Angler exploit kit may be dead, but malware lives on – InfoWorld


InfoWorld

Angler exploit kit may be dead, but malware lives on
InfoWorld
Chalk one up for the good guys. When Russian law enforcement busted a banking malware gang for stealing approximately $ 45 million from the country's financial services firms, it disrupted several other cybercrime operations in progress. "For a period

“exploit kit” – read more

Datadog chews on data breach, AWS user credentials in leak – ZDNet


ZDNet

Datadog chews on data breach, AWS user credentials in leak
ZDNet
Datadog sent an email warning users of the data breach over the weekend, asking them to reset their credentials if they had stored passwords — with the exception of Google Auth and SAML users, who are not affected — as well as a notice to admin users
Datadog security breach leaks AWS user credentialsITProPortal
Datadog calls for password reset after cyber breachComputerWeekly.com
Datadog breached, tells users to reset login credentialsSC Magazine

all 6 news articles »

“data breach” – Google News

HTTPS crypto’s days are numbered. Here’s how Google wants to save it

(credit: Christiaan Colen)

Like many forms of encryption in use today, HTTPS protections are on the brink of a collapse that could bring down the world as we know it. Hanging in the balance are most encrypted communications sent over the last several decades. On Thursday, Google unveiled an experiment designed to head off, or at least lessen, the catastrophe.

In the coming months, Google servers will add a new, experimental cryptographic algorithm to the more established elliptic curve algorithm it has been using for the past few years to help encrypt HTTPS communications. The algorithm—which goes by the wonky name “Ring Learning With Errors”—is a method of exchanging cryptographic keys that’s currently considered one of the great new hopes in the age of quantum computing. Like other forms of public key encryption, it allows two parties who have never met to encrypt their communications, making it ideal for Internet usage.

Virtually all forms of public key encryption in use today are secured by math problems that are so hard that they take millennia for normal computers to solve. In a world with quantum computers, the same problems take seconds to solve. No one knows precisely when this potential doomsday scenario will occur. Forecasts call for anywhere from 20 to 100 years. But one thing is certain: once working quantum computers are a reality, they will be able to decrypt virtually all of today’s HTTPS communications. Even more unnerving, eavesdroppers who have stashed away decades’ worth of encrypted Internet traffic would suddenly have a way to decrypt all of it.

Read 6 remaining paragraphs | Comments

Technology Lab – Ars Technica