Video Screencast Help

Encryption Blog

Results for Encryption Blog

Congress Passes Cybercrime Bill While the executive branch of the U.S. government was consumed last week with helping the credit markets find a way out the desert, the legislative branch focused just long enough on cybercrime to pass an important bill. ...
Blog Entry by Doug McLean | 23 Sep 2008 | 0 comments
The U.S. Department of Justice yesterday released the results of a cybercrime survey in which they polled nearly 8,000 businesses about their experience with cybercrime. Not surprisingly, they found that 67% of their respondents had detected at ...
Blog Entry by Doug McLean | 18 Sep 2008 | 0 comments
Damon Patrick Toey plead guilty Friday to his role in the TJX breach. The legal strategy being pursued by the prosecution here is pretty clear. Get one or more of the minor players to roll over by promising leniency if they testify against the ...
Blog Entry by Doug McLean | 15 Sep 2008 | 0 comments
A report out of the Identity Theft Resource Center claims that the number of data breaches in 2008 has already surpassed 2007's total of 446. While it's intuitively obvious that the number of data breaches is increasing, I have a hard time ...
Blog Entry by Doug McLean | 03 Sep 2008 | 0 comments
Jesper Johansson posted a really terrific piece entitled " Anatomy of a Malware Scam " on The Register Friday. Johansson is an All-Pro security expert and researcher and does a marvelous job of breaking down an extremely complicated scam into ...
Blog Entry by Doug McLean | 24 Aug 2008 | 0 comments
OK, it may not be as big a news story as Lindsay Lohan's announcing she's converting to Judaism, but I thought the story coming out of embattled Georgia that they have been seeing massive Distributed Denial of Service attacks originating in ...
Blog Entry by Doug McLean | 15 Aug 2008 | 0 comments
It's been said that you shouldn't ever overestimate the intelligence of your basic criminal. One of my favorite cybercrime stories, however, deals with a perpetrator who was clearly smart enough, but was just unlucky...very unlucky. In June ...
Blog Entry by Doug McLean | 14 Aug 2008 | 0 comments
It's been an extraordinarily active week on the cybercrime front and it feels like a good time to initiate a new blog I've been thinking about for some time. For those of us that track cybercrime, identity theft and the other activities of ...
Blog Entry by Doug McLean | 12 Aug 2008 | 0 comments
Decryption Without Key Present The PGPsdk has a feature that allows the Encrypted Session Key (ESK) from a message to be extracted and decrypted separately. The decrypted ESK could then be used later to decrypt the original message. It works as ...
Blog Entry by Doug McLean | 12 Aug 2008 | 0 comments
While products such as PGP Universal and PGP Desktop have done a successful job of protecting email and storage, securing the data presented in web application have largely been unaddressed.  Users of web mail (Gmail), forums, blogs and group calendering ...
Blog Entry by Doug McLean | 25 Jul 2008 | 0 comments