The Latest Cryptography





Find the Best Cryptography from 2022 here:


Car Immobilisers Using Weak Encryption Schemes

Another case of a certain industry lagging behind, I mean come-on – who seriously still using proprietary cryptography algorithms in 2010? Especially only 40 or 48-bit protocols, with the processing power available on hand now and new techniques like GPU based cracking – that just doesn’t cut it. The latest discovery of such implementations was […]

Topic: Cryptography, Exploits/Vulnerabilities, Hardware Hacking

Hotmail Always-On Encryption Breaks Microsoft’s Own Apps

Oh look, Microsoft is late to the party again? They are finally launching full-session SSL encryption to Hotmail a mere 2 years after Google did the same thing for Gmail. It looks like the release of FireSheep really has had an impact on web-application vendors due to the amount of mainstream media coverage it got […]

Topic: Countermeasures, Cryptography, Networking Hacking Tools

Facebook Introduces OTP (One-time Password) Functionality

Nice to see an innovation on the security front for once rather than endless ‘feature’ updates and announcements of ‘the next big thing’. Facebook has had its fair share of security woes so it’s nice to see they are doing something which I think may be genuinely useful for it’s burgeoning user base. A lot […]

Topic: Countermeasures, Cryptography, Privacy, Web Hacking

WPA2 Vulnerability Discovered – “Hole 196” – A Flaw In GTK (Group Temporal Key)

Well as it tends to be, when something is scrutinized for long enough and with enough depth flaws will be uncovered. This time the victim is WPA2 – the strongest protection for your Wi-fi network which is standardized. WEP fell long ago and there’s a myriad of WEP Cracking tools available. In 2008 it was […]

Topic: Cryptography, Exploits/Vulnerabilities, Wireless Hacking

Website Auto-complete Leaks Data Even Over Encrypted Link

I’m always fascinated by side-channel attacks where the attack is focused on the underlying architecture of the cryptosystem and the data echos it creates rather than the algorithm or implementation itself. Similar somewhat to the recent breaking of OpenSSL using power fluctuations. This time some researcher type fellas focused on the digital noise autocomplete webforms […]

Topic: Cryptography, Exploits/Vulnerabilities, Privacy