Justin Schuh, lead engineer of Chrome Security, said ensuring browser security for Chrome users is a balancing act juggling OEM pressures, questionable certificate authorities and quashing third-party software incompatibility issues.
Tag Archives: Cryptography
Tim Berners-Lee, Inventor of the Web, Wins $1 Million Turing Award 2016
Sir Tim Berners-Lee — the inventor of the World Wide Web — has won this year’s A.M. Turing Award, which is frequently described as the “Nobel Prize of Computing,” by the Association for Computing Machinery (ACM).
Turing Award is named after Alan Mathison Turing, the British mathematician and computer scientist who was a key contributor to the Allied cryptanalysis of German Enigma cipher and
Threatpost News Wrap, March 27, 2017
The latest Wikileaks dump of Apple hacking tools, the LastPass vulnerabilities, and a new Android security report are discussed.
Google Chrome 57 Browser Update Patches ‘High’ Severity Flaws
Google paid out $38,000 in bounty rewards tied to flaws it fixed with a Chrome 57 browser update.
Google reCaptcha Bypass Technique Uses Google’s Own Tools
A proof of concept bypass of Google’s CAPTCHA verification system uses Google’s own web-based tools to pull off the skirting of the system.
Torvalds Downplays SHA-1 Threat to Git
The ramifications of the recent SHA-1 collision attack have extended to Git and the Apache Subversion repository, both of which rely on the outdated and vulnerable hashing algorithm.
Google Upspin Secure File-Sharing Released to Open Source
New file-sharing protocols and interfaces called Upspin have been released to open source. Built by Google, Upspin returns access control and data security to the user.
DHS Chairman Paints Bleak US Cybersecurity Picture
The United States is losing on the cyber-battlefield and face a bleak threat landscape, according to DHS chairman Michael McCaul. But, he says, there is still hope to turn things around.
Open Databases a Juicy Extortion Target
A sudden wave of attacks against insecure databases resulting in ransom demands points to wave of data hijacking attacks.