LinuxSecurity.com
Share your story
The central voice for Linux and Open Source security news
Home News Topics Advisories HOWTOs Features Newsletters About Register

Welcome!
Sign up!
EnGarde Community
Login
Polls
What is the most important Linux security technology?
 
Advisories
Community
Linux Events
Linux User Groups
Link to Us
Security Center
Book Reviews
Security Dictionary
Security Tips
SELinux
White Papers
Featured Blogs
All About Linux
DanWalsh LiveJournal
Securitydistro
Latest Newsletters
Linux Advisory Watch: September 19th, 2014
Linux Security Week: September 15th, 2014
Subscribe
LinuxSecurity Newsletters
E-mail:
Choose Lists:
About our Newsletters
RSS Feeds
Get the LinuxSecurity news you want faster with RSS
Powered By

  
Cryptography
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.



NSA spying prompts open TrueCrypt encryption software audit to go viral  11 November 2013 
Source: Network World - Posted by Anthony Pell   
A unique effort to crowdsource a security audit of the popular TrueCrypt open source encryption software appears to be going viral three weeks after it was launched by two U.S. based researchers in response to concerns that the National Security Agency may have tampered with it.
 
SSL Study Shows Most Sites Incorrectly Configured  08 November 2013 
Source: eSecurity Planet - Posted by Dave Wreski   
Secure Sockets Layer is a standard mechanism websites use to help secure data and transactions, but according to Qualys security researcher Ivan Ristic, most SSL sites are actually misconfigured. Ristic delivered his study here at the Black Hat security conference as an update to the preliminary data he published last month.
 
Defending Against Crypto Backdoors  22 October 2013 
Source: Schneier on Security - Posted by Anthony Pell   
We already know the NSA wants to eavesdrop on the Internet. It has secret agreements with telcos to get direct access to bulk Internet traffic. It has massive systems like TUMULT, TURMOIL, and TURBULENCE to sift through it all. And it can identify ciphertext -- encrypted information -- and figure out which programs could have created it.
 
Cracking Open Encryption Standards  21 October 2013 
Source: Science Friday - Posted by Dave Wreski   
Recent revelations about the extent of NSA surveillance have put even the standards by which encryption systems are designed into question. Encryption experts Matthew Green, Phillip Zimmermann, and Martin Hellman discuss what makes a code secure and the limits of privacy in the modern age.
 
How the NSA Attacks Tor/Firefox Users With QUANTUM and FOXACID  08 October 2013 
Source: Schneier on Security - Posted by Alex   
The online anonymity network Tor is a high-priority target for the National Security Agency. The work of attacking Tor is done by the NSA's application vulnerabilities branch, which is part of the systems intelligence directorate, or SID. The majority of NSA employees work in SID, which is tasked with collecting data from communications systems around the world.
 
Goodbye, Encryption; Hello, FOSS  03 October 2013 
Source: Linux Insider - Posted by Dave Wreski   
"For years Linux has had a false sense of security, mainly because of the 'many eyes make bugs shallow' myth," Slashdot blogger hairyfeet suggested. "Seriously, show of hands: How many have done a code audit of LibreOffice? Firefox? Chromium?
 
NSA encryption-defeating efforts will backfire  02 October 2013 
Source: IDG - Posted by Dave Wreski   
The U.S. National Security Agency's efforts to defeat encryption will backfire by eroding trust in U.S.-based Internet services and in the agency's own efforts to aid U.S. companies with cybersecurity, a group of privacy advocates said Tuesday.
 
Hack of major data brokers weakens bank authentication  01 October 2013 
Source: CSO Online - Posted by Dave Wreski   
The reported hack of major consumer and business data aggregators has intensified doubts of the reliability of knowledge-based authentication widely used in the financial services industry, analysts say.
 
RSA: That NSA crypto-algorithm we put in our products? Stop using that  27 September 2013 
Source: The Register UK - Posted by Dave Wreski   
Security biz RSA has reportedly warned its customers to stop using the default random-number generator in its encryption products - amid fears spooks can easily crack data secured by the algorithm.
 
The devil and the details  20 September 2013 
Source: Economist - Posted by Dave Wreski   
Quantum cryptography has yet to deliver a truly unbreakable way of sending messages. Quantum entanglement may change that. RECENT revelations of online snooping on an epic scale, by government agencies which may well have been breaking the law, have prompted some users of the internet to ask who you can trust with sensitive data these days.
 
<< Start < Prev 7 8 9 Next > End >>

Results 61 - 70 of 1116
    
Partner

 

Latest Features
Peter Smith Releases Linux Network Security Online
Securing a Linux Web Server
Password guessing with Medusa 2.0
Password guessing as an attack vector
Squid and Digest Authentication
Squid and Basic Authentication
Demystifying the Chinese Hacking Industry: Earning 6 Million a Night
Free Online security course (LearnSIA) - A Call for Help
What You Need to Know About Linux Rootkits
Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition
Yesterday's Edition
Partner Sponsor

Community | HOWTOs | Blogs | Features | Book Reviews | Networking
 Security Projects |  Latest News |  Newsletters |  SELinux |  Privacy |  Home
 Hardening |   About Us |   Advertise |   Legal Notice |   RSS |   Guardian Digital
(c)Copyright 2014 Guardian Digital, Inc. All rights reserved.