Skip to main content

Security

Build A Better Bitcoin Wallet: Security Researcher Calls For Developers To Use Safer ECDSA Operations

posted onOctober 20, 2014
by l33tdawg

One of the biggest fears of Bitcoin users is that one day they will wake up and find their virtual currency wallet emptied, signaling that someone, somehow, has managed to uncover the user’s private key. A Bitcoin private key is a secret number that acts as a kind of identifying “ticket,” allowing coins from the corresponding wallet to be spent.

#HITB2014KUL: Get advice of locksmiths for maximum protection

posted onOctober 20, 2014
by l33tdawg

Protecting any property is not just about getting quality locks but getting sound advice from a professional locksmith, advised non-profit organisation The Open Organisation for Lockpickers (TOOOL).

Babak Javadi, a founding member of TOOOL, said the market in the region was driven by demand for cheap locks, which resulted in products of low quality. He warned that one of the most popular lock brands in Malaysia could easily be opened by force with an Allen key.

The secure smartphone that won’t get you beaten with rubber hoses

posted onOctober 20, 2014
by l33tdawg

Interest in secure communications is at an all time high, with many concerned about spying by both governments and corporations. This concern has stimulated developments such as the Blackphone, a custom-designed handset running a forked version of Android that's built with security in mind.

China says it's hard to resume cyber security talks with U.S.

posted onOctober 20, 2014
by l33tdawg

Cyber security is an irritant to bilateral ties. On Wednesday the U.S. Federal Bureau of Investigation said hackers it believed were backed by the Chinese government had launched more attacks on U.S. companies, a charge China rejected as unfounded.

In May, the United States charged five Chinese military officers with hacking American firms, prompting China to shut down a bilateral working group on cyber security.

Apple Pay's security is impressive - but that won't stop the hackers trying

posted onOctober 20, 2014
by l33tdawg

The world turned up to Apple’s launch event this week for news of the new iPhone 6, but CEO Tim Cook ended up showing them something that could turn out to be more important than another smartphone.  “Payments are broken,” he said announcing the broad details of Apple Pay, the firm’s entry into the world of contactless payments.

New White House efforts help secure your payments

posted onOctober 20, 2014
by l33tdawg

President Obama signed an executive order on Friday to strengthen security on federally issued credit cards and government payment systems, part of a push to protect Americans from identity theft and fraud after several large-scale data security breaches this year.

“You should be able to buy the things that you need without risking your identity, your credit score or your savings,” Mr. Obama said during an appearance at the Consumer Financial Protection Bureau before signing the directive.

Windows XP flaws help Russian 'Qbot' gang build 500,000 PC botnet

posted onOctober 9, 2014
by l33tdawg

The Russian gang behind the obscure Qbot botnet have quietly built an impressive empire of 500,000 infected PCs by exploiting unpatched flaws in mainly US-based Windows XP and Windows 7 computers, researchers at security firm Proofpoint have discovered.

A year or two ago, what the Qbot (aka Qakbot) campaign has achieved in the roughly half dozen years the actors behind it have been operating would have been seen as a major concern. Recently, standards have gone up a notch.

The analytics black hole for detecting internal security threats

posted onOctober 9, 2014
by l33tdawg

Forrester Research conducted a data security and privacy survey of North American and European companies in 2013 that revealed that enterprise "insiders" were the leading source of security breaches, with 36% of breaches stemming from inadvertent misuse of data by employees.