Items Tagged with "Encryption"


Bddc4983168ae96da4b83bdd01b51548

Pump Up Your P@$$w0rd$

April 03, 2012 Added by:Kevin Doel

The idea is to choose phrase that you will be able to remember and a simple algorithm for converting it to a strong password. Even the best encryption systems are not going to protect your data if you use weak passwords and a hacker gains physical access to your mobile device...

Comments  (2)

7ddc1f3000a13e4dfec28074e9e7b658

Vague Cybersecurity Legislation Threatens Civil Liberties

April 02, 2012 Added by:Electronic Frontier Foundation

Using cryptography to protect communications could be taken as a way to defeat an operational control. Measuring the performance of one's ISP or analyzing whether packets are being modified maliciously could all be seen as security threats under this definition...

Comments  (1)

99edc1997453f90eb5ac1430fd9a7c61

CISSP Reloaded Domain 4: Cryptography

March 28, 2012 Added by:Javvad Malik

Cryptography, the dark art of information security. The deus-ex-machina, the silver bullet, the be all and end all of all security measures, so profound cryptography was first classed as a munitions. Widely misunderstood, often poorly implemented...

Comments  (1)

Bddc4983168ae96da4b83bdd01b51548

Shutting Front and Back Door Access to Your Mobile Devices

March 27, 2012 Added by:Kevin Doel

A lost or stolen phone constitutes a serious security threat to the information on the device because the attacker has unlimited time to gain access to the secrets that are stored therein. Important personal information should not be stored in any unsecured note application...

Comments  (0)

3e35900ae6facc6c146a85c435c71d82

Public Key Infrastructure 1998 – 2012

March 25, 2012 Added by:Ben Rothke

PKI was and still is a powerful set of technologies. But it was a solution far ahead of its time. It was doomed by a lack of standards, interoperability issues, deployment complexities, and a level of complication that confounded even technologically competent end-users...

Comments  (1)

F29746c6cb299c1755e4087e6126a816

Fifteen Unsafe Security Practices that Lead to Data Breaches

March 21, 2012 Added by:Kelly Colgan

Database security is an essential element of overall security maturity at enterprise level. Underestimating its value and not dedicating sufficient attention to developing a comprehensive data security plan can, in many instances, lead to data compromise...

Comments  (1)

3e35900ae6facc6c146a85c435c71d82

Liars and Outliers: Enabling the Trust that Society Needs to Thrive

March 20, 2012 Added by:Ben Rothke

Liars and Outliers is an absolutely fascinating and groundbreaking book. In this election year where the candidates attempt to make sweeping simplistic promises to fix complex problems, Schneier simply answers that in our complex society, there are no simple answers...

Comments  (0)

0f57a863af3b7e5bf59a94319a408ff7

Assessment of Visual Voicemail Security

March 19, 2012 Added by:Enno Rey

After activation of the VVM feature, the configuration file is stored containing the username, protocol, state of the account and the server IP. Having the username and server IP an attacker can run brute force attacks against the email server which is exposed to the Internet...

Comments  (6)

Fc152e73692bc3c934d248f639d9e963

Examining the Top Ten Database Threats

March 14, 2012 Added by:PCI Guru

Most attacks are perpetrated inside the perimeter, so protection from an inside attack is important. Once an attacker is on the inside, it is easy to use SQL injection or other techniques to obtain data. Organizations are just beginning to understand the insider threat...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

CyLab Researchers Release Free Smartphone Security App

March 14, 2012 Added by:Headlines

"SafeSlinger provides you with the confidence that the person you are communicating with is actually the person they have represented themselves to be... SafeSlinger provides secure communications and file transfer even if the servers involved are tainted with malware..."

Comments  (0)

37d5f81e2277051bc17116221040d51c

How Safe is Paying Online with Your Smart Phone?

March 13, 2012 Added by:Robert Siciliano

Handset manufacturers, application developers, and mobile security vendors continue working to improve mobile security. Banks are offering a consistent sign-on experience for both their online and mobile channels, including multifactor authentication programs for mobile...

Comments  (0)

7ddc1f3000a13e4dfec28074e9e7b658

A Tale of Two Encryption Cases

March 12, 2012 Added by:Electronic Frontier Foundation

The issue in the decryption cases is not whether the decrypted contents of the computer are testimonial. Instead, the issue in these cases is whether the ACT of decrypting information on the computer is testimonial. The answer to that question is that it depends...

Comments  (0)

7ddc1f3000a13e4dfec28074e9e7b658

HTTPS and Tor: Working to Protect Your Security Online

March 09, 2012 Added by:Electronic Frontier Foundation

EFF frequently recommends that Internet users who are concerned about protecting their anonymity and security online use HTTPS Everywhere, which encrypts your communications with many websites, in conjunction with Tor, which helps to protect your anonymity online...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Researchers Successfully Hacked Online Voting System

March 07, 2012 Added by:Headlines

"Within 48 hours of the system going live, we had gained nearcomplete control of the election server. We successfully changed every vote and revealed almost every secret ballot. Election officials did not detect our intrusion for nearly two business days..."

Comments  (0)

03b2ceb73723f8b53cd533e4fba898ee

NASA Unprepared for Cyber Attacks

March 05, 2012 Added by:Pierluigi Paganini

The internal investigation at NASA also revealed that almost none of the agency's portable devices are encrypted, and that at least one of the stolen laptops contained algorithms to command and control systems for the International Space Station...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

OTA Advocates Always On SSL

March 05, 2012 Added by:Headlines

Online Trust Alliance (OTA) is calling on the security, business and interactive advertising communities to adopt Always On SSL (AOSSL), the approach of using SSL/TLS across your entire website to protect users with persistent security, from arrival to login to logout...

Comments  (0)

Page « < 4 - 5 - 6 - 7 - 8 > »