Tag Archive for: Creating

The best way to protect passwords may be creating fake ones

Password managers are a great way to supply random, unique passwords to a high number of websites. But most still have an Achilles’ heel: Usually, a single master password unlocks the entire vault.

But a group of researchers has developed a type of password manager that creates decoy password vaults if a wrong master password is supplied.

A paper on the experimental software, called NoCrack, will be presented on May 19 at the IEEE Symposium on Security and Privacy in San Jose, California.

NoCrack is intended to make it much more time-consuming and difficult for attackers to figure out if they’ve hit pay dirt.

To read this article in full or to leave a comment, please click here

Network World Security

NSA has long-time role in developing computer security, creating tension with … – Washington Post


Washington Post

NSA has long-time role in developing computer security, creating tension with
Washington Post
WASHINGTON — Years ago, back when computer users were dialing up the Internet, civilian government scientists already were expressing concerns about the National Security Agency's role in developing global communication standards, according to 
Use VPN! Former 'Most Wanted Hacker' Mitnick talks Snowden, NSA, and privacyRT (blog)
Opening a back door for Internet snoopingTheChronicleHerald.ca

all 331 news articles »

“computer security” – read more

Russian Military Creating Cyber Warfare Branch – RIA Novosti

Russian Military Creating Cyber Warfare Branch
RIA Novosti
MOSCOW, August 20 (RIA Novosti) – A separate branch dedicated to cyber warfare is being created in the Russian Armed Forces as the Internet could become a new “theater of war” in the near future, a senior Russian military R&D official said. “Cyber

and more »

cyber warfare – read more

Technology is creating the surveillance state – Fox News

Technology is creating the surveillance state
Fox News
Worse, our addiction to smartphones means we're beaming our location, purchases, banking information, and personal relationships over networks that can be easily tapped — by government officials or by malware from hackers. Indeed, a computer program

flame malware – read more