Archive for June, 2015

Software Security: The Lost Art of Refactoring

June 29, 2015

A sysadmin, a software developer, and an infosec researcher almost walked into a bar. Unfortunately they couldn’t agree where to go together. So they died of thirst. Sounds familiar? When it comes to information technology, there is one thing that binds us all together: software. This article was written and published by software. You can […]

Tags: , , ,
Posted in Development, Discussion, Security Comments Off on Software Security: The Lost Art of Refactoring

I spy with my little Spy, something beginning with „Anti…“

June 27, 2015

Anti-virus software developers made the news recently. The Intercept published an article describing details of what vendors were targeted and what information might be useful for attackers. Obtaining data, no matter how, has its place in the news since 2013 when the NSA documents went public. The current case is no surprise. This statement is not […]

Tags: , , ,
Posted in Discussion, High Entropy, Security 4 Comments »

Crypto Article: „Cornerstones of German Encryption Policy“ from 1999 are still in place

June 24, 2015

We have some more translated news for you. In theory it is an article about policies and the process of law-making. In practice it concerns the use of encryption and everyone relying on service providers (mostly connected to the Internet, i.e. „cloud providers“). No matter how cool your start-up is and what its products aim […]

Tags: , ,
Posted in Discussion, Security 1 Comment »

Dual Use Equation: Knowledge + Vulnerability = “Cyber” Nuclear Missile

June 21, 2015

We all rely on software every  day, one way or another. The bytes that form the (computer) code all around us are here to stay. Mobile devices connected to networks and networked computing equipment in general is a major part of our lives now. Fortunately not all systems decide between life or death in case […]

Tags: , ,
Posted in Discussion, High Entropy, Legal, Odd Comments Off on Dual Use Equation: Knowledge + Vulnerability = “Cyber” Nuclear Missile

Surveillance Article: Listening Posts for Wireless Communication

June 18, 2015

Modern ways of communication and methods to obtain the transported data have raised eyebrows and interest in the past years. Information security specialists are used to digitally dig into the networked world. Once you take a look at buildings, geographic topology, and photographs of structures your world view expands. Coupled with the knowledge of ham […]

Tags: , , , ,
Posted in High Entropy Comments Off on Surveillance Article: Listening Posts for Wireless Communication

New MJS Article: Trusting Your Cloud Provider – Protecting Private Virtual Machines

June 17, 2015

Once you live in the Cloud, you shouldn’t spent your time daydreaming about information security. Don’t cloud the future of your data. The Magdeburger Journal zur Sicherheitsforschung published a new article by Armin Simma (who talked about this topic at DeepSec 2014). The Paper titled »Trusting Your Cloud Provider: Protecting Private Virtual Machines« discusses an […]

Tags: , ,
Posted in Report, Security Comments Off on New MJS Article: Trusting Your Cloud Provider – Protecting Private Virtual Machines

DeepSec Ticket Registration: Early Worm gets to 0wn the Network

June 16, 2015

Did you feed the cat? Did you lock the door? Did you switch off the Internet while on vacation? Did you wrap your wallet in tin foil? Did you buy this ticket to this conference you want to attend in November? How was it called? We have a foolproof way to get over this constant […]

Tags: , ,
Posted in Administrivia, Conference 2 Comments »

Crypto Article: EU Economy needs secure Encryption

June 16, 2015

Given the ongoing demonisation of cryptography we have translated an article for you, written by Erich Möchel, an ORF journalist. The use of encryption stays an important component for information security, regardless which version of the Crypto Wars is currently running. While most of the voices in news articles get the threat model wrong, there are still […]

Tags: , , ,
Posted in Discussion, Security 1 Comment »