Tag Archive for: Protocol

New protocol from Guardtime hopes to unseat RSA for authentication, digital signatures

Data integrity vendor Guardtime hopes its newly announced protocol will replace RSA for the purposes of authentication and digital signatures, touting it as easier to manage and less vulnerable to hacking.

Called BLT, the protocol name comes from the last initials of its inventors, Ahto Buldas, Risto Laanoja and Ahto Truu, just as RSA comes from the last initials of its inventors, Ron Rivest,  Adi Shamir and Leonard Adleman.

Rather than relying on public and private keys (PKI) as RSA does, BLT is based on hash-function cryptography, which requires no keys and so requires no issuing, updating or revoking of keys. As a result, it can scale to cover exabytes (1018 bytes) with little overhead, says the company’s CEO Mike Gault. And there are no cryptographic secrets to be compromised.

To read this article in full or to leave a comment, please click here

Network World Tim Greene

Researchers find Android security issue in app permissions protocol – SC Magazine


SC Magazine

Researchers find Android security issue in app permissions protocol
SC Magazine
Analysts discovered an Android app permissions issue, which could ultimately allow a crafty saboteur to redirect users to spurious sites using malicious apps. In a Monday blog post, FireEye researchers detailed the problem: an inadequate security
Google patches Android icon permissions attackInfoWorld
Google patches Android flaw that allows phishing apps to spoof genuine onesNDTV

all 69 news articles »

“android security” – read more

Court rules Dept. of Homeland Security must reveal ‘internet kill switch’ protocol – RT (blog)


RT (blog)

Court rules Dept. of Homeland Security must reveal 'internet kill switch' protocol
RT (blog)
Court, DHS, Internet, Security, USA. A federal court has demanded that the US Department of Homeland Security reveal its protocol for the use of a so-called “internet kill switch.” The US District Court for the District of Columbia shot down claims

and more »

“internet security” – read more

Exploiting Universal Plug-n-Play protocol, insecure security cameras & network printers

A plethora of vulnerable devices due to the flaws in the Universal Plug and Play protocol put around 50 million at risk; somewhere in the neighborhood of about 58,000 security camera systems are vulnerable to hacking, and exploiting network printers top the list today for potential security mayhem.
Ms. Smith’s blog