The Latest in IT Security

Posts Tagged ‘encryption keys’

It has been four months since Microsoft and Kaspersky Lab announced the disruption of Kelihos/Hlux botnet. The sinkholing method that was used has its advantages — it is possible to disable a botnet rather quickly without taking control over the infrastructure.However,as this particular case showed, it is not very effective if the botnet’s masters are […]

Read more ...

Stefan Viehbock, an independent security researcher, published a paper on Boxing Day titled “Brute forcing Wi-Fi Protected Setup” to his WordPress blog disclosing a weakness in the configuration of most consumer/SoHo Wi-Fi routers. As we all know the state of security for most home Wi-Fi networks was nearly non-existent only a few years ago. This […]

Read more ...

A little over a week since Apple released iOS 5, I thought I would review some of the new functionality and security on the platform in general. I began by revisiting the encryption Apple promises and whether they have fixed the issue that I first wrote about in May 2010. According to the “iPad in […]

Read more ...


Categories

SUNDAY, FEBRUARY 23, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments