In light of documented TLS vulnerabilities and implementation bugs, understanding known attack vectors becomes a necessity.
IBM’s China connection and the betrayal of America: how Chinese government hackers manage to remain undetectable
“You know, if you have something really important, write it out and have it delivered by courier, the old-fashioned way. Because I’ll tell you what: No computer is safe (…) I don’t care what they say.”
President-Elect Donald Trump
In the waning days of the fading Obama presidency, plenty of questions surfaced about Russia’s involvement with the hacks of the DNC and election systems. Electronic evidence can be easily manipulated.
There is more to it than just electronic evidence.
The crypto revolution: an interview with Professor Emin Gün Sirer and Dr. Ittay Eyal about Bitcoin, the blockchain, and FinTech innovation
In a research paper titled “Majority is not Enough: Bitcoin Mining is Vulnerable“, Professor Emin Gün Sirer and Dr. Ittay Eyal of the Department of Computer Science at Cornell University, revealed the Selfish Mining attack on Bitcoin’s blockchain back in 2014.
In this interview, Professor Sirer and Dr. Ittay Eyal demystify Bitcoin and other crypto currencies and provide a first glimpse into the blockchain revolution.
The interview was conducted by Anna E Kobylinska with contribution by Filipe Martins.
Tip of The Day: Test Your Web Server’s Crypto Prowess for TLS, Diffie-Hellman, and more
Are you concerned about the security of data transmissions in which your web server participates day in and day out? Passwords, user names, credit card numbers, and other sensitive private communications on the Internet can easily be compromised unless you actively take precautionary measures and preempt the most common exploits by means of modern cryptography. Your users trust that you will protect them. The only question is: how do you measure success?