Market confidence in Silicon Valley is rising again. While Twitter has announced plans for an IPO, FireEye has proceeded with its own, selling more shares at a higher price than at first intended.
RSA Says Don’t Use NIST Crypto Algorithm
Last week NIST recommended that its elliptic curve specification ‘no longer be used.’ Now, in an email advisory sent to customers, RSA strongly recommends that developers discontinue use of Dual EC DRBG and move to a different PRNG.
Apple iOS 7: A Security Overview
Apple’s new iOS 7, pre-loaded on the new iPhone 5s and 5c, is also available for download to older devices. It is said to include more than 200 new features – here we look at some of the security aspects and issues.
30% of Tor Web Browser Transactions Found to Be Fraudulent
Tor is known as a privacy browser, favored by political dissidents, journalists and others looking to be online anonymously. But a new report shows that almost a third of its traffic is fraudulent as well, pointing to its potential status as a criminal…
China’s Hidden Hacking-for-Hire Crew Behind Large-scale Cyber-espionage
A highly sophisticated “hacker for hire” group operating out of China has surfaced. Not quite a crouching tiger or a hidden dragon, but somewhere in between, the “Hidden Lynx” hacking group is a team of professionals with a strong capacity and proven a…
Digital Advertising Alliance Leaves the Do Not Track Working Group
The W3C working party tasked with defining the mechanisms that will underpin Do Not Track processes is now in serious danger of collapse following the third major defection in as many months.
Surveillance Court: NSA’s Data Collection Does Not Violate Fourth Amendment
The Foreign Intelligence Surveillance Court yesterday published an opinion, written on August 29 by Judge Claire Eagen, explaining the legal reasoning behind its order authorizing the NSA to collect data on all US telephone calls.
The Stealthy Hardware Trojan that Can Affect Intel Ivy Bridge Processors
A team from universities in the US, Netherlands, Switzerland and Germany have published research demonstrating that subtle changes below the gate level of chips can alter functionality in a controlled but covert manner.
Mobile Pwn2Own to Pay $300K for iPhone and Android Zero-day Exploits
Itching to jailbreak Apple’s iOS 7? Ready to root a Samsung KNOX phone? Frothing at the mouth to show vulnerabilities in the iPhone 5S fingerprint reader? And get paid for it? Well if so, you’re in luck: HP’s Zero Day Initiative (ZDI) has announced the…
Solving the TPM Uptake Challenge
Trusted platform modules (TPM) have been around for more than 10 years, but adoption of them by users has been slow going. Led by Infosecurity magazine’s Drew Amorosi, a panel of industry experts came together at the Trusted Computing Conference in Orl…