barrier in May 2004.

IBM Develops New Encryption Technology

posted onApril 17, 2006
by hitbsecnews

With more cyber hacking occurring, and people's sensitive data being phished or broadcasted, IBM has developed encryption technology to make hackers' lives a little bit harder.

Why VOIP Needs Crypto

posted onApril 6, 2006
by hitbsecnews

There are basically four ways to eavesdrop on a telephone call.

One, you can listen in on another phone extension. This is the method preferred by siblings everywhere. If you have the right access, it's the easiest. While it doesn't work for cell phones, cordless phones are vulnerable to a variant of this attack: A radio receiver set to the right frequency can act as another extension.

Kingston Introduces Fully Secure USB Drive

posted onMarch 20, 2006
by hitbsecnews

New Delhi: Kingston Technology Corporation has introduced Kingston DataTraveler Elite – Privacy Edition (DTE Privacy Edition), the world’s first USB Flash drive that secures 100 per cent of data on-the-fly via 128-bit hardware-based AES encryption, ensuring fail-safe security best practices without IT intervention.

U-Boat's Enigma Cracked With PCs

posted onMarch 3, 2006
by hitbsecnews

Sixty years after the end of World War II, a network of several thousand PCs has cracked a message enciphered with the famous Enigma machine.

The M4 Message Breaking Project, started by Stefan Krah, a German amateur cryptographer, in January, took on three messages intercepted by British code-breakers during WWII, but never cracked by the famous cryptology facility at Bletchley Park.

The code breakers at Bletchley included computing pioneer Alan Turing and used a combination of human intelligence, guesswork, and elementary computing, called "bombs" to decipher messages."

128-bit encryption for text messages

posted onJanuary 27, 2006
by hitbsecnews

Brighton-based internet provision and software development company, Fair Internet, has launched a new mobile-to-mobile solution for sending and receiving secure SMS text messages, called Kryptext.

Launched last month, the device has already attracted the interest of individuals and companies alike from Italy, Russia and the Netherlands. According to Bee Ebéné, MD of Fair Internet, the new device appeals to lovers, bankers, and anyone who feels no third party should be able to read their messages.

Encryption tossed into the too-hard basket

posted onJanuary 23, 2006
by hitbsecnews

Very few enterprises in Australia use encryption to protect sensitive data, especially if it involves customer data.

Given the high number of security breaches, Deakin University IT director Craig Warren said it is alarming to learn that so few companies make use of encryption.

While the university doesn't encrypt data, Warren said strict security protocols are in place so encryption could end up being a burden.

Quantum Cryptography: When Your Link Has to be Really, Really Secure

posted onDecember 23, 2005
by hitbsecnews

Keeping data and communications secure is a hot topic. Hackers access systems through open ports, through secret programs, and through various ruses or aliases. As a result, data-security products and strategies are top priorities for both embedded and enterprise systems.

Simplenews subscription

Stay informed - subscribe to our newsletter.
The subscriber's email address.
Keeping Knowledge Free for Over a Decade

Copyright © 2018 Hack In The Box. All rights reserved.

36th Floor, Menara Maxis, Kuala Lumpur City Centre 50088 Kuala Lumpur Malaysia
Tel: +603-2615-7299 Fax: +603-2615-0088