Go to Top

July 2015

Hackers Remotely Kill a Jeep on the Highway—With Me in It

I was driving 70 mph on the edge of downtown St. Louis when the exploit began to take hold. Though I hadn’t touched the dashboard, the vents in the Jeep Cherokee started blasting cold air at the maximum setting, chilling the sweat on my back through the in-seat climate control system. Next the radio switched to the local hip hop station and began blaring Skee-lo at full volume. I spun …Read More

National Identity Management System Now Functional

Mr Chris Onyenemenam, the Director-General, National Identity Management Commission (NIMC) on Thursday said that the National Identity Management System (NIMS) “is now functional’’. Oneymeme, who made this known in an interview in Abuja, said that the task of verifying and authenticating identity cards had become more effective. “After decades of trying the system, it is finally a reality for NIMS to ensure safety of Nigerian identities. “Commission is also working …Read More

NSA tapped German Chancellery for decades, WikiLeaks claims

The US National Security Agency tapped phone calls involving German chancellor Angela Merkel and her closest advisers for years and spied on the staff of her predecessors, according to WikiLeaks. A report released by the group on Wednesday suggested NSA spying on Merkel and her staff had gone on far longer and more widely than previously realised. WikiLeaks said the NSA targeted 125 phone numbers of top German officials for …Read More

Review: Email encryption has gotten so much better, so you’d be crazy not to use it

I once co-wrote a book on enterprise email where I likened email encryption to a “sucking chest wound.” That was in 1997, when you had to do all the encryption key management on your own, a daunting task to say the least. While things have improved considerably since then, encrypting messages is not as simple as it could be, and requires careful study if you want to have truly private …Read More

Germany passes strict cyber-security law to protect ‘critical infrastructure’

In the wake of ever-increasing cyber-security threats, Germany has passed legislation ordering that over 2,000 essential service providers implement new minimum information security standards or face penalties if they fail to do so within two years. The law passed its final hurdle in the upper house of the German parliament, the Bundesrat, on Friday after having passed the lower house in June. The law will affect institutions listed as “critical …Read More

Software developers aren’t implementing encryption correctly

Despite a big push over the past few years to use encryption to combat security breaches, lack of expertise among developers and overly complex libraries have led to widespread implementation failures in business applications. The scale of the problem is significant. Cryptographic issues are the second most common type of flaws affecting applications across all industries, according to a report this week by application security firm Veracode. Read article: http://www.computerworld.com/article/2941412/encryption/software-developers-arent-implementing-encryption-correctly.html

HJP Consulting wins European eID simulation project

German eID consultancy HJP Consulting has revealed that it will provide the simulation environment for smart card functions being developed for the European Union’s Regulation on electronic identities and trust services (eIDAS). HJP, together with cv cryptovision will also provide selected eIDAS functions on a smart card, with the open-source-based smart card simulator PersoSim, developed by HJP, to be used for the simulation. Read article: http://www.securitydocumentworld.com/article-details/i/12194/ Related product: ePassletSuite