Encryption is the foundation of our digital age. But what happens when new technology can eliminate the protection of modern cryptography? Tom Hollingsworth takes a look at the solutions that are on the horizon to save us from the coming quantum reckoning.
WPA3 is the new wireless authentication protocol just around the corner. It’s being developed to fix some of the issues with the ancient WPA2 protocol. But what about open encryption? Why don’t we just run everything over SSL and save time? Tom Hollingsworth examines the need for WPA3 with OWE and why TLS alone isn’t going to work.
Data protection can mean making sure you have adequate copies to ensure integrity and uptime. But after Australia passed the Telecommunications Access and Assistance Bill, requiring encryption backdoors, Preston de Guise wonders if it’s possible maintain the privacy function of data protection.
Bruce Schneier breaks down why traditionally encryption may be in trouble once quantum computing becomes a reality, and what security researchers are doing to keep things locked down.
ProtonMail has provided highly secure email, but isn’t the most convenient solution to actually use. With the release of the ProtonMail Bridge, users can now integrate ProtonMail into their mail client of choice.
Malware is a constant battle. And as malware creators find new ways to evade detection with SSL, how can security professionals fight back and save their networks? Tom Hollingsworth takes a look at a solution from Gigamon that gives you the power to see what the bad guys are trying to hide.
Rubrik’s that new backup solution that makes traditional backups a snap – pun intended. I’m a former Systems Administrator and there was absolutely nothing I hated more than managing backup jobs and reviewing why the backups failed all the time. I viewed backups as that thing I had to do each day as fast as possible, so I could get to the interesting parts of being a Systems Administrator like fielding support calls and patching servers. Hey, I was young and it was a phase I was going through, back off.
The writing has been on the wall for SHA-1 for quite some time. The cryptographic hash has been around over a decade now, but organizations have started to move away from it as more sophisticated options became available (SHA-256, SHA-3, etc). Back in 2013, researchers published theoretical approach to generating a collision. Now with the help of Google’s computation grunt and additional resources, were able to actually generate a collision in the wild.
Over the last few weeks I’ve been using Zumodrive, another cloud storage offering. This week Zumodrive released their iPhone client, which enables storage to be synchronised to an iPhone or iPod Touch device.
One of my projects involved the configuration of GRE (Generic Routing Encapsulation) tunnels, encrypted by IPSec, between two locations. I was having some problems getting the tunnels to work properly, but now I’ve managed to resolve that problem, and the configuration is working well. Here’s some additional information on the problem and how it was finally corrected.