2017 Security Recap
Cryptographers and Security Researchers have a penchant for coming up with colorful acronyms and names which describe, in brief, the vulnerability or exposure. Some are them are BEAST, CRIME, ShellShock,… Read more »
Cryptographers and Security Researchers have a penchant for coming up with colorful acronyms and names which describe, in brief, the vulnerability or exposure. Some are them are BEAST, CRIME, ShellShock,… Read more »
One of the most important properties of a cryptographic hash function is that of “Strong collision-resistance”, that is, it should be "computationally infeasible" to find distinct inputs x1, x2 such… Read more »
I am a happy customer of Ola. I decided to try Uber. I installed the Uber app on my wife’s Android mobile and tried to register with her email address… Read more »
I read an article titled Frequent password changes are the enemy of security which I find misleading and missing the point. In this article, Carnegie Mellon University professor Lorrie Cranor,… Read more »