Pages: 1 2 ...3 ... 5 ...7 ...8 9 10 11 12 ... 14

  2014-07-24

TrueCrypt alternatives?

  22:23, by Hagai Bar-El   , 660 words
Categories: IT Security, Products
It has been a while since the announcement on the demise of TrueCrypt, and a solution for all those people that grew used to relying on it, in the shape of a complete replacement is not yet evident. more »

  2014-05-30

The status of TrueCrypt

  07:40, by Hagai Bar-El   , 564 words
Categories: IT Security, Products
I wish I had known where TrueCrypt stands now, but I don't. I follow TrueCrypt and regularly endorse it  ever since I discovered it and wrote this post nine years ago. TrueCrypt was, and may still be, the most sensible and presumably-secure volume and… more »

  2014-04-09

OpenSSL "Heartbleed" bug: what's at risk on the server and what is not

  22:56, by Hagai Bar-El   , 1223 words
Categories: IT Security, Cyber Security, Counter-media
A few days ago, a critical bug was found in the common OpenSSL library. OpenSSL is the library that implements the common SSL and TLS security protocols. These two (similar) protocols facilitate the encrypted tunnel feature that secure services -- over… more »

  2014-04-03

Bitcoin does not provide anonymity

  22:22, by Hagai Bar-El   , 762 words
Categories: Security Engineering, Security Policies, Security, Counter-media
When people discuss Bitcoin, one of its properties that is often considered is its presumable anonymity. In this respect, it is often compared to cash. However, it shall be recognized and understood that Bitcoin is not as anonymous as cash; far from it,… more »

My new patent on secure key provisioning

  12:02, by Hagai Bar-El   , 151 words
Categories: Personal News, Security Engineering
I recently got a US patent application granted by the Patent and Trademark Office. The patent bears the title "Methods Circuits Devices and Systems for Provisioning of Cryptographic Data to One or More Electronic Devices". more »

  2014-02-01

CyberTech 2014

  21:10, by Hagai Bar-El   , 438 words
Categories: IT Security, Cyber Security, Events, Counter-media
I attended CyberTech 2014 on January 27th-28th. CyberTech is a meaningful conference for technologies related to cyber security. There were both lectures and an exhibition. more »

  2014-01-29

SnapChat and client authentication

  21:37, by Hagai Bar-El   , 25 words
Categories: Security Engineering
I have written a post about the SnapChat hack, and what it can teach us on the need for secure execution and secure client authentication. more »

1 2 ...3 ... 5 ...7 ...8 9 10 11 12 ... 14