-
New solution helps thwart “smash-and-grab” credential theft
Of the data breaches investigated in 2011, servers were among the primary target assets in 64 percent of investigations and those accounted for 94 percent of compromised records; a new solution from RSA scrambles, randomizes, and splits authentication credentials across multiple servers, data centers, and the cloud
-
-
ElcomSoft, Pico Computing show world's fastest password-cracking solution
Pico Computing manufactures a range of high-end hardware acceleration platforms, offering a computational equivalent of more than 2,000 dual-core processors in a single 4U chassis; ElcomSoft updates its range of password recovery tools, employing Pico Field Programmable Gate Array (FPGA)-based hardware to accelerate the recovery of passwords
-
-
Military-grade mobile security for commercial markets
Cummings Engineering announced the release of SecureMobile 1.0, powered its proprietary SAIFE encryption technology
-
-
Yucca Mountain as a data depository
For nearly three decades, Yucca Mountain was the place designated as the country’s nuclear waste repository; after many years of study and exploration, the Obama administration, two years ago, decided not to ask for additional funds for the project; now there is another idea for the site: turning it into a giant, secure data center
-
-
Free mobile security to U.S. government agencies
A company offers its mobile security solutions, free of charge, to U.S. defense agencies; the offer is part of the NSA/CSS Co-operative Research and Development Agreement
-
-
Closing digital security gaps
Two European research centers, one German the other from Luxemburg, have recently agreed on a mutual course for the strategic development of new and integrative approaches to addressing key IT security concerns
-
-
Companies hiring hackers to harden defenses
To burglar-proof your home, it is best hire a burglar as a consultant, as he is more likely to find the security vulnerabilities and demonstrate how they can be exploited; following this approach, companies large and small are now hiring hackers to test the companies’ security system vulnerabilities and find ways to harden these systems to withstand intrusion
-
-
WWII-like message encryption now available for e-mail security
A Singapore-based company offers an e-mail encryption system based on the Verman cipher, or one-time pad, which was invented in 1917 and used by spies in the Second World War; the Vernam cipher is unbreakable because it produces completely random cipher-text that secures data so that even the most powerful super computers can not break the encryption when it is used properly
-
-
Cambridge first year student wins U.K. Cybersecrity Challenge competition
Cyber Security Challenge U.K. announces a winner and unveils this year’s new Challenge program (open for registrations as of yesterday); the winner, Jonathan Millican, competed with thousands of registered candidates in 6-month competition
-
-
Anonymous retaliates, takes down Interpol site
In retaliation for the arrest of twenty-five suspected members of the hacktivist collective known as Anonymous, the group briefly took down Interpol’s website on Tuesday
-
-
Cryptographic attack shows importance of bug-free software
Researchers have developed an attack that can circumvent the security OpenSSL should provide; the attack worked on a very specific version of the OpenSSL software, and only when a specific set of options were used
-
-
HP wins $47M contract to support HSPD-12 implementation
On Monday the U.S. General Services Administration (GSA) announced it had awarded Hewlett Packard a one-year contract worth as much as $47 million to support government-compliance with Homeland Security Presidential Directive-12 (HSPD-12)
-
-
DHS to work with Netherlands on cybersecurity
On Wednesday DHS Secretary Janet Napolitano signed a letter of intent to work with the Netherlands on several critical cybersecurity initiatives
-
-
Quantum physics makes possible perfectly secure cloud computing
Computer data processing and storage are increasingly done in the cloud; the challenge in cloud-based system is to ensure that clients’ data stays private; researchers have now shown that perfectly secure cloud computing can be achieved with quantum computers
-
-
Quantum technique for secret messaging
Quantum cryptography is the ultimate secret message service; new research shows it can counter even the ultimate paranoid scenario: when the equipment or even the operator is in the control of a malicious power
-