• Trend Micro
  • About TrendLabs Security Intelligence Blog
Search:
  • Home
  • Categories
    • Ransomware
    • Vulnerabilities
    • Exploits
    • Targeted Attacks
    • Deep Web
    • Mobile
    • Internet of Things
    • Malware
    • Bad Sites
    • Spam
    • Botnets
    • Social
    • Open source
Home   »   cryptography

CTO Insights: Encryption Works – Don’t Break It!

  • Posted on:December 1, 2015 at 12:00 am
  • Posted in:Social
  • Author:Raimund Genes (Chief Technology Officer)
1

Every now and then, an ill-informed politician will stand before a microphone and say something along the lines of: encryption is helping bad guys (either terrorists, child pornographers, or other similarly acceptable target), because law enforcement can’t see what the bad guys are doing because they’re using sophisticated tools that use encryption. Said politician will urge tech companies to “work with us” to help catch these bad guys.

Read More
Tags: cryptographyencryptionprivacyterrorism

Are Secure Communications Really Secure? Government Sites Affected by Weak DHE

  • Posted on:July 10, 2015 at 7:27 am
  • Posted in:Bad Sites
  • Author:
    William Gamazo Sanchez (Vulnerability Research)
0

How secure is online public communication? Last May, a paper was published that discusses about the Diffie-Helman (DH) crypto-strength deployment, which gives strong evidence that the current DH usage is weak and suggests that 1024-bit size parameters can be broken with a nation state’s computing power resources. The paper presents possible scenarios where such an incident could occur. They found,…

Read More
Tags: cryptographyDHEHTTPSman in the middleOpenSSLprivacySSLTLS

The State of Cryptography in 2014, Part 2: Hardware, Black Swans, and What To Do Now

  • Posted on:May 7, 2014 at 9:10 am
  • Posted in:Bad Sites
  • Author:
    Morton Swimmer (Senior Threat Researcher)
0

We continue our look into the state of cryptography in 2014; Part 1 was posted earlier this week. Is Hardware Security Any Better? We closed the first post by asking: is hardware any more trustworthy? One would think that it is… but it’s not. Recently, chip vendors have been incorporating cryptography into their CPUs or chipsets. Usually,…

Read More
Tags: CPUcryptographyFreeBSDOpenBSD

The State of Cryptography in 2014, Part 1: On Fragility and Heartbleed

  • Posted on:May 6, 2014 at 6:30 am
  • Posted in:Bad Sites
  • Author:
    Morton Swimmer (Senior Threat Researcher)
0

It seems like cryptography has been taking a knock recently. This is both good and bad, but is not actually true: cryptography is always under attack, and for that reason constantly evolves. That’s bad, but it’s good to realize that cryptography needs constant attention. The threat to cryptography can be very disruptive, as we most recently…

Read More
Tags: BSDcryptographyHeartbleedSSLTLS

Security Predictions for 2020

  • Cybersecurity in 2020 will be viewed through many lenses — from differing attacker motivations and cybercriminal arsenal to technological developments and global threat intelligence — only so defenders can keep up with the broad range of threats.
    Read our security predictions for 2020.

Business Process Compromise

  • Attackers are starting to invest in long-term operations that target specific processes enterprises rely on. They scout for vulnerable practices, susceptible systems and operational loopholes that they can leverage or abuse. To learn more, read our Security 101: Business Process Compromise.

Popular Posts

Sorry. No data so far.

Stay Updated

  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, 日本, 대한민국, 台灣
  • Latin America Region (LAR): Brasil, México
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Österreich / Schweiz, Italia, Россия, España, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © Trend Micro Incorporated. All rights reserved.