May 2014

  • 426331-chadder
    Permalink Gallery

    John McAfee launches Chadder, a new encrypted private messaging app.

John McAfee launches Chadder, a new encrypted private messaging app.

By |May 6th, 2014|

Antivirus software pioneer John McAfee has launched a new messaging app called Chadder, with a focus on encryption and security.

  • ietf-small
    Permalink Gallery

    [TLS] Confirming Consensus on removing RSA key Transport from TLS 1.3

[TLS] Confirming Consensus on removing RSA key Transport from TLS 1.3

By |May 6th, 2014|

The following pull request is intended to execute this change:

https://github.com/tlswg/tls13-spec/pull/37

I’ll merge it in on Tuesday. Please let me know before then if
this seems substantially wrong. As usual, minor editorial issues
can be done by pull requests.

Note that we also need to determine a new MTI cipher suite
(https://github.com/tlswg/tls13-spec/issues/32) since the
previous one uses static RSA. I’ve left that as a TODO for now.

-Ekr
via - TLS IETF

  • oauth
    Permalink oauthGallery

    Covert Redirect Vulnerability Related to OAuth 2.0 and OpenID.

Covert Redirect Vulnerability Related to OAuth 2.0 and OpenID.

By |May 6th, 2014|

I found a serious Covert Redirect ( http://tetraph.com/covert_redirect/oauth2_openid_covert_redirect.html ) vulnerability related to OAuth 2.0 and OpenID.

  • Google Chrome
    Permalink Google ChromeGallery

    You’ll hate Google’s experimental Chrome UI, but so will phishers.

You’ll hate Google’s experimental Chrome UI, but so will phishers.

By |May 6th, 2014|

Phishers might have a tougher time hooking victims if a new feature introduced into the experimental strain of Google’s Chrome browser makes it into a future full release.

April 2014

Create Binary Virus To Format Hard Disk.

By |April 25th, 2014|

Create Binary Virus To Format Hard Disk.

1. Copy the below codes into Notepad.

AirPort Base Station Firmware Update 7.7.3

By |April 23rd, 2014|

AirPort Base Station Firmware Update 7.7.3
Learn about AirPort Base Station Firmware Update 7.7.3.

  • NSA
    Permalink NSAGallery

    NIST Removes Cryptography Algorithm from Random Number Generator Recommendations.

NIST Removes Cryptography Algorithm from Random Number Generator Recommendations.

By |April 23rd, 2014|

Contact: Jennifer Huergo 301-975-6343

Following a public comment period and review, the National Institute of Standards and Technology (NIST) has removed a cryptographic algorithm from its draft guidance on random number generators.

  • unflod-hook-499
    Permalink Gallery

    Active malware campaign steals Apple passwords from jailbroken iPhones.

Active malware campaign steals Apple passwords from jailbroken iPhones.

By |April 22nd, 2014|

Security researchers have uncovered an active malware campaign in the wild that steals the Apple ID credentials from jailbroken iPhones and iPads.

  • Heartbleed-Refresh
    Permalink Gallery

    Attackers Exploit the Heartbleed OpenSSL Vulnerability to Circumvent Multi-factor Authentication on VPNs.

Attackers Exploit the Heartbleed OpenSSL Vulnerability to Circumvent Multi-factor Authentication on VPNs.

By |April 20th, 2014|

Written by Christopher Glyer and Chris DiGiamo

Less than a week since the public disclosure of the “Heartbleed” vulnerability, Mandiant incident responders have already identified successful attacks in the wild by targeted threat actors. The Heartbleed vulnerability (CVE-2014-0160), publicly disclosed on April 7th by security researchers Neel Mehta and Codenomicon is a buffer over-read bug in the Transport

  • Edward Snowden
    Permalink Edward SnowdenGallery

    Out in the Open: Inside the Operating System Edward Snowden Used to Evade the NSA.

Out in the Open: Inside the Operating System Edward Snowden Used to Evade the NSA.

By |April 20th, 2014|

When NSA whistle-blower Edward Snowden first emailed Glenn Greenwald, he insisted on using email encryption software called PGP for all communications. But this month, we learned that Snowden used another technology to keep his communications out of the NSA’s prying eyes. It’s called Tails. And naturally, nobody knows exactly who created it.

Scan ME
Scan ME