encryption

Pierluigi Paganini July 11, 2015
UK to ban messaging applications under a new law

In the UK hard times for messaging applications like WhatsApp and Facebook Messenger, the Investigatory Powers Bill, probably will pass in Autumn. We have already discussed the plan of the UK Government to ban principal messaging applications for security reason, the authorities fear that they could be exploited by terrorist groups as a communication channel. Early this […]

Pierluigi Paganini July 10, 2015
OpenSSL fixes Alternative chains certificate forgery flaw

OpenSSL Foundation fixed a critical issue that impacts any application that uses the popular crypto library in the authentication processes. OpenSSL Foundation has issued a security update as announced weeks ago. The patch just released fixes a mysterious security flaw affecting the OpenSSL code library, in the last weeks, the details of the vulnerability weren’t disclosed […]

Pierluigi Paganini June 20, 2015
Stealing crypto-keys from PCs using leaked radio emissions

A group of researchers demonstrated that encryption keys can accidentally leak from a PC via radio waves by using a cheap consumer-grade kit. In the past we have already spoken about the possibility to steal sensitive data from a computer by analyzing radio waves and electromagnetic emissions. The researchers Daniel Genkin, Lev Pachmanov, Itamar Pipman […]

Pierluigi Paganini June 20, 2015
Serious security issue affects SAP HANA systems

Security experts at ERPScan discovered a serious security issue in SAP’s in-memory relational database management system, HANA. The SAP in-memory relational database management system, HANA, is affected by a serious security issue, the static encryption key is stored in the database. The fact that the encryption key is static means that every SAP HANA installation […]

Pierluigi Paganini June 10, 2015
Belgian authorities detained terrorists by intercepting WhatsApp messages

Belgian law enforcement exploited end-to-end encryption gaps in WhatsApp to intercept messages exchanged between members of a Chechen jihadist group. According to a report published by Bloomberg, two men were arrested and warrants were issued for other three suspects that were allegedly preparing a terrorist attack in Belgium. The interesting part of the news is that law […]

Pierluigi Paganini June 04, 2015
The FBI is not able to monitor ISIS’s encrypted communications

The FBI warned lawmakers there was no way to monitor encrypted online communications among sympathizers of the ISIS, it urges a law to give them more powers. The FBI warned lawmakers there was no way to monitor encrypted online communications exploited by Islamic State militants and sympathizers. The law enforcement urges IT giants to provide […]

Pierluigi Paganini June 03, 2015
Compromised SSH keys used to access popular GitHub repositories

Security experts Ben Cox explained that the official Github repositories of the UK Government, Spotify, and Python were accessed using compromised SSH keys. Ben Cox, engineer at CloudFlare revealed that the official Github repositories of the UK Government, Spotify, and Python were accessed by using legitimate SSH keys. It seems that the keys were compromised […]

Pierluigi Paganini May 21, 2015
A large number of websites and web services affected by the LogJam TLS flaw

Researchers have discovered a new  TLS vulnerability dubbed LogJam that open a large number of online services to cyber attacks. Logjam is the name assigned to a new vulnerability that affects the Transport Layer Security (TLS) protocol putting a large number of online services at risk. Logjam vulnerability can be triggered through man-in-the-middle (MitM) attacks to […]

Pierluigi Paganini May 08, 2015
Flawed Open Smart Grid Protocol is a risk for Smart Grid

More than four million smart meters and similar devices worldwide are open to cyber attacks due to the security issued in the Open Smart Grid Protocol. The Open Smart Grid Protocol (OSGP) is a family of specifications published by the European Telecommunications Standards Institute (ETSI) that are implemented today by more than four million smart […]

Pierluigi Paganini May 08, 2015
PCI DSS 3.1 and SSLv3: It’s best time to remove the 20 year old SSL protocol

To address the risk PCI DSS 3.1 updates requirements 2.2.3, 2.3 and 4.1 to remove SSL and early TLS as examples of strong cryptography.  “The National Institute of Standards and Technology (NIST) has identified the Secure Socket Layers (SSL) v3.0 protocol as no longer being acceptable for protection of data due to inherent weaknesses within the […]