Many weak web server certificates threaten online shopping

Monday, June 30th, 2008

"https connections exist to help ensure that when somebody is engaged in a financial transaction over the internet they are actually connected to the correct site - such as a bank, online vendor, and so forth. However, due to an error in the OpenSSL library used by the Debian Linux ...

IronKey USB key has military grade encryption

Sunday, June 29th, 2008

Plenty of USB storage keys are on the market, but Ironkey is the first to use military level encryption. Sold in 1GB, 2GB, and 4GB sizes, the key features a processor called the Cryptochip, which uses Public Key Cryptography ciphers linked to an online account to create encryption keys on ...

Successful 802.1X Every Time

Friday, June 20th, 2008

It’s not rocket science, but any time we mingle and intertwine four or five different pieces of technology, there’s always the potential for a mess… or at least a misconfiguration or two along the way. Don’t know what 802.1X is? Check out the recent 802.1X technology primer. If you’re planning to, ...

Recovering from the Encryption Virus

Tuesday, June 17th, 2008

Kaspersky Lab has published advice on recovering files encrypted by the frightening Gpcode.ak virus, but there is a big catch -- users must not have turned off their PC first. A new variant of the malware struck last week, scrambling a variety of files on victims' PCs using a very strong ...

Compression lets attackers tap VoIP calls

Tuesday, June 17th, 2008

A common compression technique can make internet telephone calls significantly more susceptible to bugging, according to recent research from Johns Hopkins University. Internet telephony has become widely used through consumer-centric applications such as Skype, and is becoming more common in enterprises. The new research suggests, however, that standard encryption and compression methods, ...