Monthly Archives: June 2012

Fujitsu Labs And NICT Break 278-Digit Pairing-based Cryptography


June 20, 2012 By
The Vigilant Application Owner

SecurityWeek – (International) Fujitsu Labs and NICT break 278-digit pairing-based cryptography. June 18, Fujitsu Laboratories, the National Institute of Information and Communications Technology (NICT), and Kyushu University announced they successfully performed a full cryptanalysis of a 278-digit (923-bit)-long pairing-based cryptography. Up to this point, cryptanalysis of pairing-based cryptography of such a length was thought to […]

Continue reading...

Categories: Uncategorized

Does Nexus Pro Support Ant + Ivy Builds? Yes it does.


By
Tim O'Brien

Java developers adapting an existing Ant build to dependency management often turn to Ivy. Here’s an evaluation guide for Nexus Professional using two, very simple Ant+Ivy projects. If you are evaluating Nexus Professional, or if you are just looking for some sample projects that configure an Ant + Ivy build to use a repository take […]

Continue reading...

Categories: Uncategorized

Advanced JavaScript Attack Tthreatens SOHO Routers


June 19, 2012 By
The Vigilant Application Owner

Dark Reading – (International) Advanced JavaScript attack threatens SOHO routers. A technique for sending requests to devices on an internal network could be used by online attackers to compromise home and small-business routers, according to two AppSec Consulting researchers who plan to demonstrate the attack at the Black Hat security conference in July. The two […]

Continue reading...

Categories: Uncategorized

Automatic Transfer System Evades Security Measures, Automates Bank Fraud


By
The Vigilant Application Owner

SecurityWeek – (International) Automatic transfer system evades security measures, automates bank fraud. Trend Micro June 18 released a new report that identifies an Automatic Transfer System (ATS) that enables cybercriminals to circumvent many bank security measures and drain victims’ bank accounts without leaving visible signs of malicious activity. In the new whitepaper, “Automatic Transfer System, […]

Continue reading...

Categories: Uncategorized

What’s The Price For Secret Access To U.S. Gov’t Supercomputers?


June 15, 2012 By
The Vigilant Application Owner

IDG News Service – (National) What’s the price for secret access to U.S. Gov’t supercomputers? $50,000. Authorities arrested a man, of Devon, Pennsylvania, June 14 on charges he tried to sell secret access to two U.S. government supercomputers for $50,000 to an undercover FBI agent. The supercomputers belong to the National Energy Research Scientific Computing […]

Continue reading...

Categories: Uncategorized