Forwarded message:
--
From: Morris Dworkin [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Subject: NIST considering submissions of block cipher modes
Date: Sun, 08 Jun 2008 19:28:06 -0400
Message-ID: [EMAIL PROTECTED]
FYI, in recent
According to
http://www.computerworld.com/action/article.do?command=viewArticleBasicarticleId=9094818intsrc=hm_list%3E%20articleId=9094818intsrc=hm_list
some new malware is encrypting files with a 1024-bit RSA key. Victims
are asked to pay a random to get their files decrypted. So -- can
the key
Computerworld reports:
http://www.computerworld.com/action/article.do?command=viewArticleBasicarticleId=9094818
on a call from Kaspersky Labs for help breaking encryption used by some
ransomeware: Code that infects a system, uses a public key embedded in
the code to encrypt your files, then
Leichter, Jerry wrote:
Computerworld reports:
http://www.computerworld.com/action/article.do?command=viewArticleBasicarticleId=9094818
This is no different than suffering a disk crash. That's what backups
are for.
/ji
PS: Oh, backups you say.
On Jun 9, 2008, at 11:54 AM, Leichter, Jerry wrote:
Computerworld reports:
http://www.computerworld.com/action/article.do?command=viewArticleBasicarticleId=9094818
[...]
Apparently earlier versions of this ransomware were broken because
of a
faulty implementation of the encryption. This
On Mon, 9 Jun 2008, John Ioannidis wrote:
| Date: Mon, 09 Jun 2008 15:08:03 -0400
| From: John Ioannidis [EMAIL PROTECTED]
| To: Leichter, Jerry [EMAIL PROTECTED]
| Cc: cryptography@metzdowd.com
| Subject: Re: Ransomware
|
| Leichter, Jerry wrote:
| Computerworld reports:
|
|
Steven M. Bellovin wrote:
According to
http://www.computerworld.com/action/article.do?command=viewArticleBasicarticleId=9094818intsrc=hm_list%3E%20articleId=9094818intsrc=hm_list
some new malware is encrypting files with a 1024-bit RSA key. Victims
are asked to pay a random to get their files
John Ioannidis wrote:
This is no different than suffering a disk crash. That's what backups
are for.
At Jim Gray's tribute on the 31st, Bruce Lindsay gave a talk about Jim's
formalization of transaction processing enabled online transactions ... i.e.
needed trust in the integrity of
Excerpt:
Jennifer Caukin, Skype's director of corporate communications
replied to us: We have not received any subpoenas or court
orders asking us to perform a live interception or wiretap of
Skype-to-Skype communications. In any event, because of Skype's
peer-to-peer
Also from Declan McCullagh today, a full survey of instant message
service security:
http://news.cnet.com/8301-13578_3-9962106-38.html?part=rsstag=feedsubj=TheIconoclast
--
Perry E. Metzger[EMAIL PROTECTED]
-
Perry E. Metzger wrote:
Also from Declan McCullagh today, a full survey of instant message
service security:
http://news.cnet.com/8301-13578_3-9962106-38.html?part=rsstag=feedsubj=TheIconoclast
Interesting. Of course, with the possible exception of Skype, only the
over-the-network part of
11 matches
Mail list logo