Crypto-World

Description:

e-zin věnovaný kryptologii a informační bezpečnosti

URL:

http://crypto-world.info

Catalog:

Tech → Bezpečnost

Publishes:

3 items/month

Policie zatkla cizince, do bankomatu montovali čtečku karet

1.May
Policisté v Praze zadrželi dva cizince těsně po tom, co do bankomatu nainstalovali skimmovací zařízení s cílem dostat se k penězům klientů. U zadržených mužů pak policisté zajistili i celou řadu nástrojů k páchání této trestné činnosti a vysílačky, informoval ve středu policejní mluvčí Jan Daněk.

Jak tvořit a pamatovat si hesla (2019)

12.January
Užitečný příspěvek "14 Ways to Create a Secure Password in 2019" na stále potřebné téma jak vytvářet a pamatovat si hesla od Jacka Forstera.

Přehled kvalitních bezplatných bezpečnostních programů

30.December
25+ Free Security Tools That You Need to Start Přehled bezplatných silných antivirových a dalších bezpečnostních programů, které vám mohou pomoci udržet vaše citlivé informace v bezpečí.

How to encrypt email (Gmail, Outlook iOS, OSX, Android, Webmail)

17.November
Email was one of the earliest forms of communication on the internet, and if you’re reading this you almost undoubtedly have at least one email address. Critics today decry the eventual fall of email, but for now it’s still one of the most universal means of communicating with other people that we have. One of the biggest problems with this cornerstone of electronic communication is that it isn...

Google: Security Keys Neutralized Employee Phishing

30.July
Google has not had any of its 85,000+ employees successfully phished on their work-related accounts since early 2017, when it began requiring all employees to use physical Security Keys in place of passwords and one-time codes, the company told KrebsOnSecurity. Security Keys are inexpensive USB-based devices that offer an alternative approach to two-factor authentication (2FA), which requires t...

Crypto gripes, election security, and mandatory cybersec school: Uncle Sam´s cyber task force emits todo list for govt

30.July
The US Department of Justice (DOJ) this week released the first report from its Cyber Digital Task Force – which was set up in February to advise the government on strengthening its online defenses. The report [PDF] , compiled by 34 people from six different government agencies, examines the challenges facing Uncle Sam´s agencies in enforcing the law and protecting the public from hackers. It a...

Quantum computing revenue to hit $15 billion in 2028 due to AI, R&D, cybersecurity

30.July
The demand for quantum computing services will be driven by some process hungry research and development projects as well as by the emergence of several applications including advanced artificial intelligence algorithms, next-generation encryption, traffic routing and scheduling, protein synthesis, and/or the design of advanced chemicals and materials. These applications require a new processin...

Cracking the Crypto War

27.May
Ray Ozzie thinks he has an approach for accessing encrypted devices that attains the impossible: It satisfies both law enforcement and privacy purists. (?)

Zimmerman and friends: ´Are you listening? PGP is not broken´

25.May
EFAIL furore not over yet, even though it´s easy to fix. However, PGP´s creator Phil Zimmerman, Protonmail´s Any Yenn, Enigmail´s Patrick Brunschwig, and Mailvelope´s Thomas Oberndörfer are still concerned that misinformation about the bug remains in the wild. Yenn tried to refute the EFAIL “don´t use PGP” on May 25 , and the four have followed up with this joint post .

Personal encryption usage is increasing

15.May
According to a Venafi survey of 512 security professionals attending RSA Conference 2018, sixty-four percent of respondents say their personal encryption usage has increased due to recent geopolitical changes.

Wah, encryption makes policing hard, cries UK´s National Crime Agency

15.May
Encryption is making it more difficult for law enforcement agencies to detect dangerous offenders, according the the National Crime Agency's (NCA) yearly assessment of serious organised crime in Britain. Since 2010, communication service providers have migrated to encrypted services ´by default´, a process that accelerated following the Snowden disclosures, said the National Strategic Assessmen...

New law would stop Feds from demanding encryption backdoor

15.May
US lawmakers from both major political parties came together on Thursday to reintroduce a bill that, if passed, would prohibit the American government from forcing tech product makers to undermine the security of their wares.

NIST starts down road toward IoT encryption

15.May
The National Institute of Standards and Technology wants comments on the best way to design criteria to evaluate new encryption standards for small computing devices. NIST will eventually ask researchers and cryptographers for algorithms that could be used to encrypt data on small, "constrained devices," such as sensors, RFID tags, industrial controllers and smart cards that are being incorpora...
© 2000-2019 ANNECA s.r.o., Klíšská 977/77, 400 01 Ústí nad Labem, Tel: +420 478571021, Email: info@pravednes.cz, Twitter: @pravednes