PODCAST: Chuck White Visits 'New Cyber Frontier' to Discuss Encryption and Cyber Defense

November 01, 2018 / by Fornetix

Our Chief Technology Officer at Fornetix, Chuck White, sat down with Professor Andre Hinton from the New Cyber Frontier podcast to explore the ways powerful encryption can solve the big problems of cybersecurity. Take a listen using the audio player below!

Read more

The Importance of Strong Encryption in Free Societies

September 18, 2018 / by Jon Mentzell

There is growing concern regarding the role that encryption on personal devices might play in the future of law enforcement activities. Strong encryption, which uses large keys that are controversially hard to crack, has caused complaints in recent years as manufacturers such as Apple and Google increasingly add these features to their devices. What these companies have done is not new technology, but the broader application of existing public-private key encryption in a way that’s easy to use for the average consumer.

Read more

Your Data Is in the Cloud and It's at Risk

June 26, 2018 / by Kevin Mooney

Companies and individuals are using cloud services more and more. Putting so much of our data into the cloud introduces a growing problem. The lines between public cloud, private cloud, and software-as-a-service (Saas) have rapidly blurred as new technology develops, redefining what “cloud” actually means. Some businesses put significant portions of their infrastructure into the cloud and choose to keep only a very small footprint in a traditional data center or office. More commonly, businesses will leverage SaaS to handle common IT requirements such as email, storage, CRM, and backups.

Read more

What Is the 'EFAIL' Vulnerability and What Can I Do About It?

May 18, 2018 / by Jon Mentzell

What is efail? 

Efail is the name given by German Researchers to a potential attack against PGP or S/MIME encoded emails to take the encrypted contents and send them to a third-party actor.

How does efail work?

Efail requires an HTML encoded email to be manipulated by prepending an html image tag to the beginning of the email. This in turn forces the email client to send a request to a malicious domain looking for an image file that is the body of the encrypted email.

Read more

Fornetix Developer Takes Top Prize at Cybersecurity Conference

February 26, 2018 / by Fornetix

The Fornetix team wants to congratulate Kian Bradley, client developer, after he earned first place in the cryptocurrency capture the flag (C3TF) at this year’s BSidesNoVA hacking conference. The competition focused on real world challenges related to crypto currencies such as smart contract exploits, forensics, wallet exploits, and more issues unique to this growing industry.

Read more

Why Integrity Matters in Automotive Supply Chains (& What Cryptography Can Do About It)

January 27, 2018 / by Chuck White

When considering automotive IoT, it’s logical to focus on the supply chain that makes the car possible. In reviewing the application of key management to the automotive IoT landscape, it becomes apparent that the provenance of car components, from tires to telematics, is absolutely critical. Any poorly-built component can cause a systemic failure of the vehicle delivered to the consumer. When one typically thinks of applying encryption, it is focused on protecting the confidentiality of data at rest, in motion, or even while being processed. However, what about measuring whether the data should be trusted instead how whether it needs to be protected?

Read more

Spectre & Meltdown: Processor Design Flaw Leads to Executable Side-Channel Attack

January 17, 2018 / by Jon Mentzell

Starting in late December, the Linux kernel development lists started buzzing about some commits going into the kernel without the usual documentation that adjoins such code changes. When an AMD developer added some code on December 26th with the following comment, security researchers started zeroing in on the problem:

Read more
1
Page 1 of 1

Subscribe to Email Updates

Recent Posts