Forgot your password?

Security Stories for 2001

"Fast Packet Keying" Improvements to WEP 88 comments
Smart Card Authentication in Mixed Environments? 11 comments
Escape from Data Alcatraz 248 comments
Pictorial Passwords 331 comments
Some Companies Don't Care about Web Defacement 217 comments
Responsible Handling of Billing Information? 259 comments
Oracle 9i Isn't Quite Unbreakable 113 comments
Content Faction v. Tech Faction 235 comments
Web Security, Privacy and Commerce 68 comments
Interview With Microsoft's Chief of Security 245 comments
WEP Gets A Bit Stronger 84 comments
Uber-patch for Internet Explorer 590 comments
Guardent To Sell Snort And Nessus 105 comments
Single-Photon LED: Key To Uncrackable Encryption? 228 comments
Solaris, AIX Login Hole 267 comments
FBI Confirms Magic Lantern Existence 461 comments
War Driving With The Kids 133 comments
Rate the Intrusion Detection Systems? 14 comments
Future Of IDS 125 comments
Network Webcurity Wishlist? 512 comments
AES Announced as Federal Standard 267 comments
Latest WinWorm Spreads Via ICQ And Outlook 598 comments
Information Security On An Olympic Scale 160 comments
Crashing A Nokia Phone Via SMS 197 comments
Books on the History of Hacking? 30 comments
Encrypted Email and Online File Storage - Cryptoheaven 33 comments
The Problem of Search Engines and "Sekrit" Data 411 comments
New Microsoft SQL Server Worm 290 comments
Digitally Notarized Documents in Brazil 77 comments
Enhanced Carnivore To Crack Encryption Via Virus 522 comments
HDCP Break Proven 220 comments
Web Services - More Secure or Less? 300 comments
Do-It-Yourself Home Security? 49 comments
SSH and OpenSSH Comparisons? 26 comments
Schneier On Full Disclosure 232 comments
Are There Risks in Sharing Firewall Logs? 26 comments
Federal Computers Fail Hacker Test 125 comments
How Does Win2k's Encrypted File System Really Work? 26 comments
IBM Crypto Up For Grabs? 230 comments
Security Auditing for Linux 112 comments
Blocking Destructive Users from Websites? 38 comments
Drive-By Hacking in London 213 comments
Fingerprinting Port 80 Attacks 147 comments
Strong Token-Based Authentication w/ Open Source Software? 87 comments
OpenBSD 3.0 Ready for Pre-Orders 37 comments
DEF CON "Capture the Capture The Flag" Data 107 comments
Undercover Hacking, For Money 246 comments
Holographic Sonar Cryptography 182 comments
CERT Finds Routers Increasingly Being Cracked 294 comments
Security Issues with Windows 2000 Datacenter? 357 comments
Ethernet Wiring Through Hostile Territory? 65 comments
Microsoft Blames the Messengers 731 comments
Aleph1 Passes The Bugtraq Baton 69 comments
Learning the Ropes of Security Consulting? 6 comments
NAI to Sell Off PGP Product Line 305 comments
What's The Future of DRM? 374 comments
Man Pleads Guilty to Stealing Enigma Machine 155 comments
News.com: Crypto Doesn't Kill - People Do 259 comments
Interim Response from Philip Zimmermann 305 comments
What's Now State of the Art in Encryption Technology? 483 comments
Study Finds Low Use Of Steganography On Internet 291 comments
Philip Zimmermann and 'Guilt' Over PGP 837 comments
Legislating Insecure Encryption 290 comments
Blaming Encryption 505 comments
How Would Crypto Back Doors Work? 477 comments
Ellipse-based Email Encryption 15 comments
Congress Considers Mandatory Crypto Backdoors 1105 comments
SSH Key Management Part 2 109 comments
PGP Key Validity Attack 5 comments
SSH Taking Stand On Vulnerability 90 comments
Phil Zimmermann Talk Summary And Audio 82 comments
SSH Vulnerability and the Future of SSL 290 comments
Battling Steganography 195 comments
HDCP Encryption Cracked, Details Unreleased Due To DMCA 362 comments
Wireless LAN Encryption Standard Broken 320 comments
Another Audio Watermark Scheme Wins TI DSP Contest 119 comments
What Encryption Do People In The Know Use? 59 comments
Macrovision CD Protection Bypassed 301 comments
Legal Challenge to FBI's Keystroke Sniffing 217 comments
New Weakness in 802.11 WEP 5 comments
OpenSSH Management - Understanding RSA/DSA Authent 95 comments
Win $200,000 In RSA's Factoring Challenge 152 comments
Dmitry Protests Running 271 comments
Sklyarov Arrest Follow-up 386 comments
Fallout From Def Con: Ebook Hacker Arrested by FBI 367 comments
Quantum Encryption Via Satellite 113 comments
PGP/GnuPG June Key Analysis 70 comments
CSS Decryption Library Released by Videolan.org 82 comments
Crypto Series on TV 4 comments
RC5-64 Project Teeters At The Halfway Mark 118 comments
Are Strong Passwords All That Strong? 44 comments
Elegant Email Encryption for Everyone? 365 comments
German Crypto Mobile Announced 112 comments
Sony PS2 To Sport Netscape and SSL 88 comments
Encrypting with Stunnel 0 comments
The Feds Thoughts on Clipper 100 comments
Alan Turing: The Enigma 0 comments
Digital Display Encryption Details Leaked 212 comments
DVD Watermarking On Its Way 208 comments
Making Quantum Crypto Actually Work 111 comments
This Laptop Will Self-Destruct 106 comments
Are Open Standards Bad for Encryption? 18 comments
Using GnuPG with Pine 5 comments
PGP Division to Work With NSA on Secure Linux 151 comments
Is Encryption Really Secure? 201 comments
Why Are SSL Certificates So Expensive? 192 comments
Document-Destroying Copy Protection System 152 comments
Neal Stephenson on Zeta Functions 102 comments
Is Crypto Solely for Criminals? 179 comments
Draft FIPS for the Advanced Encryption Standard 51 comments
Does Cracking Encryption Involve Some Precognition? 22 comments
Making PKI Work 53 comments
NZ Police Pay Vodafone for Interception Capability 9 comments
Professor Describes Unbreakable Cryptosystem? 241 comments
PRZ Announces Depature From NAI 91 comments
The ssh vs. OpenSSH Trademark Battle, Next Round 252 comments
Chair of IEEE 802.11 Responds to WEP Security Flaws 57 comments
SSH Claims Trademark Infringement by OpenSSH 593 comments
Vulnerability In SSH1 118 comments
Nasty Bad Men Are Using Encryption 342 comments
WEP Examined 2 comments
Code Breaking 8 comments
RSA Cracked - Not 128 comments
NSA + VMware = Crackproof Computing? 157 comments
French Hackers Break SDMI 112 comments
Cracking All The Live Long Day & RH6/7 Worms 120 comments
Secure Digital Voice Communications In World War II 34 comments
E-Mail Clients That Support X.509 Digital IDs? 113 comments
EnigmaMail version 1.0 11 comments
CPS-2 Encryption Scheme Broken 45 comments
Disappearing Cryptography 46 comments

The key elements in human thinking are not numbers but labels of fuzzy sets. -- L. Zadeh

 



Forgot your password?