cryptography

  • WPA2 shown to be vulnerable to key reinstallation attacks

    WPA2 shown to be vulnerable to key reinstallation attacks

    A key reinstallation attack vulnerability in the WPA2 wi-fi protocol has been made public today. Security researcher Mathy Vanhoef has identified what he dubs a “serious weakness” in the wireless protocol. Read More

  • N.Y. regulators issued Equifax with a subpoena, per report

    N.Y. regulators issued Equifax with a subpoena, per report

    Equifax was issued a subpoena from New York state’s financial service regulators in regards to the massive data breach the company announced last month, Reuters reported today. The regulators want Equifax to provide more information, which is about right since it seems like Equifax has changed the story several times since the first announcement. Specifically, Reuters states the subpoena… Read More

  • A Google security chief considers the NSA a state-sponsored threat

    A Google security chief considers the NSA a state-sponsored threat

    Today at TechCrunch Disrupt SF 2017 Google’s Manager of Information Security Heather Adkins sat down for a fireside chat. Among the varying topics discussed, she spoke about what’s like to have the NSA tap the company’s lines and how she views state sponsored threats. Moderator and TechCrunch Senior Editor Frederic Lardinois asked Adkins if she thinks of the NSA as a… Read More

  • New Bluetooth vulnerability can hack a phone in 10 seconds

    New Bluetooth vulnerability can hack a phone in 10 seconds

    Security company Armis has found a collection of eight exploits, collectively called BlueBorne, that can allow an attacker access to your phone without touching it. The attack can allow access to computers and phones, as well as IoT devices. “Armis believes many more vulnerabilities await discovery in the various platforms using Bluetooth. These vulnerabilities are fully operational, and… Read More

  • A perfect storm of corporate idiocy

    A perfect storm of corporate idiocy

    At this point in the game there should be a single page on every corporate website, preferably accessible from its front page, that includes the name and all contact details for the Chief Security Officer, including the last four digits of her social security number. It should be her responsibility to ensure that no one uses this information for nefarious purposes in addition to her daily… Read More

  • It’s time to build our own Equifax with blackjack and crypto

    It’s time to build our own Equifax with blackjack and crypto

    The private data of 143 million Equifax “customers” is now available for download. Have no doubt: This means you will be hacked. This means your SIM card can be spoofed. This means someone will try to get into your email and online accounts. This means someone will try to open a credit card in your name. This crass, callow, and lazy treatment of our digital data cannot stand. Read More

  • Enigma will refund ICO investors who lost $500,000 to scammers

    Enigma will refund ICO investors who lost $500,000 to scammers

    Enigma, the investment platform that is preparing for an ICO next month, confirmed today that it will refund members of its community who lost money after a scammer compromised its social accounts. Around $500,000 in crypto coins were stolen on Monday after a hacker fooled prospective investors in Enigma’s ICO into sending Ethereum to their wallet. The attacker gained access to… Read More

  1. 1
  2. 2
  3. ...