Researchers at UC Berkeley have developed new attacks that analyze HTTPS traffic and can accurately determine what pages you’ve visited during an encrypted session.
Browsing Category: Cryptography
The GnuTLS bug is being joined at the hip to the recent Apple goto fail bug, but experts hoping to stem off confusion say the two vulnerabilities are different despite having the same consequences.
A critical vulnerability in GnuTLS, a popular open source crypto library, puts hundreds of software packages including popular Linux distribution at risk.
A team of researchers has published a paper that explains a number of attacks against websites and Web-based applications running TLS.
SAN FRANCISCO–The security of data being transmitted over the Web relies on a large number of moving parts, from the integrity of the machine sending the data, to the security of the browser, to the implementation of encryption, to the fragility of the certificate authority system. Experts have been spending the best part of the[...]
SAN FRANCISCO–The Lavabit case, which saw the secure email provider’s owner shut the company down after being forced to hand over to the government the encryption key that protected his users’ data, may seem like an extreme reaction to a unique situation. But, experts say it’s likely that there will be similar situations in the[...]
Dennis Fisher and Mike Mimoso discuss the happenings on day one of the RSA Conference, including Art Coviello’s keynote and what makes the NSA mad.
After reading through stacks and stacks of Snowden documents, Schneier says that yes, the NSA is extremely capable and full of smart people but “they are not made of magic”.
Apple released OS X Mavericks 10.9.2 which resolves a critical certificate-validation vulnerability reported last week.
Researchers have discovered a recent campaign that leveraged a Pony botnet controller to steal over $200,000 in Bitcoin and other virtual currencies along with 700,000 user credentials.