article thumbnail

Fraudulent Academic Papers

Schneier on Security

SIMON is a block cipher designed by the National Security Agency (NSA) and made public in 2013. Last week, a paper appeared on the International Association for Cryptologic Research (IACR) ePrint archive purporting to demonstrate a much more effective break of SIMON, one that would affect actual implementations.

Paper 88
article thumbnail

GUEST ESSAY: ‘World password day’ reminds us to embrace password security best practices

The Last Watchdog

Did you know that this unconventional celebration got its start in 2013, and that it’s now an official holiday on the annual calendar? As a data-driven, security-focused company, we’ve rounded up our top tips inspired by World Password Day to help you improve your password game. We celebrated World Password Day on May 6, 2021.

Passwords 182
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

On the Subversion of NIST by the NSA

Schneier on Security

Nadiya Kostyuk and Susan Landau wrote an interesting paper: “ Dueling Over DUAL_EC_DRBG: The Consequences of Corrupting a Cryptographic Standardization Process “: Abstract: In recent decades, the U.S. Cryptographic algorithms are essential to security yet are hard to understand and evaluate. government process.

Paper 98
article thumbnail

Here’s Some Bitcoin: Oh, and You’ve Been Served!

Krebs on Security

Not so long ago, you had track down your defendant and hire someone to physically serve them with a copy of the court papers. ” Nick Bax is a security researcher who specializes in tracing the labyrinthine activity of criminals trying to use cryptocurrency exchanges and other financial instruments to launder the proceeds of cybercrime.

article thumbnail

Data security and the legal sector – ISO 27001 for law firms

IT Governance

With the legal sector reporting an increase in targeted attacks in 2018, information security management remains a serious issue for law firms. With increased levels of cyber attacks, information security must be a priority. As such, a security regime focused solely on technology will fail.

article thumbnail

Protect Your Sensitive Information with Secure Destruction

Armstrong Archives

Secure destruction of sensitive personal, financial, and healthcare information is a must. It’s not enough to rip up paper documents anymore – now that data has gone digital, it’s necessary to securely destroy sensitive information in cyberspace as well. Data Breaches Are Extremely Common. No industry is safe from data breaches.

article thumbnail

Centre Releases Paper on Big Data and Analytics

Hunton Privacy

The paper, which is the product of an industry-sponsored initiative led by the Centre, suggests a two-phase approach that separates how organizations discover what data can reveal from how those insights are applied to knowledge development and decisionmaking. View the paper.