Researcher busts into Twitter via SSL reneg hole

Saturday, November 14th, 2009

A Swiss grad student has devised a serious, real-world attack on Twitter that targeted a recently discovered vulnerability in the secure sockets layer protocol.The exploit by Anil Kurmus is significant because it successfully targeted the so-called SSL renegotiation bug to steal Twitter login credentials that passed through encrypted data streams. ...

Scramble on to fix flaw in SSL security protocol

Thursday, November 5th, 2009

Software makers around the world are scrambling to fix a serious bug in the technology used to transfer information securely on the Internet.The flaw lies in the SSL protocol, best known as the technology used for secure browsing on Web sites beginning with HTTPS, and lets attackers intercept secure SSL ...

Evil Maid goes after TrueCrypt!

Friday, October 16th, 2009

Let’s quickly recap the Evil Maid Attack. The scenario we consider is when somebody left an encrypted laptop e.g. in a hotel room. Let’s assume the laptop uses full disk encryption like e.g. this provided by TrueCrypt or PGP Whole Disk Encryption. Many people believe, including some well known security experts, ...

Carbonite Can Decrypt Your Data

Friday, October 2nd, 2009

Yes, your data is encrypted before it gets sent up to their servers for storage (via an SSL connection), but Carbonite keeps a copy of the decryption key on their servers in case they need to decrypt it for various reasons.  It's stated in their Privacy Policy so it's not ...

A Stick Figure Guide to the Advanced Encryption Standard (AES)

Tuesday, September 22nd, 2009

Here is another awesome blog post from Jeff Moser over at Moserware.  It's literally a stick figure guide to AES.  A must-read.  Even if you don't quite understand it. http://www.moserware.com/2009/09/stick-figure-guide-to-advanced.html