Cryptography

We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.

Discover Cryptography News

Abyss Locker Ransomware Targets Linux & Windows Users

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

A ransomware variant dubbed "Abyss Locker" has been observed targeting Microsoft Windows and Linux platforms. The Abyss Locker ransomware is believed to be based on the HelloKitty ransomware source code. It steals and encrypts victims' files, demanding ransom for decryption and preventing the release of stolen data. The ransomware's severity level is classified as high, showcasing the urgency of addressing this issue.

Linux Foundation Forms Postquantum Cryptography Alliance

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The Linux Foundation recently announced the launch of the Post-Quantum Cryptography Alliance (PQCA). This open and collaborative initiative aims to address the security challenges posed by quantum computing through the development and adoption of post-quantum cryptography.

Quantum Cryptography Finally Commercialized

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Start-up MagiQ Technologies, from Somerville, Massachusetts, has released the first commercial implementation of quantum cryptography, the much-heralded solution to the perfect encryption cipher. Theoretically, encryption ciphers created using quantum physics are unbreakable. . .

Securing Your Linux Boot Process: An Insider's Guide to Secure Boot

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Boot security has become an increasingly important topic in recent years as threats against system integrity continue to evolve. Secure Boot is a security standard developed to provide protection against such threats by validating the integrity of boot software. With Secure Boot, security is enforceable during the boot process rather than relying solely on the operating system. This helps prevent malicious software from embedding itself early in the boot process, providing an additional layer of defense against low-level attacks.

World's Toughest Code Cracked

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

This Wired story describes the recent contest created to decipher 10 increasingly difficult codes set by author Simon Singh in his international bestseller The Code Book. Quite interesting. There's also the step-by-step analysis of what the Swedish cryptographers did in their . . .

CFP: Financial Cryptography '02

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Original papers are solicited on all aspects of financial data security and digital commerce for submission to the Sixth Annual Conference on Financial Cryptography (FC '02). FC '02 brings together researchers in the financial, legal, cryptologic, and data security fields to foster cooperation and exchange of ideas.. . .

Malicious Applications Hit Canonical's Snap Store

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Several fake cryptography applications have appeared on Canonical's Snap Store. These web application security vulnerabilities seek to steal user funds and inflict other damaging data and network security issues. Canonical is investigating the matter, and access is restricted while investigating the risky cryptography today.

GitHub Makes Passkeys Security Feature Available to All

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

GitHub has officially rolled out its passkeys security feature for general availability, following a two-month beta testing phase. Passkeys introduce a cloud-synced authentication system using cryptographic key pairs, allowing users to access websites and applications using their screen-lock PIN, biometrics, or physical security key.

News

Powered By

Footer Logo

Linux Security - Your source for Top Linux News, Advisories, HowTo's and Feature Release.

Powered By

Footer Logo