Unlocking the Secrets of Cryptography, Encryption, and Cryptology.
Source: Security Focus
Source: Security Focus
A colossal stuff-up in Microsoft's and KDE's implementation of SSL (Secure Sockets Layer) certificate handling makes it possible for anyone with a valid VeriSign SSL site certificate to forge any other VeriSign SSL site certificate, and abuse hapless Konqueror and Internet Explorer users with impunity.
Source: Security Focus
In 1998 cryptographer Paul Kocher developed a method for deducing the secret key embedded in a cryptographic smart card by monitoring tiny fluctuations in power consumption. Three years earlier, at the tender age of 22, he made headlines with a technique to compromise implementations of the RSA algorithm -- not with a direct frontal assault, but by watching the amount of time a system took to perform certain functions.
Source: SC Magazine
The scope and character of today's computing environment is changing dramatically. There are more systems in more locations and these are often spread across the world.
I'm sure that you have read about the end of the standard PGP due to
the latest decision from Network Associates. They have decided to completely drop their PGP product. This means no product development and no support.
So what are you to do if you want to use PGP on your XP machine or another Win32 environment? There is an answer.
The brilliant developers at GnuPG have ported there product to win32. This in
it of itself is not very user friendly because gpg is 100% command line
driven.
Source: ZDNet.com
You're exposing yourself to significant risk as long as the data on your network (data in transit) and in your storage (data at rest) is not encrypted. That's what a paranoid security specialist will tell you.
Is it true? That depends on the sensitivity of your data and on any government regulations that require the data to be encrypted--in the healthcare industry, for example.
Source: Xatrix.org
A cryptography challenge run by Cape Town-based Thawte Computing is attracting interest from around the world with entrants from as far as Afghanistan and Barbados struggling to crack the code posted on its Web site.