Was YOUR iPhone at risk of being hacked? Bug in Apple update left mobiles open to identity theft for up to 18 months …

Experts have advised iPhone users to download iOS 7.0.6 as quickly as possible, which was rolled out by Apple on Friday Is thought users of iOS devices could have been at risk to the vulnerability for up to a year-and-a-half but there have been no reports of hacks Johns Hopkins cryptography professor in Baltimore, Maryland said that the bug was 'as bad as you can imagine'

By Sarah Griffiths

PUBLISHED: 09:48 EST, 24 February 2014 | UPDATED: 09:48 EST, 24 February 2014

557 shares

53

View comments

iPhone users have been blissfully unaware that for the past year-and-a half they could have been the victim of 'hi-tech eavesdropping'

iPhone users have been blissfully unaware that for approximately a year-and-a half a software bug could have made them the victims of hi-tech eavesdropping.

Security experts have warned that past iterations of iOS software - dating from as long ago as September 2012 - had a vulnerability that hackers could have exploited to see financial transactions, emails and Facebook activity.

They have advised iPhone users to download iOS 7.0.6 as quickly as possible, which was rolled out by Apple on Friday with a note about the patch.

Continued here:
Was YOUR iPhone at risk of being hacked? Bug in Apple update left mobiles open to identity theft for up to 18 months ...

DEF CON 8 – Jon Erickson – Number Theory Complexity, Theory, Cryptography, and Quantum Computing. – Video


DEF CON 8 - Jon Erickson - Number Theory Complexity, Theory, Cryptography, and Quantum Computing.
Jon Erickson - Number Theory Complexity, Theory, Cryptography, and Quantum Computing. DEF CON 8.0 was held July 28th - 30th, 2000, in Las Vegas, Nevada US.

By: DEFCONConference

Read more:
DEF CON 8 - Jon Erickson - Number Theory Complexity, Theory, Cryptography, and Quantum Computing. - Video

A Brief Rundown Of The Spying Questions Intel’s CEO Won’t Answer

In a Reddit Ask Me Anything last Wednesday, Intel CEO Brian Krzanich opened the floor for questions, but notably ignored the most popular one in the thread: in light of recent NSA revelations, what will the company do to assure that its chips don't contain a backdoor for the NSA?

While Kzarnich never answered any of the security-related questions--Intel PR says this is because the questions came late and Kzarnich either missed them entirely or couldnt reply in time--one Redditor, Bardfinn, responded at length on the issue of encryption and security.

Bardfinns real name is Steve Akins, and in an email correspondence he describes his interest in cryptography and Internet security as personal and societal/political. But hes quite literate on the subject.

Its an immense problem for the layman, Akins says. Cryptography is difficult to use, touches many parts of our lives, and has not become significantly less difficult in the past 30 years In our tablets and smartphones, and the networks they connect to, cryptography is handled for us by the manufacturers. We never see it, never interact with it, and in many cases *cannot* interact with it. Were placing an immense amount of trust in the cryptography of manufacturers, Akins argues, and therefore were effectively trusting them not to peek.

Of course, everyone cant be a skilled cryptographer, and since absolute security isnt really possible, there will always have to be some element of trust involved between manufacturers and everyday people--but Akins believes that trust needs to be verifiable, mitigated, and distributed:

The problem isn't that we have to trust a black box in our personal devices. The problem is that we have to trust that one black box, and many black boxes on the Internet (or cellular network) which may or may not be as secure as the black box in our devices, and the ones in our computers and the ones in the networks interoperate at the lowest common denominator, and they all probably have back doors (which makes it really hard to actually trust them), and the ones on the Internet are highly targetable by the bored kids, criminals, etc: Bad Actors.

To understand the root cause of this concern, and what can be done about it, it helps to have some understanding of how your computer goes about encrypting things to ensure that prying eyes dont see what you dont want them to see. For your computer to lock your data up tight and send it on its way, it relies on something that computers are in reality quite bad at: randomness.

Random numbers are a necessity for building secure systems, as theyre the only way to make sure your encryption key stays secure. However, generating random numbers can be extraordinarily difficult, especially with software. Programs and computers are run by logic and if-then conditionals--asking them to pull numbers out of thin air without a prescribed formula is the sort of simple thing human minds can do that trip up computers. We call that predictability entropy. The higher your entropy, the harder it is to crack your encryption.

Since its so hard to come up with a software solution that adequately generates random numbers with high entropy for encryption, its become possible to mitigate that by turning to your computers processor. Which is where Intel comes in.

Ever since the company launched its Ivy Bridge line of processors in May of 2012, its included what it calls Secure Key technology for the purpose of random number generation. It is, essentially, a black box--an opaque system built for a specific purpose (random number generation) but with little to no insight as to how it actually accomplishes it.

More here:
A Brief Rundown Of The Spying Questions Intel's CEO Won't Answer

[FOSDEM 2014] USE OTR or how we learned to start worrying and love cryptography – Video


[FOSDEM 2014] USE OTR or how we learned to start worrying and love cryptography
USE OTR or how we learned to start worrying and love cryptography Speaker: David Goulet USE OTR (USable Encryption with OTR) is an organisation with a simple...

By: TalksDump

See the article here:
[FOSDEM 2014] USE OTR or how we learned to start worrying and love cryptography - Video

How Quantum Computing Will Change Cryptography

The massive release of the US National Security Agency (NSA)s classified documents by Edward Snowden continues to raise questions about security. One of these documents deals with the NSAs classified research program in the exotic field of quantum computing.

Encryption picture from Shutterstock

This research investigates ways to process information using the laws of quantum mechanics, rather than the familiar physics underlying present-day computer processors.

Why should the NSA care? Because the single most famous application of quantum computing is in code-breaking.

During World War II, a team led by Alan Turing used a primitive computer to break the Nazis Enigma code

The NSA document, which can be found online, deals with the excitingly named project Penetrating Hard Targets.

An unknown portion of the $US80-million budget is devoted to building a small quantum processor, capable of counting up to four. (No, not four-million. Just four!) This doesnt sound like much, but one has to start somewhere.

Another portion supports research into quantum cryptography, which offers new, higher-security secret codes based on quantum mechanics.

The news here is that the NSA had its own secret experimental program. It was already public knowledge that the NSA is interested in quantum computing.

The NSA has been financially supporting non-classified quantum computing research at universities since the 1990s, and many academic journal articles acknowledge NSA support.

See more here:
How Quantum Computing Will Change Cryptography