Posts Tagged encryption

Smartphones Leak Encryption

Technology Review reports that an attacker my be able to pick up encryption keys from cellphones with a TV antenna:

The antenna was detecting radio signals “leaking” from the transistors on the chip inside the phone performing the encryption calculations. Transistors leak those signals when they are active, so the pattern of signals from a chip provides an eavesdropper a representation of the work the chip is doing. When Kenworthy tuned his equipment to look in the right place, a clear, regular pattern of peaks and troughs appeared on his computer screen. They could be seen to come in two varieties, large and small, directly corresponding to the string of digital 1s and 0s that make up the encryption key.

, , , , ,

No Comments

Prosecutors Demand Laptop Password in Violation of Fifth Amendment

From: EFF

Prosecutors Demand Laptop Password in Violation of Fifth Amendment

EFF has urged a federal court to block the government’s attempt to force a woman to enter a password into an encrypted laptop. During the investigation, the government seized the device from the home she shares with her family, and then asked the court to compel the woman to type the password into the computer or turn over a decrypted version of her data. But EFF told the court that the demand is unconstitutional, violating her Fifth Amendment privilege against self-incrimination.

, , , , ,

No Comments

USB Drives left at Dry Cleaners on the Rise

Encrypt your USB Drives

From: SC Magazine UK

A survey of dry cleaners in the UK has found that more than 17,000 USB sticks were left behind in 2010.

More than 500 dry cleaners and launderettes in the UK were asked during December 2010 and January 2011 about removable media that was left behind. Estimated figures suggested that there was an increase on the number of USB sticks left in dry cleaners of more than 400 per cent when compared with figures from 2009, and almost double from what was found in 2008.

…With the best intentions in the world, the reality is devices are often left behind and the information they contain could be devastating if disclosed. Organizations need to plan for this when developing their security strategies.”

more

, , , , ,

No Comments

Cyber-Threat Whitepapers

From: SC Magazine

, , , ,

No Comments