• New solution helps thwart “smash-and-grab” credential theft

    Of the data breaches investigated in 2011, servers were among the primary target assets in 64 percent of investigations and those accounted for 94 percent of compromised records; a new solution from RSA scrambles, randomizes, and splits authentication credentials across multiple servers, data centers, and the cloud

  • ElcomSoft, Pico Computing show world's fastest password-cracking solution

    Pico Computing manufactures a range of high-end hardware acceleration platforms, offering a computational equivalent of more than 2,000 dual-core processors in a single 4U chassis; ElcomSoft updates its range of password recovery tools, employing Pico Field Programmable Gate Array (FPGA)-based hardware to accelerate the recovery of passwords

  • Military-grade mobile security for commercial markets

    Cummings Engineering announced the release of SecureMobile 1.0, powered its proprietary SAIFE encryption technology

  • Yucca Mountain as a data depository

    For nearly three decades, Yucca Mountain was the place designated as the country’s nuclear waste repository; after many years of study and exploration, the Obama administration, two years ago, decided not to ask for additional funds for the project; now there is another idea for the site: turning it into a giant, secure data center 

  • view counter
  • Free mobile security to U.S. government agencies

    A company offers its mobile security solutions, free of charge, to U.S. defense agencies; the offer is part of the NSA/CSS Co-operative Research and Development Agreement

  • Closing digital security gaps

    Two European research centers, one German the other from Luxemburg, have recently agreed on a mutual course for the strategic development of new and integrative approaches to addressing key IT security concerns

  • view counter
  • Companies hiring hackers to harden defenses

    To burglar-proof your home, it is best hire a burglar as a consultant, as he is more likely to find the security vulnerabilities and demonstrate how they can be exploited; following this approach, companies large and small are now hiring hackers to test the companies’ security system vulnerabilities and find ways to harden these systems to withstand intrusion

  • WWII-like message encryption now available for e-mail security

    A Singapore-based company offers an e-mail encryption system based on the Verman cipher, or one-time pad, which was invented in 1917 and used by spies in the Second World War; the Vernam cipher is unbreakable because it produces completely random cipher-text that secures data so that even the most powerful super computers can not break the encryption when it is used properly

  • Cambridge first year student wins U.K. Cybersecrity Challenge competition

    Cyber Security Challenge U.K. announces a winner and unveils this year’s new Challenge program (open for registrations as of yesterday); the winner, Jonathan Millican, competed with thousands of registered candidates in 6-month competition

  • Anonymous retaliates, takes down Interpol site

    In retaliation for the arrest of twenty-five suspected members of the hacktivist collective known as Anonymous, the group briefly took down Interpol’s website on Tuesday

  • Cryptographic attack shows importance of bug-free software

    Researchers have developed an attack that can circumvent the security OpenSSL should provide; the attack worked on a very specific version of the OpenSSL software, and only when a specific set of options were used

  • HP wins $47M contract to support HSPD-12 implementation

    On Monday the U.S. General Services Administration (GSA) announced it had awarded Hewlett Packard a one-year contract worth as much as $47 million to support government-compliance with Homeland Security Presidential Directive-12 (HSPD-12)

  • DHS to work with Netherlands on cybersecurity

    On Wednesday DHS Secretary Janet Napolitano signed a letter of intent to work with the Netherlands on several critical cybersecurity initiatives

  • Quantum physics makes possible perfectly secure cloud computing

    Computer data processing and storage are increasingly done in the cloud; the challenge in cloud-based system is to ensure that clients’ data stays private; researchers have now shown that perfectly secure cloud computing can be achieved with quantum computers

  • Quantum technique for secret messaging

    Quantum cryptography is the ultimate secret message service; new research shows it can counter even the ultimate paranoid scenario: when the equipment or even the operator is in the control of a malicious power