LinuxSecurity.com
Share your story
The central voice for Linux and Open Source security news
Home News Topics Advisories HOWTOs Features Newsletters About Register

Welcome!
Sign up!
EnGarde Community
Login
Polls
What is the most important Linux security technology?
 
Advisories
Community
Linux Events
Linux User Groups
Link to Us
Security Center
Book Reviews
Security Dictionary
Security Tips
SELinux
White Papers
Featured Blogs
All About Linux
DanWalsh LiveJournal
Securitydistro
Latest Newsletters
Linux Security Week: April 7th, 2014
Linux Advisory Watch: April 4th, 2014
Subscribe
LinuxSecurity Newsletters
E-mail:
Choose Lists:
About our Newsletters
RSS Feeds
Get the LinuxSecurity news you want faster with RSS
Powered By

  
Cryptography
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.



Cryptographers Attack NSA's Secret Effort to Subvert Internet Security  17 September 2013 
Source: Slate - Posted by Alex   
Cryptographers are fighting back against efforts by spy agencies to secretly weaken the encryption standards designed to keep the Internet secure.
 
Conspiracy Theories and the NSA  06 September 2013 
Source: Schneier on Security - Posted by Anthony Pell   
I've recently seen two articles speculating on the NSA's capability, and practice, of spying on members of Congress and other elected officials. The evidence is all circumstantial and smacks of conspiracy thinking -- and I have no idea whether any of it is true or not -- but it's a good illustration of what happens when trust in a public institution fails.
 
'Cryptopalypse' Now: Looming Security Crisis  19 August 2013 
Source: tom's guide - Posted by Dave Wreski   
The Internet, and many forms of online commerce and communication that depend on it, may be on the brink of a "cryptopalypse" resulting from the collapse of decades-old methods of shared encryption.
 
Zimmermann’s Law: PGP inventor and Silent Circle co-founder Phil Zimmermann  12 August 2013 
Source: GigaOM - Posted by Dave Wreski   
Phil Zimmermann, creator of PGP, in a wide-ranging interview talks about the corrupting nature of big data, the end of privacy and the rise of the surveillance society. He also shared his thoughts on Moore’s Law and its marriage to public policy, and why Silent Circle shutdown its email-service.
 
Matthew Green on Crypto Advances, the BREACH Attack and the Longevity of the RSA Algorithm  09 August 2013 
Source: ThreatPost - Posted by Dave Wreski   
Dennis Fisher talks with Matthew Green of Johns Hopkins University about the crypto advances in recent years, the BREACH attack revealed at Black Hat and whether it’s time to start moving away from the RSA algorithm.
 
Twitter's Two-Factor Authentication System  08 August 2013 
Source: Schneier on Security - Posted by Dave Wreski   
Twitter just rolled out a pretty nice two-factor authentication system using your smart phone as the second factor: The new two-factor system works like this. A user enrolls using the mobile app, which generates a 2048-bit RSA keypair. The private key lives on the phone itself, and the public key is uploaded to Twitter’s server.
 
Inside the Tor exploit  05 August 2013 
Source: ZDNet Blogs - Posted by Alex   
Some of the people who were most concerned about Internet privacy, and we're using the Tor anonymous Internet service to protect it, may have been the most exposed.
 
A Couple of SSH Brute Force Compromises  26 July 2013 
Source: SANS/ISC - Posted by Dave Wreski   
One common and stupidly simple way hosts are compromissed is weak SSH passwords. You would think people have learned by now, but evidently there are still enough systems with root passwords like 12345 around to make scanning for them a worthwhile exercise.
 
Feds put heat on Web firms for master encryption keys  24 July 2013 
Source: CNET - Posted by Dave Wreski   
Whether the FBI and NSA have the legal authority to obtain the master keys that companies use for Web encryption remains an open question, but it hasn't stopped the U.S. government from trying.
 
Documents Reveal How the NSA Cracked the Kryptos Sculpture Years Before the CIA  11 July 2013 
Source: Wired - Posted by Dave Wreski   
It took more than eight years for a CIA analyst and a California computer scientist to crack three of the four coded messages on the CIA’s famed Kryptos sculpture in the late ’90s.
 
<< Start < Prev 4 5 6 Next > End >>

Results 41 - 50 of 1086
    
Partner

 

Latest Features
Peter Smith Releases Linux Network Security Online
Securing a Linux Web Server
Password guessing with Medusa 2.0
Password guessing as an attack vector
Squid and Digest Authentication
Squid and Basic Authentication
Demystifying the Chinese Hacking Industry: Earning 6 Million a Night
Free Online security course (LearnSIA) - A Call for Help
What You Need to Know About Linux Rootkits
Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition
Weekend Edition
Heartbleed: Security experts reality-check the 3 most hysterical fears
Open source trounces proprietary software for code defects, Coverity analysis finds
Partner Sponsor

Community | HOWTOs | Blogs | Features | Book Reviews | Networking
 Security Projects |  Latest News |  Newsletters |  SELinux |  Privacy |  Home
 Hardening |   About Us |   Advertise |   Legal Notice |   RSS |   Guardian Digital
(c)Copyright 2014 Guardian Digital, Inc. All rights reserved.