Infosecurity Europe, BSides London and the Security Bloggers Meetup.
June is the new April, at least for the security industry, as its traditional get-together in London (Infosecurity Europe) has been moved from the last week of April to the first week of June.
Infosecurity Europe is primarily a trade show, so it is pretty heavy on sales and marketing (you'll have your buzzword bingo scorecard completed within half an hour), but if you are more interested in the technical side of things, you'll still find plenty of things to enjoy, if only because of the many experts who will be walking around the show floor.
Kevin Williams looks back at UK law enforcement successes at combating cybercrime.
In a recent Throwback Thursday article, we looked back at the sentencing of self-confessed virus writer Christopher Pile almost 20 years ago. Pile was the first person in the UK to be given a custodial sentence for writing and distributing computer viruses.
He was, of course, not the last. Today, we publish an article by Kevin Williams of TC-UK, who looks back at a number of successes of the UK's Police Central eCrime Unit (PCeU), which he helped set up in 2008. The PCeU's investigations led to the arrest of several individuals involved in computer crime and, as part of international operations involving security firms and foreign law enforcement agencies, the takedown of a number of botnets.
This Throwback Thursday we reflect on the life of one of industry's greats, who sadly passed away this week: Prof. Klaus Brunnstein.
Professor Klaus Brunnstein was one of the biggest names in anti-virus resarch, a pioneer in the field, and a man whose career was never short of either controversy or success. We were greatly saddened to learn of his death yesterday, and in honour of a man who contributed so much to the industry, we decided to take another look at an interview with Prof. Brunnstein — in April 1996, VB spoke to him about his background, his career, his views and his home life.
'Logjam' attack possibly used by the NSA to decrypt VPN traffic.
A group of researchers have discovered a number of vulnerabilities in the way the Diffie-Hellman key exchange protocol is deployed and have demonstrated an attack (dubbed 'Logjam') that exploits these vulnerabilities.
Diffie-Hellman is used by two entities (typically referred to as Alice and Bob) to agree on a secret key over a public channel. This key can then be used to encrypt and decrypt data using a much faster symmetric key algorithm, such as AES, 3DES or the now obsolete RC4. The protocol is widely used, for instance in SSL/TLS.