Java Crypto Bug Allows Forging of Signatures, Certificates
A critical bug in Java's implementation of ECDSA (CVE-2022-21449) can allow an attacker to forge a signature or certificate to...
He is one of the co-founders of Threatpost and previously wrote for TechTarget and eWeek, when magazines were still a thing that existed. Dennis enjoys finding the stories behind the headlines and digging into the motivations and thinking of both defenders and attackers. His work has appeared in The Boston Globe, The Improper Bostonian, Harvard Business School’s Working Knowledge, and most of his kids’ English papers.
A critical bug in Java's implementation of ECDSA (CVE-2022-21449) can allow an attacker to forge a signature or certificate to...
The U.S. government and military is looking to attract and retain more talented cyber operators to keep pace with the evolving...
The U.S. has indicted four Russians it alleges are affiliated with the FSB and GRU units responsible for the Triton and...
Ray Ozzie's Clear key escrow proposal for decrypting devices relies on a secure processor that doesn't yet exist.
Uber has updated its bounty program to provide security researchers with clarity on what good faith research looks like.
We forget that the Internet is pretty fragile and when something breaks, there is collateral damage. DNS hijacking and BGP leaks are two of the problems we haven't fixed yet, and there aren't any easy solutions.
Cryptocurrencies such as Bitcoin and Monero have become favorites of cyberminals associated with ransomware and malicious coinmining, but there's much more going on beneath the surface.
In the face of increased threats to user privacy, companies such as Apple, Google, and others have moved to encrypt more and more channels.