Archive | Cryptography


12 May 2009 | 4,724 views

Ensuring Data Security During Hardware Disposal

After our recent story about the trading of BlackBerries for data theft the issue has emerged again this time more towards the secure disposal of data stored on PC hard disks. If a company or organisation has a decent data/information security policy in place (Like ISO27001 for example) they should have a secure destruction/disposal policy […]

Continue Reading


08 May 2009 | 10,674 views

Explosion Of BlackBerry Trading In Nigeria – Data Theft

The number of Crackberry Blackberry users is increasing exponentially – especially since they released the much sexier Bold and the latest touch-screen Storm. The latest revelation is that used BlackBerries are being traded, not by the value of the phone but by the value of the data contained on the phone! It just shows most […]

Continue Reading


05 December 2008 | 46,917 views

The World’s Fastest MD5 Cracker – BarsWF

BarsWF is basically an MD5 cracking tool and at the moment, is currently the fastest. Right now on nVidia 9600GT/C2D 3Ghz CUDA version does 350 M keys/sec, SSE2 version does 108 M keys/sec. You may check benchmarks of all known good MD5 bruteforcers here. Changes in 0.8 Added checks for errors when calling CUDA kernel. […]

Continue Reading


03 October 2008 | 8,442 views

THC-ePassports – THC Clones Biometric ePassport – Elvis Presley Passport

I guess most people have been led to believe this new generation of ePassports or biometric passports are more secure, will help us keep our privacy intact and help us mitigate against identity theft. Well how wrong the propaganda is! THC (famous for their tools and research in security) has just released some technical information, […]

Continue Reading


26 June 2008 | 41,814 views

Hackers Crack London Tube Oyster Card

It just goes to show, having an aluminium lined wallet could really be useful! Hackers in the Netherlands found they could clone an access card using the Mifare chip, after that they traveled to London to try their technique out on the Oyster card (used on the London Underground), which uses the same chip. It […]

Continue Reading


02 May 2007 | 9,341 views

That ‘magic’ number

09 F9 11 02 9D 74 E3 5B D8 41 56 C5 63 56 88 C0 This is everywhere today. Every major news site has this ‘magic’ number in it. Digg.com had stories with more than 24.000 diggs (that’s actually the first time I see that many). In case you’ve been in a cave for […]

Continue Reading

Tags: , , , ,

05 March 2007 | 6,184 views

Let’s Digest Some Messages – md5 Hash Checker for Windows

Of course it’s a small article about md5… I really wondered how many Micro$oft Windows users check the md5 sum of programs that they download from the internet… Do you really trust that much the mirror websites? Even I could set up a mirror website for any download website and spread malformed packages to include, […]

Continue Reading


02 March 2007 | 10,538 views

SHA-1 Cracked – Old News, But People Still Talk

A paper about cracking SHA-1 originally surfaced in 2005, from a fairly reputable scientific source in China, it was widely publicised nor talked about much. But then recently, just last month China managed to make a wave out of it, almost 2 years after the initial ‘report’. It was even Slashdotted on January 20th 2007, […]

Continue Reading


29 May 2006 | 6,073 views

Malicious Cryptography – Cryptology & Cryptovirology

I know this maybe old news for some of you, however, I just got the chance of reading this great article on Security Focus (it’s been 2 weeks since I add it to my Favorites) This two part article discusses some good points of Cryptology, more precisely in the field of Cryptovirology. Writing a virus […]

Continue Reading