Practical Homomorphic Encryption From IBM

June 25, 2014

One problem with encrypting data in the cloud is that to search through that encrypted cloud you usually have to decrypt the search terms and the data base. A new technique aims to eliminate that.

Read More

The Amphion Forum Washington D.C. 2013 Call For Papers Is Now Open

June 25, 2014

The Amphion Forum call for papers is open for the upcoming Washington D.C. event in May 2013. According to Kurt Stammberger, CISSP and Amphion Forum Chair, new this year will be a up to $1000 travel expense reimbursement for academic, federal and non-profit organization speakers, if selected.

Read More

Possible Android DNS Posioning

June 24, 2014

There's a weakness in Android's pseudo-random number generator (PRNG), which makes DNS poisoning attacks feasible on devices, says IBM researchers

Read More

Jail Broken and Wild: IBM Identifies High-Risk Devices Hitting Corporations Where It Hurts

July 30, 2014

In a report flagging jail broken phones as potential security threats, IBM urged the industry to consider the near future of mobile security at the 2011 IBM Pulse Conference. With more consumers doing e-commerce on smart phones, there is a greater financial incentive for hackers to jail break these devices.

Read More

Tech Giant Hands Out Malware at Security Conference

June 24, 2014

Visitors to IBM's booth at the AusCERT security conference walked away with a token of marketing in the form of complimentary USB flash drives. Unbeknownst to IBM, those same visitors also came back to their computers wielding a piece of malware that has likely found its way on to numerous machines as a result.

Read More
COMMENTS