HackDig : Dig high-quality web security articles for hacker

Pacemakers prone to getting hacked

Recently the The FDA and Homeland Security have issued alerts about vulnerabilities in 4,65,000 pacemakers. The devices can be remotely “hacked” to increase activity or reduce battery life, potentially endangering patients. Feasible vulnerabilities: Absence of memory and encryption: In such embedded devices there is a lack to support proper cryptographic e
Publish At:2017-09-05 12:30 | Read:158 | Comments:0 | Tags:News cryptography Exploit hacking IOT news pacemaker

Need-to-Know Only: Use Encryption to Make Data Meaningless to Prying Eyes

Organizations continue to be plagued by data breaches, and data is leaking from our enterprises in large quantities. However, data leakage is not the only issue. The problems — namely, regulatory fines, brand damage and lost revenue — begin when sensitive data that is readable and accessible falls into the wrong hands. Despite these concerns, security profes
Publish At:2017-08-29 10:15 | Read:223 | Comments:0 | Tags:Data Protection Cryptography Data Security Encryption Encryp

The Power of Pervasive Encryption

The new z14 mainframe computer offers a chance to re-evaluate what a mainframe can do for an organization. Gone are the days when the mainframe was the only way to do computing. Today, there are new and different choices, and the z14 can make those choices practical. The z14 features standard improvements that users have come to expect, such as faster, mor
Publish At:2017-08-15 11:45 | Read:278 | Comments:0 | Tags:Data Protection Mainframe Compliance Cryptography Data Secur

A Review of Asymmetric Cryptography

IntroductionOur last article further examined and finished off the topic of Symmetric Cryptography. Specifically, the following topics were examined:The Caesar MethodologyThe Types of Cryptographic AttacksPolyalphabetic EncryptionBlock CiphersInitialization VectorsCipher Block ChainingIn this article, we now start to examine another Cryptographic Infra
Publish At:2017-01-31 13:15 | Read:854 | Comments:0 | Tags:Cryptography

Charger Android Ransomware Spread via the Official Google Play App Store

We all know that ransomware is a growing problem for businesses and home users alike, and that most of it is targeted against Windows users.And we’re also familiar with warnings to avoid downloading Android apps from third-party marketplaces rather than officially-sanctioned ones such as the Google Play marketplace.But infosecurity is not a world of ab
Publish At:2017-01-25 09:35 | Read:1133 | Comments:0 | Tags:Cryptography Featured Articles IT Security and Data Protecti

An Examination of the Caesar Methodology, Ciphers, Vectors, and Block Chaining

Overview of the Last ArticleIn today’s world, communications of all types and kinds are becoming of utmost importance. Whether it is from personal to professional, the use of the Smartphone and other wireless technologies is becoming an indispensable part of our lives. Just about any application can be accessed from the standpoint of remote conne
Publish At:2017-01-18 12:05 | Read:844 | Comments:0 | Tags:Cryptography

A Review of Cryptography – Part 1

Overview of Last ArticlesOur last few articles have dealt with the science and technology of Biometrics. To review, it is merely the Verification and/or Identification of an individual based on their unique physiological traits or even behavioral mannerisms.This is probably one of the best forms of Security technology to use because it is probably the
Publish At:2017-01-10 17:40 | Read:1288 | Comments:0 | Tags:Cryptography

Downgrading RDP connections and how to avoid it

This post describes how Remote Desktop Protocol (RDP) connections can be vulnerable to a downgrade attack if Terminal Servers are configured insecurely. We’re not aware of this issue being discussed before – googling only found pages about installing an earlier version of the RDP client, not about downgrading the protocol in the way described her
Publish At:2016-11-20 02:20 | Read:1895 | Comments:0 | Tags:Blog cryptography MiTM RDP redteam Windows

Basics of Cryptography: the practical application and use of cryptography

Cryptography originated about 4000 years ago, and the world of cryptography has evolved a lot since then. Today ‘Cryptography’ is omnipresent in our lives without most of us realizing it. The fundamental aspect of ‘Cryptography’ has remained the same through time which is to hide information in transit and make it available only
Publish At:2016-11-07 22:05 | Read:888 | Comments:0 | Tags:Cryptography

Crypto flaw made it easy for attackers to snoop on Juniper customers

As if people didn't already have cause to distrust the security of Juniper products, the networking gear maker just disclosed a vulnerability that allowed attackers to eavesdrop on sensitive communications traveling through customers' virtual private networks.In an advisory posted Wednesday, Juniper officials said they just fixed a bug in the company's Junos
Publish At:2016-07-15 09:45 | Read:1772 | Comments:0 | Tags:Risk Assessment Technology Lab backdoors cryptography encryp

HTTPS crypto’s days are numbered. Here’s how Google wants to save it

Like many forms of encryption in use today, HTTPS protections are on the brink of a collapse that could bring down the world as we know it. Hanging in the balance are most encrypted communications sent over the last several decades. On Thursday, Google unveiled an experiment designed to head off, or at least lessen, the catastrophe.In the coming months, Goog
Publish At:2016-07-09 07:25 | Read:1339 | Comments:0 | Tags:Risk Assessment Technology Lab cryptography encryption HTTPS

Cryptanalysis Tools

Some terms and definitionsAlice – Sender of the messageBob – ReceiverEve – Eavesdropper or unintended partyPlaintext – Message to be sentCiphertext – Coded messageEncryption – Coding of messageDecryption – Decoding the messageCryptology – Science of study of ciphersCryptography – Science (or art) of encrypted communication between Alice and Bob, such t
Publish At:2016-06-02 20:20 | Read:1121 | Comments:0 | Tags:Cryptography

“Forbidden attack” makes dozens of HTTPS Visa sites vulnerable to tampering

Dozens of HTTPS-protected websites belonging to financial services giant Visa are vulnerable to attacks that allow hackers to inject malicious code and forged content into the browsers of visitors, an international team of researchers has found.In all, 184 servers—some belonging to German stock exchange Deutsche Börse and Polish banking association Zwizek Ba
Publish At:2016-05-26 21:40 | Read:1071 | Comments:0 | Tags:Law & Disorder Risk Assessment Technology Lab authentication

Cryptographic Algorithms Lab

For this lab we’ll be using GPG, OpenSSL to demonstrate symmetric and asymmetric encryption/decryption and MD5, SHA1 to demonstrate hash functions.Virtual Machine Needed: KaliBefore starting the lab here are some definitions:In all symmetric crypto algorithms (also called Secret Key encryption) a secret key is used for both encrypt plaintext and
Publish At:2016-04-22 00:35 | Read:890 | Comments:0 | Tags:Cryptography

Experts crack nasty ransomware that took crypto-extortion to new heights

A nasty piece of ransomware that took crypto-extortion to new heights contains a fatal weakness that allows victims to decrypt their data without paying the hefty ransom.When it came to light two weeks ago, Petya was notable because it targeted a victim's entire startup drive by rendering its master boot record inoperable. It accomplished this by encrypting
Publish At:2016-04-12 08:50 | Read:1170 | Comments:0 | Tags:Law & Disorder Risk Assessment Technology Lab cryptography p


Share high-quality web security related articles with you:)


Tag Cloud