A “new” and important vulnerability has been discovered that affects HTTPS and other services that rely on SSL/TLS implementations. This flaw is in the SSLv2 protocol, and affects all implementations. Researchers refer to this attack as DROWN – short for “Decrypting RSA using Obsolete and Weakened eNcryption”. This attack allows attackers to read or steal informationContinue reading DROWN SSLv2 Vulnerability Rears Ugly Head, Puts One-Third of HTTPS Servers At Risk – TrendLabs Security Intelligence Blog
Law #1: If a bad guy can persuade you to run his program on your computer, it’s not solely your computer anymore. Law #2: If a bad guy can alter the operating system on your computer, it’s not your computer anymore. Law #3: If a bad guy has unrestricted physical access to your computer, it’sContinue reading Ten Laws of Security
As technology advances and our society evolves, so does everything that comes with: social protest, human rights, privacy, justice, law enforcement, education, etc. The Police Department of New York recently used an LRAD (Long Range Acoustic Device). It is a portable sound speaker designed to scare people away with sound. But there is more toContinue reading New police crowd control system with sound.