. : New eShop! - Mobilní verze - Pandatron.cz - Pandatron.sk - Diskuzní fórum - Zakázkový vývoj : .
 
13. ledna 2017 | In response to an unprecedented level of espionage and cyber attacks aimed at compromising critical government IT infrastructure-from networks to applications-the federal government last year announced new standards. Regulations have been enacted in 2016 to apply these standards to federal contractors and their subcontractors. Číst dál...
13. ledna 2017 | GoDaddy: Due to a software bug, the recently issued certificate for your domain was issued without proper domain validation, and in accordance with industry standards as a Certificate Authority, we will need to revoke your certificate as a precautionary measure. The certificate will be revoked today (January 10) by 9pm Pacific Time. The software bug that created the issue has been remedied. We continue to closely monitor our system. Číst dál...
13. ledna 2017 | No really. Insurer´s details on 60k people lost forever. A UK insurance business has been fined £150,000 for its lax security practices after a hard drive containing customers´ unencrypted information was stolen. The hard drive disappeared from the offices of Royal & Sun Alliance insurance (ironically it prefers the abbreviation RSA) back in 2015. Číst dál...
13. ledna 2017 | The new Google Cloud Platform service will allow enterprises to create, use and rotate encryption keys to protect their data, company says. Číst dál...
10. ledna 2017 | Der Schreck der Antiviren-Hersteller hat wieder zugeschlagen: Google-Forscher Tavis Ormandy hat diesmal Schwächen im Umgang mit SSL-Zertifikaten bei Kaspersky aufgedeckt. Und das nicht zum ersten Mal. Číst dál...
10. ledna 2017 | The first 2017 Levchin Prize recipient was the creator of said encryption, Joan Daemen. Along with his collaborators, Vincent Rijmen and the Keccak team, they are responsible for the development of the AES block cipher and the SHA3 hash function. Daemen was immediately followed by Moxie Marlinspike and Trevor Perrin, who were awarded the 2017 Levchin Prize for their development of the Signal protocol used to encrypt messages in communication systems. Číst dál...
03. ledna 2017 | Following the Council meeting on 8th and 9th December 2016 in Brussels, ENISA´s paper gives an overview into aspects around the current debate on encryption, while highlighting the Agency´s key messages and views on the topic. ENISA´s Opinion Paper on Encryption Číst dál...
03. ledna 2017 | Google has released a set of tests that developers can use to check some open source cryptographic libraries for known security vulnerabilities. The company has named the set of tests Project Wycheproof. Číst dál...
03. ledna 2017 | While 2016 may not have been the banner year for cryptographic exploits that 2015 was, researchers around the world continued to advance the state of the art. TLS 1.3 design finalized The quest for post-quantum cryptography continues New thinking on how to backdoor cryptographic algorithms RFC 5114: Another backdoored crypto standard from NIST? Cryptographic deniability pops up in the US presidential election Attacks only get better Out with the old, in with the new: HTTPS still being slowly hardened Číst dál...
03. ledna 2017 | A bipartisan House working group on encryption has today come to the conclusion that encryption is vital to US national interests, even as it seeks to mitigate the problem the technology can pose for law enforcement. Citing the Federal Bureau of Investigation"s effort earlier this year to force Apple to help the agency decrypt an iPhone used by one of the shooters in a 2015 terror attack in San Bernardino, California, the House Judiciary Committee & House Energy and Commerce Committee"s Encryption Working Group (EWG) report explores the tension between authorities" desire for access to digital data and the increasingly necessary use of encryption to keep data secure. Encryption Working Group Year-End Report Číst dál...
03. ledna 2017 | The United States´ National Institute of Standards and Technology has issued a Notice and request for nominations for candidate post-quantum algorithms. The Institute (NIST) has cottoned on to the fact that - If large-scale quantum computers are ever built, they will be able to break many of the public-key cryptosystems currently in use. The agency therefore observes, in its explanation of the Notice, that once such machines are widely available: This would seriously compromise the confidentiality and integrity of digital communications on the Internet and elsewhere. Announcing Request for Nominations for Public-Key Post-Quantum Cryptographic Algorithms Bruce Schneier: NIST is Continuing to Work on Post-Quantum-Computing Cryptography Standards IT World, Maria Korolov: Experts split on how soon quantum computing is coming, but say we should start preparing now Číst dál...
03. ledna 2017 | From abstract—The static power consumption of modern CMOS devices has become a substantial concern in the context of the side-channel security of cryptographic hardware. The continuous growth of the leakage power dissipation in nanometer-scaled CMOS technologies is not only inconvenient for effective low power designs, but does also create a new target for power analysis adversaries. In this paper, we present the first experimental results of a static power side-channel analysis targeting an ASIC implementation of a provably first-order secure hardware masking scheme. Číst dál...
20. prosince 2016 | Described are here shortly some basic terms: Plain Text, Hashing, Salting, Peppering, Encryption, Hexadecimal MD5, SHA-1, SHA-2, Bcrypt, PBKDF2, Scrypt Číst dál...
20. prosince 2016 | A new study conducted by Dimensional Research evaluated current and projected growth rates of cryptographic keys and digital certificates in the enterprise for 2016 and 2017. Study respondents included 505 IT professionals that manage these critical cryptographic assets in the U.S., U.K., France and Germany. Key study findings: 58 percent say their organizations used more than 2500 keys and certificates in 2016. One in four organizations used more than 10,000 keys. In 2016, 50 percent saw their key and certificate use grow by more than 25 percent and one in five say key and certificate usage has increased by more than 50 percent. 49 percent say key and certificate use will grow by more than 25 percent over the next 12 months. Although 96 percent say that key and certificate management is part of their security program, only 34 percent say they manage their keys and certificates centrally Číst dál...
20. prosince 2016 | Custom-made Thunderbolt devices can be used to extract the encryption password from locked Macs. The attack is possible because devices connected over Thunderbolt can access the computer"s RAM directly before the OS is started through the direct memory access (DMA) feature. Číst dál...
Výběr a umístění zpráv na této stránce určuje automaticky počítačový program. Zobrazený čas nebo datum udává, kdy byl záznam přidán do naší databáze nebo zde byl aktualizován.
RSS kanály: | |
+420 723 846 377
info@pandatron.cz
Všechna práva vyhrazena | mobilní verze | © Copyright 2000 - 2017 ISSN 1803-6007