Three-Layer Encryption Method Awarded Patent

Thursday, May 15th, 2008

Eruces Data Security has secured a patent for its three-step encryption and key management scheme, which is designed to lock down data through its lifecycle. The security firm’s so-called Tricryption technology first encrypts the data itself with symmetric keys, and then encrypts the keys and stores them in a central key ...

Admins warned of brute-force SSH attacks

Wednesday, May 14th, 2008

Over the weekend, a number of network administrators issued warnings over an order-of-magnitude increase in the number of attempts to guess the username and password of systems running secure shell (SSH), the encrypted access method that replaced the common telnet service. System administrators at universities and some companies have reported ...

IronKey Unveils 8GB Version of Secure USB Drive

Friday, May 2nd, 2008

IronKey Inc., maker of the world's most secure flash drive, announced today availability of the 8GB-capacity of its IronKey secure USB devices. IronKey brings unprecedented mobile data convenience and security to individuals and organizations with its rugged, waterproof and tamper resistant USB drives that include always-on hardware encryption, strong authentication, portable ...

Two Factor Authentication is Dead

Thursday, May 1st, 2008

The fundamental problem with two factor (2FA) session authentication is that the approach is vulnerable to Man in the Middle and Man in the Browser attacks. 2FA requires that customers present not only a password (something they know) when they log into online banking, but also demonstrate that they possess ...

WordPress PHP Code Execution and Cross-Site Scripting

Monday, April 28th, 2008

Two vulnerabilities have been reported in WordPress, which can be exploited by malicious people to conduct cross-site scripting attacks, bypass certain security restrictions, and to compromise a vulnerable system. 1) A vulnerability is caused due to improper access restriction of the administration section. This can be exploited to bypass the authentication ...