Tag Archives: Bezpečnosť

Using Hardware Token-based 2FA with the WebAuthn API

Tým, že | Januára 16, 2018

To present increased safety for logins, web sites are deploying two-factor authentication (2FA), usually utilizing a smartphone software or textual content messages. These mechanisms make phishing more durable however fail to stop it completely customers can nonetheless be tricked into passing alongside codes, and SMS messages might be intercepted in varied ways. Firefox 60 will… Prečítajte Si Viac »

Spectre And Meltdown Explained

Tým, že | Januára 8, 2018

I discovered this nice article of Anton Gostev about Spectre and Meltdown, so I’m reposting it right here : By now, most of you will have most likely already heard of the largest catastrophe within the historical past of IT Meltdown and Spectre safety vulnerabilities which have an effect on all fashionable CPUs, from these… Prečítajte Si Viac »

Symantec Breaks Belief with the Internet?

Tým, že | Október 29, 2017

Symantec is no doubt one in each of the firms thatholds the keys to the Web: they’re a trusted certificates authority for authenticating main web pages. All main browsers acknowledge Symantec as a reliable supply of SSL/TLS authentication certificates. Symantec (also identified by its subsidiary title Verisign) ispart of a sequence of belief that retains… Prečítajte Si Viac »

Election Crypto Conspiracy Theory

Tým, že | Október 29, 2017

Im not typically a fan of conspiracy theories, aside from leisure worth. This one is fascinating as a end result of it combines worldwide intrigue, the elections, and our world of notoriously poor electronic mail security. The conspiracy arises from foreigners making an attempt to affect the US election. They spy on unprotected emails and… Prečítajte Si Viac »

#PodestaEmails Are NOT Apparent Fakes

Tým, že | Október 28, 2017

Emails are notoriously arduous to validate. Emails are like typed, signed contracts with no part or web page numbers: you’ll give you the chance to take out or add no matter pages you need so lengthy as you retain thesignatures. Intelligence skilled Malcom Nance has tweeted that Wikileaks latest assortment of Podesta emails contain apparent… Prečítajte Si Viac »

Cryptosmith Video Series

Tým, že | Október 28, 2017

The Cryptosmith video series makes use of animation to clarify well-known crypto methods. This could assist extra individuals perceive crypto know-how. That is significantly essential as individuals rely increasingly on cellular and Web safety mechanisms. Apart from defending on-line commerce and monetary actions, many professionals are realizing that their every day actions require sturdy protection.… Prečítajte Si Viac »

How DVD Crypto Keys Work

Tým, že | Október 28, 2017

Here are a few short videos that describe the essential cryptographic mechanisms utilized in DVDs. These dont fairly match into my Cryptosmith series, no much less than, not proper now. Theyre quick and attention-grabbing, so I went forward and posted them. Zdieľať toto:Like this:Like Loading… [Celkom: 0    Priemerná: 0/5]

Tiptoeing By Means Of Vulnerabilities

Tým, že | Október 28, 2017

I sympathize with builders who throw up their palms and say, I dont do safety stuff. It does not matter what you select, theres a commerce off that would go mistaken. Its particularly troublesome if one deploys a safety web site. Ive deployed safety schooling web sites in lots of environments over the previous 20… Prečítajte Si Viac »

Comparing Leaks: Trump Vs. Hillary

Tým, že | Október 28, 2017

As I mentioned in an earlier post, no crime is dedicated if the suitable official leaks delicate labeled info. This is applicable to each Secretary Clintons electronic mail serverand President Trumps unfortunate assembly with Russian diplomats. Each carried the authority to reveal what they disclosed. One query stays: what damagemight have ensued from eachleak? I… Prečítajte Si Viac »

The Large Bug Within the Information: the WPA2 Flaw

Tým, že | Október 28, 2017

The massive information this week is a protocol flaw within the Wi-fi Protected Entry protocol, model 2 (WPA2). The Ars Technica article covers the small print fairly nicely. That is what each Wi-Fi wi-fi router on the planet makes use of lately. The issue does notinstantly injury your system, however it could well uncover knowledge… Prečítajte Si Viac »