Devices seized, suspects interrogated and arrested, allegedly connected to devastating cyberattack on University Hospital in Düsseldorf.
Read moreRogue software packages. Rogue "sysadmins". Rogue keyloggers. Rogue authenticators. Rogue ROGUES!
Read moreSide-Channel Attack against CRYSTALS-Kyber
February 28 2023CRYSTALS-Kyber is one of the public-key algorithms currently recommended by NIST as part of its post-quantum cryptography standardization process.
Researchers have just published a side-channel attack—using...
Read moreEven in Apple's and Google's "walled gardens", there are plenty of 2FA apps that are either dangerously incompetent, or unrepentantly malicious. (Or perhaps both.)
Read moreSerious Security: GnuTLS follows OpenSSL, fixes timing attack bug
February 14 2023Conditional code considered cryptographically counterproductive.
Read moreMary Queen of Scots Letters Decrypted
February 9 2023This is a neat piece of historical research.
The team of computer scientist George Lasry, pianist Norbert Biermann and astrophysicist Satoshi Tomokiyo—all keen cryptographers—initially thought the batch...
Read more
OpenSSL fixes High Severity data-stealing bug – patch now!
February 8 20237 memory mismanagements and a timing attack. We explain all the jargon bug terminology in plain English...
Read moreHear renowned cybersecurity author Andy Greenberg's thoughtful commentary about the "war on crypto" as we talk to him about his new book...
Read moreAttacking Machine Learning Systems
February 6 2023The field of machine learning (ML) security—and corresponding adversarial ML—is rapidly advancing as researchers develop sophisticated techniques to perturb, disrupt, or steal the ML model or data. It’s a...
Read moreS3 Ep120: When dud crypto simply won’t let go [Audio + Text]
February 3 2023Latest episode - listen now!
Read more
Recent Comments