OneTime — Encryption with One-Time Pads Note (2014-01-09): OneTime 2.0 is currently in beta testing. See the compatibility notes for details. OneTime is an open source encryption program that uses the one-time pad algorithm to allow two parties to communicate privately. It has features to assist with the bureaucracy of pad management, and comes with built-in help. OneTime requires Python 2.6 or higher, and is for users who are comfortable running command-line programs. CryptoPrevent YES, this is the original CryptoLocker prevention tool you’ve read about! CryptoPrevent has been featured on The Today Show, CNBC, Brian Krebs security blog (among many others) and by educators everywhere such as Kim Komando, Ken Dwight ‘The Virus Doctor’, and the infamous Britec (Britec09 on Youtube) to name just a few! CryptoPrevent is an Anti-Virus/Security Software Supplement, originally designed to prevent infection from the CryptoLocker threat which emerged in late 2013. Since that time, CryptoPrevent has grown into a robust solution, providing protection against a wide range of ransomware and other malware. CryptoPrevent doesn’t stop there.
Carberp Family Malware Targeting the Banking Sector -HackSurfer A challenge incident responders and fraud analysts for firms in the banking and financial services sector (BFSS) will soon be faced with is an increased incidence of customer take-over fraud from a very advanced malware family that was recently released into the wild (Cohen, 2013, July 9). After the historic ZeuS Trojan was released into the wild more sophisticated programmers transformed this already powerful banking Trojan into the very virulent Citadel Trojan. The Citadel permutation was even more resilient, evasive, and sophisticated than the ZeuS Trojan (ibid. p.1). Many are now expressing concern about an even more notorious Russian Trojan that can easily be modified to target BFSS firms in the U.S.(Krebs, 2013, June 13).
You Aren't Using These 10 Simple Security Settings Online security isn't just a good idea anymore — it's an essential safety measure for anyone using the web. In 2012, Wired senior tech reporter Mat Honan lost more than a year's worth of pictures of his newborn daughter after his Google and Amazon accounts were hacked. Earlier in 2013, the Syrian Electronic Army allegedly hacked the Twitter accounts of The Financial Times, E! Online and The Associated Press. In response to such attacks, Internet companies are increasingly moving toward two-step verification policies. This feature, also known as "two-factor authentication," requires a user to enter a security code in addition to her password when logging in from an unrecognized device.
An Encrypted Internet Is a Basic Human Right Nico Sell is co-founder and co-chairman of Wickr Inc. This Op-Ed is part of a series provided by the World Economic Forum Technology Pioneers, class of 2015. Sell contributed this article to Live Science's Expert Voices: Op-Ed & Insights. George Washington could have become a king, but instead devoted his life to giving power back to the people.
Equation Group: Meet the NSA 'gods of cyber espionage' Over the last couple of years we have been hearing about ever more sophisticated pieces of malware. From Stuxnet and Flame to Gauss and most recently Regin, all have shown increasing levels of technical prowess and all have been linked in some way with the US government. These were thought to be the pinnacle of a huge investment in offensive cyber capabilities by the world's wealthiest country. Humility is a key virtue if you are an expert I have been doing IT stuff for over 20 years, technology has changed, people have come and gone. You will meet them again and again! When I master something really well and I see work other people have done that I know is not right, it is easy to become boastful and arrogant.
hackme: Deconstructing an ELF File A friend recently asked me to find the password for a little hard-to-hack program he had written and I agreed to it. The short journey of a few hours that led me to its password were extremely interesting and this article describes the process as well as some of the new techniques learnt along the way. Few minutes after accepting his challenge, I received a binary called "hackme" in an E-mail and I got started! Those interested in giving it a shot can download the binary file and get back to this article later. Do let me know if you find anything interesting along the way that I did not think of or missed! Comments can be sent to manohar dot vanga at gmail dot com with the title [hackme].
ClamWin Portable antivirus to go ClamWin Portable is the popular ClamWin antivirus packaged as a portable app, so you can take your antivirus with you to scan files on the go. You can place it on your USB flash drive, iPod, portable hard drive or a CD and use it on any computer, without leaving any personal information behind. Version 0.99.1 for Windows, English 9MB download / ~120MB installed (Details) - Support PortableApps.com's development and hosting - Support ClamWin directly Could hijackers hold your electronic medical records for ransom? Erica Cohen Posted: Wednesday, September 26, 2012, 5:07 PM by Erica Cohen With data breach issues plaguing even the largest of companies, individuals are understandably concerned that their personal information could be leaked to unauthorized users.