The first compromise didn't get the crooks as far as they wanted, so they found a second one that did...
Read morePower LED Side-Channel Attack
June 19 2023This is a clever new side-channel attack:
The first attack uses an Internet-connected surveillance camera to take a high-speed video of the power LED on a smart card reader—or...
Read more
AI-Generated Steganography
June 12 2023New research suggests that AIs can produce perfectly secure steganographic images:
Abstract: Steganography is the practice of encoding secret information into innocuous content in such a manner that an...
Read more
S3 Ep137: 16th century crypto skullduggery
June 2 2023Lots to learn, clearly explained in plain English... listen now! (Full transcript inside.)
Read moreLastest episode - listen now! (Full transcript inside.)
Read moreLastest episode - listen now! (Full transcript inside.)
Read moreSecurity bugs in the very code you've been told you must have to improve the security of your computer...
Read moreDevices seized, suspects interrogated and arrested, allegedly connected to devastating cyberattack on University Hospital in Düsseldorf.
Read moreRogue software packages. Rogue "sysadmins". Rogue keyloggers. Rogue authenticators. Rogue ROGUES!
Read moreSide-Channel Attack against CRYSTALS-Kyber
February 28 2023CRYSTALS-Kyber is one of the public-key algorithms currently recommended by NIST as part of its post-quantum cryptography standardization process.
Researchers have just published a side-channel attack—using...
Read more
Recent Comments