Pages Navigation Menu

SHOWFUN - Show & Fun & More!

NIST report says we urgently need more work in post-quantum cryptography

Posted on 05/10 16:46 in Shows | 0

The study of how to keep encrypting messages even in the face of exponentially increased computing power is called “post-quantum cryptography,” or “quantum-resistant cryptography,” and the reality is that nobody knows quite how urgent it really is.NIST is planning a post-quantum competition to try to stimulate more work in the area.

Read More

Hospital pays ransomware, but doesn’t get files decrypted

Posted on 05/26 00:09 in Shows | 0

Rather than unlock the hospital’s files, they asked for more money.It doesn’t matter if you’re a regular internet user or the IT guy at a hospital, a ransomware infection has the same consequences.

Read More

Samsung plans to add intrusive advertising to its smart TVs

Posted on 06/01 20:51 in Shows | 0

As a result, it’s reportedly testing programs that would add new advertisements to the main menu bar of its higher-end televisions.When Samsung introduced advertising in 2012, the ads were only shown if the user first clicked the apps button.

Read More

Apple opens iPhone kernel to improve performance without reducing security

Posted on 06/24 16:15 in Shows | 0

For the last few years, Apple has made security and privacy cornerstones of its iOS development process.While that case ended without resolving the core question at hand, the FBI dropped the case because it claimed it now had access to the data it wanted from the iPhone — even without Apple’s help.

Read More

Computer coughs up passwords, encryption keys through its cooling fans

Posted on 06/29 21:16 in Shows | 0

(The term pre-dates wireless internet, and a Wi-Fi-connected computer is not air-gapped, despite the literal gap of air around it.) So how do you hack your way into an air-gapped computer?

Read More

Google is testing a Chrome browser that adds post-quantum encryption

Posted on 07/12 17:58 in Shows | 0

In a truly forward-thinking move, Google is getting serious about the effort to future-proof internet security: user’s of the tech giant’s test-phase browser, Chrome Canary, can start testing a so-called post-quantum cryptographic technology aimed at making users immune from next-next-generation cryptographic attacks.Enter, post-quantum cryptography and, in the case of this new experiment from Google, a software solution called CECPQ1.

Read More

In bid to achieve quantum encryption, China set to finish 2,000-kilometer 'quantum link'

Posted on 10/28 21:20 in Shows | 0

Now, China is nearing completion of another major facet in its push for a quantum phone at the capital building: a 2,000-kilometer fiber-optic line for ferrying quantum encryption keys.It’s the beginning of China’s roll-out of true quantum encryption technology.

Read More

New ransomware offers to restore your files for free - if you infect two friends

Posted on 12/12 22:26 in Shows | 0

These pieces of malware encrypt your files and won’t unlock them unless you pay, but the new “Popcorn Time” ransomware offers an alternative: Just infect some friends and you get your files back free.There are various warnings about losing access to your files, and even a function that can delete your files completely if you enter the wrong decryption key four times.

Read More

Symantec caught once again improperly issuing illegitimate HTTPS certificates

Posted on 01/23 15:22 in Shows | 0

Roughly 16 months ago, Symantec was caught distributing improperly signed cryptographic certificates that could be used to break HTTPS protection and put users’ at risk.Now, the company has been caught once again doing something similar — even though such activity is directly against the agreements it made when caught breaking things last time.

Read More

Jeff Sessions, Trump's pick for attorney general, will likely renew fight against strong encryption

Posted on 01/26 13:40 in Shows | 0

But Apple’s staunch defense and widespread dissent in the court of public opinion led the bureau to back down.Jeff Sessions (R-AL), President Trump’s choice for attorney general, is unlikely to let that decision stand once he is confirmed — and he’s expected to be confirmed with strong Republican support.

Read More

explains: All about the dark web, and how to use it

Posted on 03/01 17:50 in Shows | 0

In fact, under the hood, the dark web is the same as the regular web, with two important exceptions that also distinguish the dark web from the deep web.That relative inaccessibility is because the dark web uses a complete, but fundamentally different, network addressing system than the web addresses most of us know and use.

Read More

Registering a Domain Accidentally Triggered Ransomware's Kill Switch

Posted on 05/15 22:13 in Shows | 0

The UK’s national Health Service (NHS) and Spanish telco Telefónica were among the most high-profile victims of the WannaCry malware, also known as WanaCrypt0r 2.As bad as the infection was, it could have been much worse if not for a security writer and researcher stumbling upon its kill switch.

Read More