12-04-202014-04-2020

Security daily (13-04-2020)

Round 2 Hybrid Post-Quantum TLS Benchmarks

AWS Cryptography has completed benchmarks of Round 2 Versions of the Bit Flipping Key Encapsulation (BIKE) and Supersingular Isogeny Key Encapsulation (SIKE) hybrid post-quantum Transport Layer Security (TLS) Algorithms. Both of these algorithms have been submitted to the National Institute of Standards and Technology (NIST) as part of NIST’s Post-Quantum Cryptography standardization process. In the […] (AWS Security Blog)

How to Map Wardriving Data with Jupyter Notebook

With the Wigle WiFi app running on an Android phone, a hacker can discover and map any nearby network, including those created by printers and other insecure devices. The default tools to analyze the resulting data can fall short of what a hacker needs, but by importing wardriving data into Jupyter Notebook, we can map all Wi-Fi devices we encounter and slice through the data with ease.

Thanks to low-cost Android smartphones equipped with GPS and Wi-Fi sensors, wardriving has gotten easier than ever. With a $60 Android smartphone and Wigle WiFi, it's possible to map the time and location that... more (Null Byte « WonderHowTo)

What is online gambling spam and what can I do about it?

When it comes to online gambling spam, first think about fantasies of fame and fortune. Who hasn’t imagined defying the odds at an exotic casino? Splitting a pair of sevens. Going all in on the flop. Your baccarat dealer declaring, La grande! For most of us, though, a ticket to Monte Carlo and an Aston Martin are outside the price range. So we turn to online gambling. And bad actors harness that allure to create their scams. Continue reading What is online gambling spam and what can I do about it? at Sucuri Blog. (Sucuri Blog)

12-04-202014-04-2020

/security-daily/