Smart light bulbs could give away your password secrets
Naked Security » Cryptography
by Paul Ducklin
9M ago
Cryptography isn't just about secrecy. You need to take care of authenticity (no imposters!) and integrity (no tampering!) as well ..read more
Visit website
S3 Ep147: What if you type in your password during a meeting?
Naked Security » Cryptography
by Paul Ducklin
9M ago
Latest episode - listen now! (Full transcript inside ..read more
Visit website
S3 Ep145: Bugs With Impressive Names!
Naked Security » Cryptography
by Paul Ducklin
10M ago
Fascinating fun (with a serious and educational side) - listen now! Full transcript available inside ..read more
Visit website
Microsoft hit by Storm season – a tale of two semi-zero days
Naked Security » Cryptography
by Paul Ducklin
10M ago
The first compromise didn't get the crooks as far as they wanted, so they found a second one that did ..read more
Visit website
S3 Ep125: When security hardware has security holes [Audio + Text]
Naked Security » Cryptography
by Paul Ducklin
1y ago
Lastest episode - listen now! (Full transcript inside ..read more
Visit website
Serious Security: TPM 2.0 vulns – is your super-secure data at risk?
Naked Security » Cryptography
by Paul Ducklin
1y ago
Security bugs in the very code you've been told you must have to improve the security of your computer ..read more
Visit website
DoppelPaymer ransomware supsects arrested in Germany and Ukraine
Naked Security » Cryptography
by Naked Security writer
1y ago
Devices seized, suspects interrogated and arrested, allegedly connected to devastating cyberattack on University Hospital in Düsseldorf ..read more
Visit website
S3 Ep124: When so-called security apps go rogue [Audio + Text]
Naked Security » Cryptography
by Paul Ducklin
1y ago
Rogue software packages. Rogue "sysadmins". Rogue keyloggers. Rogue authenticators. Rogue ROGUES ..read more
Visit website
Beware rogue 2FA apps in App Store and Google Play – don’t get hacked!
Naked Security » Cryptography
by Paul Ducklin
1y ago
Even in Apple's and Google's "walled gardens", there are plenty of 2FA apps that are either dangerously incompetent, or unrepentantly malicious. (Or perhaps both ..read more
Visit website
Serious Security: GnuTLS follows OpenSSL, fixes timing attack bug
Naked Security » Cryptography
by Paul Ducklin
1y ago
Conditional code considered cryptographically counterproductive ..read more
Visit website

Follow Naked Security » Cryptography on FeedSpot

Continue with Google
Continue with Apple
OR