Cryptography Research (CRI) has published its investigation into the random number generator used by the Intel Ivy Bridge processor, the processor that is likely to be used by the majority of new PCs and laptops now and for the immediate future.
ENISA summarizes risks and opportunities of IT consumerization
The European Network and Information Security Agency (ENISA) has summarized both the risks and opportunities in the ‘consumerization of IT’, the business trend that includes BYOD.
TD Bank lost customer data – six months ago
The first public indication of the loss appeared on the California Attorney General website, with the publication of a sample ‘notification’ letter now being sent to the bank’s affected customers.
ISF issues cybersecurity Benchmark as a Service
In an effort to make the evaluation of security resilience and risk reduction strategies more accessible, the Information Security Forum (ISF) has launched a “Benchmark as a Service” (BaaS) tool, for real-time benchmarking via the cloud.
Hackers and crackers invited to decode an ‘unbreakable’ secret message
Wannabe code-crackers have a fresh challenge to rise to, if DeTron has its way. The encryption company ran a full page ad in the New York Times late last week challenging code breakers, hackers and cryptographers to crack a message encrypted by Quantum…
New GCHQ Territorial (Spook) Army
The UK’s Territorial Army is a paid force of part-time volunteers that make up around 25% of the army’s manpower. It is considered an essential part of the UK’s defense force. Now GCHQ is thinking of using the same principle to bolster the UK’s cyber d…
Malicious emails: Romney almost President
A new malicious email campaign pretends to be from CNN. It announces breaking news – Mitt Romney is ‘almost president’. But it leads to a Blackhole exploit site.
Firefox 16 shipped, pulled and updated within 2 days
Firefox 16 was released on Tuesday, pulled from the download page on Wednesday, and replaced with Firefox 16.0.1 on Thursday. The main cause was that Tuesday’s version introduced a new critical bug that was fixed by Thursday.
SMBs more vulnerable to data breaches than larger brethren
Contrary to conventional wisdom, hackers don’t just target large enterprises with vast amounts of data to steal. Small- and medium-sized businesses are just as attractive of targets, and in some cases are more so.
RSA Europe 2012: Anonymous responds to Corman’s comments
“Anonymous has very few hackers, it has very few activists… It is very misleading to call the groups hacktivists. The common attribute is angst. The talented ones are either quitting or starting to do things that are more clandestine.”