Tumblelog by Soup.io
Newer posts are loading.
You are at the newest post.
Click here to check if anything new just came in.

May 14 2018

#efail, Crypto, HTML, PDF, and other complex Topics

You probably have noticed the #efail hashtag that came with the claim that the crypto world of PGP/GPG and S/MIME is about to end. Apocalyptic announcements were made. The real news is due for 15 May 2018 (i.e. the publication with all the facts). There was even the advice to stop using encryption until more […]

The post #efail, Crypto, HTML, PDF, and other complex Topics appeared first on .

Reminder: DeepINTEL and DeepSec Call for Papers are still open

We have been a bit radio silent. We have to deal with the General Data Protection Regulation (GDPR), and we are moving our infrastructure across the Internet. The blog is already moved. Further services wait for their transport. The reason is simple maintenance work and hosting our data a bit more privacy-friendly. For example our […]

The post Reminder: DeepINTEL and DeepSec Call for Papers are still open appeared first on .

March 31 2018

Manufacturers integrate Blockchain into Processors to counter Spectre and Meltdown

The Spectre and Meltdown security vulnerabilities gathered a lot of attention in January. Processor manufacturers have rushed to fix the design of the chips and to patch products already in production. The vulnerabilities show that secure design is critical to our modern infrastructure. Computing has become ubiquitous, so has networking. The current fixes change the […]

The post Manufacturers integrate Blockchain into Processors to counter Spectre and Meltdown appeared first on .

March 28 2018

Metrics, Measurement, and Information Security

Metric is a great word. Depending how you use it, it changes its meaning. The metric of a network path is quite different from the metric system. When it comes to measuring something, the might be an agreement. Why bother? Because we have heard of the term security metrics being used for something which should […]

The post Metrics, Measurement, and Information Security appeared first on .

March 26 2018

Advanced and In-Depth Persistent Defence

The attribution problem in digital attacks is one of these problems that get solved over and over again. Of course, there are forensics methods, analysis of code samples, false flags, mistakes, and plenty of information to get things wrong. This is nothing new. Covering tracks is being done for thousands of years. Why should the […]

The post Advanced and In-Depth Persistent Defence appeared first on .

March 23 2018

Upgrade to HTTP2

We are busy with a little housekeeping. Among other things we have changed the way you can access our blog. It is now using HTTP2. We also added encryption and redirect all HTTP requests to HTTPS. Search engines should update their caches as soon as they refresh the pages. Hopefully this does not break anything. […]

The post Upgrade to HTTP2 appeared first on .

March 19 2018

The Grotesqueness of the “Federal Hack” of the German Government Network

[Editor’s note: This article was originally published on the web site of the FM4 radio channel of the Austrian Broadcasting Corporation. We have translated the text in order to make the content accessible for our English-speaking audience. We will follow-up on it with an article of our own about attribution, digital warfare, security intelligence, and […]

The post The Grotesqueness of the “Federal Hack” of the German Government Network appeared first on .

February 27 2018

Support for BSidesLondon’s Rookie Track

We are proud to support the Rookie Track at BSidesLondon in 2018 again. This means that one of us will be present at the Rookie Track and that the winner will get to attend DeepSec in November. It’s hard to get a start, so we like to help the rookies with that. We also like […]

The post Support for BSidesLondon’s Rookie Track appeared first on .

May 14 2018

#efail, Crypto, HTML, PDF, and other complex Topics

You probably have noticed the #efail hashtag that came with the claim that the crypto world of PGP/GPG and S/MIME is about to end. Apocalyptic announcements were made. The real news is due for 15 May 2018 (i.e. the publication with all the facts). There was even the advice to stop using encryption until more […]

The post #efail, Crypto, HTML, PDF, and other complex Topics appeared first on .

Reminder: DeepINTEL and DeepSec Call for Papers are still open

We have been a bit radio silent. We have to deal with the General Data Protection Regulation (GDPR), and we are moving our infrastructure across the Internet. The blog is already moved. Further services wait for their transport. The reason is simple maintenance work and hosting our data a bit more privacy-friendly. For example our […]

The post Reminder: DeepINTEL and DeepSec Call for Papers are still open appeared first on .

March 31 2018

Manufacturers integrate Blockchain into Processors to counter Spectre and Meltdown

The Spectre and Meltdown security vulnerabilities gathered a lot of attention in January. Processor manufacturers have rushed to fix the design of the chips and to patch products already in production. The vulnerabilities show that secure design is critical to our modern infrastructure. Computing has become ubiquitous, so has networking. The current fixes change the […]

The post Manufacturers integrate Blockchain into Processors to counter Spectre and Meltdown appeared first on .

March 28 2018

Metrics, Measurement, and Information Security

Metric is a great word. Depending how you use it, it changes its meaning. The metric of a network path is quite different from the metric system. When it comes to measuring something, the might be an agreement. Why bother? Because we have heard of the term security metrics being used for something which should […]

The post Metrics, Measurement, and Information Security appeared first on .

March 26 2018

Advanced and In-Depth Persistent Defence

The attribution problem in digital attacks is one of these problems that get solved over and over again. Of course, there are forensics methods, analysis of code samples, false flags, mistakes, and plenty of information to get things wrong. This is nothing new. Covering tracks is being done for thousands of years. Why should the […]

The post Advanced and In-Depth Persistent Defence appeared first on .

March 23 2018

Upgrade to HTTP2

We are busy with a little housekeeping. Among other things we have changed the way you can access our blog. It is now using HTTP2. We also added encryption and redirect all HTTP requests to HTTPS. Search engines should update their caches as soon as they refresh the pages. Hopefully this does not break anything. […]

The post Upgrade to HTTP2 appeared first on .

March 19 2018

The Grotesqueness of the “Federal Hack” of the German Government Network

[Editor’s note: This article was originally published on the web site of the FM4 radio channel of the Austrian Broadcasting Corporation. We have translated the text in order to make the content accessible for our English-speaking audience. We will follow-up on it with an article of our own about attribution, digital warfare, security intelligence, and […]

The post The Grotesqueness of the “Federal Hack” of the German Government Network appeared first on .

May 14 2018

Reminder: DeepINTEL and DeepSec Call for Papers are still open

We have been a bit radio silent. We have to deal with the General Data Protection Regulation (GDPR), and we are moving our infrastructure across the Internet. The blog is already moved. Further services wait for their transport. The reason is simple maintenance work and hosting our data a bit more privacy-friendly. For example our […]

The post Reminder: DeepINTEL and DeepSec Call for Papers are still open appeared first on .

March 31 2018

Manufacturers integrate Blockchain into Processors to counter Spectre and Meltdown

The Spectre and Meltdown security vulnerabilities gathered a lot of attention in January. Processor manufacturers have rushed to fix the design of the chips and to patch products already in production. The vulnerabilities show that secure design is critical to our modern infrastructure. Computing has become ubiquitous, so has networking. The current fixes change the […]

The post Manufacturers integrate Blockchain into Processors to counter Spectre and Meltdown appeared first on .

March 28 2018

Metrics, Measurement, and Information Security

Metric is a great word. Depending how you use it, it changes its meaning. The metric of a network path is quite different from the metric system. When it comes to measuring something, the might be an agreement. Why bother? Because we have heard of the term security metrics being used for something which should […]

The post Metrics, Measurement, and Information Security appeared first on .

March 26 2018

Advanced and In-Depth Persistent Defence

The attribution problem in digital attacks is one of these problems that get solved over and over again. Of course, there are forensics methods, analysis of code samples, false flags, mistakes, and plenty of information to get things wrong. This is nothing new. Covering tracks is being done for thousands of years. Why should the […]

The post Advanced and In-Depth Persistent Defence appeared first on .

March 23 2018

Upgrade to HTTP2

We are busy with a little housekeeping. Among other things we have changed the way you can access our blog. It is now using HTTP2. We also added encryption and redirect all HTTP requests to HTTPS. Search engines should update their caches as soon as they refresh the pages. Hopefully this does not break anything. […]

The post Upgrade to HTTP2 appeared first on .

Older posts are this way If this message doesn't go away, click anywhere on the page to continue loading posts.
Could not load more posts
Maybe Soup is currently being updated? I'll try again automatically in a few seconds...
Just a second, loading more posts...
You've reached the end.

Don't be the product, buy the product!

Schweinderl