4
votes
0answers
8 views

Why don't PGP and SSH keys see more widespread use as a second factor when authenticating?

One of the major up-and-coming MFA methods is U2F, which relies on an initial key exchange and challenge-response mechanism. It's a relatively new protocol, and is only starting to see more ...
-1
votes
0answers
6 views

How to choose ECDH and ECDHE with curve more than 192 in Tomcat

I am using tomcat server, where I came across a situation where the TestSSLServer tool reports the below. Highly appreciate your expertise in recommending a solution to the finding where I can choose ...
0
votes
0answers
11 views

Is SS7 a threat any more?

I'm reading SS7 issue on this: http://www.cyberdefensemagazine.com/ss7-flaw-allows-hackers-to-spy-on-every-conversation/ It seems to me that any phone on the world can be intercepted so the hacker ...
0
votes
0answers
7 views

Weird connection error prompts, Rootkits & MitM?

Can someone give me insight on these connection error prompts? https://imgur.com/a/FEHJj My internet kept reconnecting two weeks ago and I couldn't access the internet until I performed a hard reset ...
0
votes
0answers
24 views

Bizarre php file appeared in the image gallery folder of my website [duplicate]

Can anyone tell what this is or how it could possibly have made it to the image gallery folder of my website? It appears to be a bunch of variable definitions. Mind you that a period "." is the concat ...
0
votes
1answer
25 views

Vicious circle with certificates - how to trust the server cert?

I have a java app that needs to be able to communicate with a web server over ssl using an client x509 certificate (for encryption negotiation) - the private key is in the java keystore to which ...
-1
votes
0answers
10 views

Securing data passed between two sites via a browser

I need to pass some data securely from one web site to another via a browser. A user visits site A and clicks a link there which takes him to site B; this could be just a link which would produce GET ...
0
votes
1answer
25 views

VNC via VPN in a VM

Yea you read that correctly... What I want to achieve is the following: Have a lightweight VM running which VPNs into my work network... And then run a VNC session on my local machine that tunnels ...
-3
votes
0answers
21 views

Can somone proivde me with armv7-based or armv8-based implemented cryptography algorithms

Recently,My professor ask me to implement some cryptography algorithms(RSA,DES,AES,RC4,Rc5,etc).Although I have some knowledge about assembly language, I have no idea for these cryptography ...
4
votes
4answers
179 views

Is there any alternative beside sending One-Time-Password via SMS?

I'm working on one smaller system where it will be required to enter One-Time-Password (OTP, not to be confused with a One-Time-Pad) to download sensitive files which will be delivered to the user. ...
3
votes
1answer
35 views

Passive fingerprinting of HTTPS client

Is it possible to passively fingerprint a HTTPS client, based solely on data visible to a network eavesdropper? In other words, consider a network monitoring box that can see all the packets (but ...
1
vote
1answer
44 views

Can Email Services download files on your computer without your permission/knowledge?

The company I work for is involved in security clearance work, and thus all company computers are monitored (files, screenshots, etc). I am routinely logged onto my company email service with my ...
-4
votes
0answers
37 views

How to create pdf that automatically opens up a url [on hold]

I need to be able to create a pdf and send it so that when someone opens it, a website like google.com comes up. However, I need the person receiving the email to not have a choice for the url to pop ...
0
votes
1answer
26 views

What more can I do to secure my service?

I run a multiplayer gaming service that provides a server list for clients and servers. At the moment it uses an SQLite database stored locally (which is insecure in itself). I am drawing up plans to ...
0
votes
0answers
17 views

Grabbing ChaCha20 key from ram

There are various other posts which talk about grabbing a key from ram such as http://electronics.stackexchange.com/questions/198274/storing-a-secure-key-in-an-embedded-devices-memory How would you ...

15 30 50 per page