private key

private key

Adobe to revoke crypto key abused to sign 5,000 malware apps

arstechnica.com
Adobe is revoking a cryptographic key used to confirm the authenticity of its applications after discovering it was compromised by attackers who abused it to validate malicious software. The "inappropriate use" of the Adobe code signing certificate was pulled off by attackers who compromised a build server used to compile...
Adobe to revoke crypto key abused to sign 5,000 malware apps

BitTorrent's Secure Dropbox Alternative Goes Public

torrentfreak.com
Dropbox, Google Drive, Microsoft Skydrive and Mega are just a few examples of the many file-storage and backup services that are available today. All these services rely on external cloud based hosting to back up and store files. This means that you have to trust these companies with your personal...
BitTorrent's Secure Dropbox Alternative Goes Public
Royal Canadian Mint offers $50,000 in gold to developer who creates digital currency of the future

BitTorrent Launches Private and Secure Dropbox Alternative

torrentfreak.com
BitTorrent is a very powerful distribution tool. There is simply no faster way than BitTorrent for those who share files with several devices at once. Just ask Twitter and Facebook, two major technology companies that rely on BitTorrent technology to distribute files across their networks. For the public, however, there’s...
BitTorrent Launches Private and Secure Dropbox Alternative

Why VCs Love The Bitcoin Market

techcrunch.com
Editor’s note: Jeremy Liew is a managing director at Lightspeed Venture Partners. Follow him on Twitter @jeremysliew. As a VC, my interest in the Bitcoin ecosystem is not ideological but mercenary. I see the opportunity for Bitcoin to disrupt multi-billion-dollar markets, but in doing so also create new big markets. There are three key...
Why VCs Love The Bitcoin Market

Yahoo Leaks Private Key, Allows Anyone to Build Yahoo-signed Chrome Extensions

www.pcworld.com
Yahoo was forced to release a new version of its Axis extension for Google Chrome after the original one contained a private key that allowed anyone to digitally......
Yahoo Leaks Private Key, Allows Anyone to Build Yahoo-signed Chrome Extensions

Critics slam SSL authority for minting certificate for impersonating sites

arstechnica.com
Critics are calling for the ouster of Trustwave as a trusted issuer of secure sockets layer certificates after it admitted minting a credential it knew would be used by a customer to impersonate websites it didn't own. The so-called subordinate root certificate allowed the customer to issue SSL credentials...
Critics slam SSL authority for minting certificate for impersonating sites

Mega Launches: Brilliantly Secure, But Not Anonymous

torrentfreak.com
Mortal souls have to wait another day, but today members of the “press” were given an early look Megaupload’s successor, Mega. TorrentFreak was lucky enough to be one of the early-birds and here we report our findings. Before going over to the obligatory screenshot tour we’ll take a look at...
Mega Launches: Brilliantly Secure, But Not Anonymous

Yahoo leaks private key, allows anyone to build Yahoo-signed Chrome extensions

www.computerworld.com
Yahoo was forced to release a new version of its Axis extension for Google Chrome after the original one contained a private key that allowed anyone to digitally sign extensions in Yahoo's name....
Yahoo leaks private key, allows anyone to build Yahoo-signed Chrome extensions
AT&T's 3G MicroCell 'full of fail' thanks to wide open root access, claims fail0verflow
SSL fix aims to mend huge cracks in 'Net's foundation of trust

Braintree Extends Merchant Payments To Mobile Apps

techcrunch.com
Braintree, an online payments provider, is debuting a set of new tools for mobile app developers that allow merchants to accept payments within a mobile app, rather than through a web browser. For background, Braintree powers and automates online payments for merchants and companies online. The company provides a merchant...
Braintree Extends Merchant Payments To Mobile Apps
Virtual machine used to steal crypto keys from other VM on same server

1024-bit RSA encryption cracked by carefully starving CPU of electricity

www.engadget.com
Since 1977, RSA public-key encryption has protected privacy and verified authenticity when using computers, gadgets and web browsers around the globe, with only the most brutish of brute force efforts (and 1,500 years of processing time) felling its 768-bit variety earlier this year. Now, three eggheads (or Wolverines, as...
1024-bit RSA encryption cracked by carefully starving CPU of electricity
× Just a test of the new info bar. What do you think?