The Latest in IT Security

Posts Tagged ‘encryption keys’

Problem: How do you store a password but make it nearly impossible to recover the plaintext in the event that the database with the password hash is compromised? When doing software development, it’s critical to review these functions. Having good development standards for your team will ensure that people store passwords properly and avoid mistakes […]

Read more ...

SIM-maker #gemalto says yes, it was hacked by GCHQ and NSA. But not that badly… Last week, leaks from NSA whistleblower Edward Snowden revealed what appeared to be a major hacking operation against the world’s largest #sim card manufactuer, orchestrated by the NSA and UK’s GCHQ intelligence agencies in 2010 and 2011. According to a […]

Read more ...

Its the most current news youll read all day: The pattern of the electric currents that pass through your laptop computer can be used to determine your encryption keys, as a group of three Israeli researchers at Tel Aviv University have shown. By measuring the electric potential running through a laptops casing, or through a […]

Read more ...


Categories

FRIDAY, APRIL 19, 2024
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments