Practical Homomorphic Encryption From IBM

By Robert Vamosi | 5/6/13 6:47 AM

One problem with encrypting data in the cloud is that to search through that encrypted cloud you usually have to decrypt the search terms and the data base. A new technique aims to eliminate that.

Read More >

The Amphion Forum Washington D.C. 2013 Call For Papers Is Now Open

By Robert Vamosi | 1/28/13 3:35 AM

The Amphion Forum call for papers is open for the upcoming Washington D.C. event in May 2013. According to Kurt Stammberger, CISSP and Amphion Forum Chair, new this year will be a up to $1000 travel expense reimbursement for academic, federal and non-profit organization speakers, if selected.

Read More >

Possible Android DNS Posioning

By Robert Vamosi | 7/25/12 12:27 AM

There's a weakness in Android's pseudo-random number generator (PRNG), which makes DNS poisoning attacks feasible on devices, says IBM researchers

Read More >

Jail Broken and Wild: IBM Identifies High-Risk Devices Hitting Corporations Where It Hurts

By JDavis | 3/11/11 6:15 AM

In a report flagging jail broken phones as potential security threats, IBM urged the industry to consider the near future of mobile security at the 2011 IBM Pulse Conference. With more consumers doing e-commerce on smart phones, there is a greater financial incentive for hackers to jail break these devices.

Read More >

Tech Giant Hands Out Malware at Security Conference

By JDavis | 6/7/10 8:34 AM

Visitors to IBM's booth at the AusCERT security conference walked away with a token of marketing in the form of complimentary USB flash drives. Unbeknownst to IBM, those same visitors also came back to their computers wielding a piece of malware that has likely found its way on to numerous machines as a result.

Read More >