Encryption can be a mind bender – Part 2

By Bob Weiss

If you missed Part 1 of this article, it can be found at last week’s post on May 5

Hybrid Cryptography

When we use two or more cryptographic methods together, it is called Hybrid Cryptography.  Common forms of Hybrid Cryptography included the creation and sharing of Symmetric session keys, through using Asymmetric Encryption.

Not all key exchange methods require using the PKI.  Diffey-Helman, Oakley and other non-PKI key exchange ...

Continue Reading →
0

Encryption can be a mind bender – Part 1

By Bob Weiss

May the Force be with you!  It’s May the fourth, Star Wars Day.

I received an email from a CASP+ Student asking for some help with encryption.  This is what I sent.

Encryption can be a mind bender.  And then like magic, it is not.

If you are up for some outside reading (what! More reading?  Sorry) there are a couple of books that helped me

The Code Book, by Simon Singh

Crypto ...

Continue Reading →
1

Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


LANtenna hack spies on your data from across the room!

Are your network cables acting as undercover wireless transmitters? What can you do if they are?


A few posts from Bruce Schneier


FBI Had the REvil Decryption Key

[2021.09.22] The Washington Post reports that the FBI had a decryption ...

Continue Reading →
0

Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


Why open source software supply chain management is worse than you think

A Sonatype survey also found a 650% year-over-year increase in supply chain attacks aimed at upstream public repositories.


VMware patch bulletin warns: “This needs your immediate attention.”

“It is a matter of time before working exploits are available,” warns VMware.


Continue Reading →
0

Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


The Invention of the Typewriter

On June 24, 1868, Christopher Latham Sholes received a patent for something he called a “Type-Writing Machine.” The early tech resembled a piano and had 21 keys.

Find out how Sholes’ earliest keyboard evolved into today’s universal QWERTY system (named for the first six letters in the top row of keys).


Continue Reading →
0

Guest Post – Benefits of Installing A Home Alarm System

Technological growth has made our life simpler and secure. From the safety and security perspective, you now can choose the best systems that can keep a check on the premises and ensure that there is no unauthorized entry into the premises.  Home alarm systems have become a popular choice of homeowners who wish to ensure the complete safety ...

Continue Reading →
0

Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


3 ways the CI/CD approach to software has made work better for developers

The software industry has gotten much better at breaking big projects down into smaller chunks, according to one CTO.  (CISSP Domain 8)


When cryptography attacks – how TLS helps malware hide in plain sight

No IT technology feels quite as much of ...

Continue Reading →
0