A group of researchers from Johns Hopkins University discovered that a second NSA tool aggravate the RSA security software’s vulnerability. We all remember the Snowden‘s revelations regarding the support provided my RSA Security, a division of EMC company, to the NSA Intelligence. Snowden accused the RSA to have deliberately inserted an alleged encryption backdoor in […]
Chris Soghoian, principal technologist with the American Civil Liberties Union, explained that government surveillance could exploit service update process. Chris Soghoian, principal technologist with the American Civil Liberties Union, during the recent TrustyCon conference highlighted the possibility that the government will exploit automated update services to serve malware and spy on users. Is this the next […]
Enjoy the reading CDM for free.We are thrilled to join you at the RSA Conference 2014 with our Second Annual Edition of Cyber Defense Magazine. YOUR E-MAGAZINE HAS ARRIVED SPONSORED BY RSA CONFERENCE 2014 FLIPBOOK http://www.cyberdefensemagazine.com/annual-editions/february-2014/index.html PDF http://www.cyberdefensemagazine.com/annual-editions/february-2014/Cyber-Defense-Magazine-Annual-Edition-2014.pdf MOBILE http://www.cyberdefensemagazine.com/annual-editions/february-2014/mobile/index.html Introduction Following the tradition I am imagining the evolution of the cyber security scenario for […]
iBanking is a new mobile banking Trojan available for sale in the underground for $5,000 according the RSA’s FraudAction Group. The source code for iBanking banking trojan has been leaked online through an underground forum, this kind of news reports a serious threat from the cybercrime ecosystem. Like happened for other trojan, including Zeus and Carberp, the […]
The Washington post revealed that NSA is spending a great effort to build a quantum computer that could break most types of encryption. The NSA is monopolizing the security landscape, The Washington Post reported that the U.S. Intelligence Agency spending a significant effort to develop a computer that could break the majority of encryption algorithms […]
Leaked documents shared by Der Spiegel show how NSA spyware codenamed DROPOUTJEEP can spy on every Apple iPhone. Apple denies any claim. Users buy the iPhone, NSA controls them. This is not a slogan for the last Apple advertising, it is the uncomfortable truth revealed by another set of NSA documents leaked by Snowden and […]
RSA published a blog post to deny the accusation about secret partnership with the National Security Agency and the use of flawed algorithm in its product. A couple of days ago on Internet was spread the news that Security firm RSA has signed a $10 million contract with the National Security Agency (NSA) to maintain […]
Last revelation based on the documents leaked by Edward Snowden is related to the allegedly encryption backdoor inserted by RSA in the BSafe software. Is it possible to insert an encryption backdoor in one of most popular cryptographic products? Probably it is just a question of money if the request came from the NSA, according […]
Israeli Security researchers explained how to break 4096-bit RSA analyzing CPU sound emitted during decryption (Acoustic Cryptanalysis attack). Israeli Security Researchers at Tel Aviv University recently published an interesting paper titled “RSA Key Extraction via Low-Bandwidth Acoustic Cryptanalysis” to explain how they have successfully broken 4096-bit RSA analyzing Computer’s CPU Sound emitted during execution of […]
KINS trojan is the name of the new banking malware that RSA researchers discovered thanks to an announcement on the Russian black market. Early 2013 RSA discovered traces of a news banking trojan named KINS, security experts have followed the evolution of the malware in the underground community. RSA researchers discovered an announcement on the Russian […]