Cyber Attacks Have Been Monetized

Very impressive attacks are first discussed as theoretical possibilities. “If an attacker had these enormous resources …” and so on. Then researchers give presentations at conferences showing how the theoretical might be less impractical than we expected. That is followed by a proof of concept demonstration, and then we have attacks occurring in the wild. […]
Read More ›

Voltage Fluctuations, Heat, and Other Side-Channel Attacks

A presentation at the recent Black Hat meeting discussed a side-channel attack on web servers. Variations in supply voltage and CPU temperature can cause errors which leak information about the server’s RSA secret key. Full details are in their paper “Fault-Based Attack of RSA Authentication.” This is another case where cloud provider infrastructure could provide […]
Read More ›

Gumbo and Security

I love gumbo and my wife and friends love the gumbo I make. I have computers in my home office. I am an Eagle Scout. These three things, combined with an experience from college, make me have and test backups of my data and of my power. First, the power. My office is at home. […]
Read More ›

Taking a Virus to the PROM

A French security researcher named Jonathan Brossard has demonstrated that a virus can infect your computer’s BIOS. That virus is not stored on the hard drive and that makes it difficult to detect and then remove.  Brousard’s presentation at Black Hat 2012 has been discussed a great deal in security columns and blogs recently. Here […]
Read More ›

This Hash Result Startled Me!

Even when you work with this technology, sometimes you are really surprised to find that things don’t work at all as you might expect. Hash functions are one-way operations. It is easy to calculate the hash of even a large piece of data. But it should be impractically difficult to find an input that generates […]
Read More ›

Type to search blog.learningtree.com

Do you mean "" ?

Sorry, no results were found for your query.

Please check your spelling and try your search again.