All posts in Cryptography

by Paul Ducklin A trio of researchers split between Italy and the UK have recently published a paper about cryptographic insecurities they found in a widely-known smart light bulb. The researchers seem to have chosen their target device, the TP-Link Tapo L530E, on the basis that it is “currently [the] . . . Read more
10 Aug, 2023
bust, Cryptocurrency, Cryptography, cybercrime, Data leakage, Data loss, Hacking, Intel, Law & order, Naked Security Podcast, podcast, Security News, surveillance
0

by Paul Ducklin SNOOPING ON MEMORY, KEYSTROKES AND CRYPTOCOINS No audio player below? Listen directly on Soundcloud. With Doug Aamoth and Paul Ducklin. Intro and outro music by Edith Mudge. You can listen to us on Soundcloud, Apple Podcasts, Google Podcasts, Spotify and anywhere that good podcasts are found. Or . . . Read more
03 Aug, 2023
adobe, arm, artificial intelligence, content authenticity initiative, Cryptography, generative ai, google, Intel, Microsoft, Open Source, openai, palm 2, Security, Security News, shutterstock, software, truepic, writefull
0

Adobe, Arm, Intel, Microsoft and Truepic put their weight behind C2PA, an alternative to watermarking AI-generated content. Image: Sascha/Adobe Stock With generative AI proliferating throughout the enterprise software space, standards are still being created at both governmental and organizational levels for how to use it. One of these standards is . . . Read more
27 Jul, 2023
Apple, BWAIN, Cryptography, Data loss, iPhone, Naked Security Podcast, podcast, Security News, Spyware, TETRA:BURST, Triangulation Trojan, Vulnerability, Zenbleed
0

by Paul Ducklin ONE WEEK, TWO BWAINS Apple patches two zero-days, one for a second time. How a 30-year-old cryptosystem got cracked. All your secret are belong to Zenbleed. Remembering those dodgy PC/Mac ads. No audio player below? Listen directly on Soundcloud. With Doug Aamoth and Paul Ducklin. Intro and . . . Read more

by Paul Ducklin If you’d been quietly chasing down cryptographic bugs in a proprietary police radio system since 2021, but you’d had to wait until the second half of 2023 to go public with your research, how would you deal with the reveal? You’d probably do what researchers at boutique . . . Read more

by Paul Ducklin At the tail-end of last week, Microsoft published a report entitled Analysis of Storm-0558 techniques for unauthorized email access. In this rather dramatic document, the company’s security team revealed the background to a previously unexplained hack in which data including email text, attachments and more were accessed: . . . Read more
01 Jun, 2023
bust, crypto, Cryptography, CVE-2023-32784, cybercrime, Data loss, KeePass, Law & order, oauth, podcast, Ransomware, Security News, Vulnerability
0

by Paul Ducklin IT’S HARDER THAN YOU THINK No audio player below? Listen directly on Soundcloud. With Doug Aamoth and Paul Ducklin. Intro and outro music by Edith Mudge. You can listen to us on Soundcloud, Apple Podcasts, Google Podcasts, Spotify, Stitcher and anywhere that good podcasts are found. Or . . . Read more
09 Mar, 2023
bust, CISA, Cryptography, Law & order, Naked Security Podcast, podcast, Ransomware, Security News, tpm, Vulnerability
0

Lastest episode – listen now! (Full transcript inside.)

Security bugs in the very code you’ve been told you must have to improve the security of your computer…
06 Mar, 2023
bust, Cryptocurrency, Cryptography, cybercrime, DoppelPaymer, Europol, Grief, Law & order, Ransomware, Security News
0

Devices seized, suspects interrogated and arrested, allegedly connected to devastating cyberattack on University Hospital in Düsseldorf.