Infosecurity.US

Information Security & Occasional Forays Into Adjacent Realms

  • Web Log

Big Data Techniques for Cybersecurity →

March 15, 2015 by Marc Handelman in All is Information, Alternate Attack Analysis, Security Tooling, Intelligence, Information Security
March 15, 2015 /Marc Handelman
All is Information, Alternate Attack Analysis, Security Tooling, Intelligence, Information Security

Physical Access Not Required →

January 01, 2015 by Marc Handelman in All is Information, Computation, Cryptography, Data Security, Information Security, Physical Security, Security Conferences, Security Education, Security Tooling, Vulnerabilities

Physikalisch Zugriff Nicht Erforderlich

More interesting security slap and tickle at the Chaos Computer Club confab in Germany... This time, apparently the lack of physical access was not an impediment in the second well publicized defeat of Apple Inc.'s [NasdaqGS: AAPL]  TouchID. Jan Krissler, holding forth at the conference has detailed the steps taken to overcome the vaunted security of TouchID via a presentation entitled 'Gefahren von Kameras für (biometrische) Authentifizierungsverfahren [31c3] '.

'Krissler said he used commercially available software called VeriFinger to pull off the feat. The main source was a close-up picture of von der Leyen’s thumb, obtained during a news conference in October, along with photographs taken from different angles to get an image of the complete fingerprint.' - via Emil Protalinski writing at VentureBeat

 

January 01, 2015 /Marc Handelman
All is Information, Computation, Cryptography, Data Security, Information Security, Physical Security, Security Conferences, Security Education, Security Tooling, Vulnerabilities

NSA's CSfC Recognizes Knox →

October 22, 2014 by Marc Handelman in All is Information, Data Security, Government, Information Security, Intelligence, Messaging Security, Network Security, Security Tooling

News, via John Ribeiro, writing for PCWorld, of the acceptance of Samsung Electronics Co. Ltd.'s  (SSNLF) KNOX device product line within the National Security Agency's  Commercial Solutions for Classified program.

 

October 22, 2014 /Marc Handelman
All is Information, Data Security, Government, Information Security, Intelligence, Messaging Security, Network Security, Security Tooling

TrueCrypt, Resurrected →

September 22, 2014 by Marc Handelman in All is Information, Computer Science, Cryptography, Information Security, Mathematics, Security, Security Tooling

News, via Paul Rubens  writing at eSecurity Planet, of the apparent resurfacing of the TrueCrypt project, this time, with more eyes on the prize, so to speak.  Look for a resurrected TrueCrypt 7.1a code-base with a new re-branded name: CipherShed.  Hat Tip to Firewall Consultants.

September 22, 2014 /Marc Handelman
All is Information, Computer Science, Cryptography, Information Security, Mathematics, Security, Security Tooling

Kali Tools Site Launched

September 09, 2014 by Marc Handelman in Security Tooling, Web Security, Network Security, Information Security, Data Security

News from the Kali Linux universe... A new Kali tools website has been implemented, with well documented tool descriptions and tool homepage links. Huzzah!

September 09, 2014 /Marc Handelman
Security Tooling, Web Security, Network Security, Information Security, Data Security
  • Newer
  • Older