KeyTrap: how to break a DNS server with a single packet
The KeyTrap DoS attack, which can disable DNS servers with a single malicious packet exploiting a vulnerability in DNSSEC.
22 articles
The KeyTrap DoS attack, which can disable DNS servers with a single malicious packet exploiting a vulnerability in DNSSEC.
Everything you wanted to know about Google account passkeys: how they work, why they’re needed, where to enable them, how to configure them, and what storage options are available.
How online services should store user passwords, and how to minimize the damage in the event of a leak or hack.
Let’s see how Google, Microsoft and Apple can work together to do away with passwords.
We explain for laypeople what end-to-end encryption is and how it enables private, secure communication for us all.
We explore how encryption protects your data and why quantum computers might shake things up.
Quantum computers are set to change our approaches to data encryption. When that will happen is not yet clear, but we do know when companies need to start preparing — right now.
Researcher Fabian Ising, speaking at the Chaos Communication Congress, showed the limits of PDF encryption’s strength.
On this podcast, Dave and Jeff discuss Windows 7’s end of life, a bug in the Windows CryptoAPI revealed by the NSA, Las Vegas hit with a cyberattack, and more.
Researchers try to modify the contents of a signed PDF file without invalidating the signature.
According to recent news, quantum supremacy is reached. What should we do about it?
Want to protect your intimate photos from ever going public? Facebook has a suggestion: Upload them yourself!
Until very recently, news of blockchain was all around. Now that the hype has passed, let’s contemplate blockchain’s future.
As we see from recent news, quantum computing is evolving faster than anyone could’ve expected. What does this mean for us, the average users?
Confused and wondering how Bitcoin and blockchain work? In this post we break it all down for you.
Quantum computers are said to be coming soon. They will definitely change the information security paradigm. How you can prepare to this shift?
One of the most interesting ciphers designed to eliminate the vulnerability to symbol frequency analysis was the Vigenere cipher. Which later became the basis of unbreakable one-time pads.
A legendary Soviet spy, Richard Sorge, is famous for conveying the exact date of the German invasion into the Soviet Union, and for letting the command know Japan had no plans of attacking the USSR in the Far East.
Five lessons from the story of the Enigma cryptographic machine which are still relevant.
During WW2 modern cryptography principles were often coupled with ‘amateur’ ciphering methods. Curiously, the latter ones often proved to be equally reliable