All posts by Olga Koksharova

It seems like monarchy is to reign in the cyber world. During the last weeks mass media heavily speak about the need of finding a proper authority who will be responsible for electronic information security issues: Obama seeks one for the White House, whereas EU commissioner for information society and media (Viviane Reding) announces that "Europe needs a ‘Mister Cyber Security’ as we have a ‘Mister Foreign Affairs’, a security tsar with authority to act immediately if a cyber attack is underway.

All modern AMD and Intel processors are 64-bit and corresponding Windows versions are also on the market. It is highly recommended to use 64-bit systems (though 32-bit systems perfectly work on 64-bit processors) because in this case more than 3 Gb RAM can be employed, and today we have lots and lots of 64-bit systems, so it’s getting more and more critical. (more…)

Time is money, difficult to contradict this fact. And another proven fact is that you lose something exactly when something turns out to be absolutely necessary. Once you lost a password to your Word document or presentation that you were going to give in an hour, or Excel report which was supposed to be sent to your manager yesterday… you will count seconds before you get back your files. (more…)

A number of D-link routers are now equipped with captcha feature. Sounds interesting. 

Today’s businesses are very mobile. Sometimes you don’t even need to have a conventional office, it becomes virtual, it is always with you in your mobile phones, netbooks and laptops. Such mobile mini-offices stuffed with corporate documents and reports, partners’ data, confidencial correspondence, access passwords are in danger of being stolen, both virtually and physically. You can try to protect your laptop using laptop security cable locks but what if it was stolen? Let all your information go into adversary’s hands? Do you _really_ think that your Windows logon password is an impenetrable barrier for the adversary? Have you heard of Elcomsoft System Recovery? You still think your laptop is secure because you have BIOS password and/or partial drive encryption? Read an article by Kevin Beaver ‘Securing corporate data on your laptops’ , take off rose-colored glasses and revise your laptop security as suggested in Kevin’s step-by-step outline. 

Probably you’ve already heard about this vicious circle thousand times:

Do you still reuse passwords? The recent study from University of California shows again that such a bad habit continues to exist. The worst thing about reusing passwords is that it doesn’t require being a technically skilled hacker to guess your password for this or that document.  

There is only one way to break through PGP® encryption – GPU accelerated brute force – and that one is too many. New Elcomsoft Distributed Password Recovery v. 2.80.206 crunches PGP® passwords 200 times faster using graphic chips.

If you added this blog to your news feeder, then you prefer getting skilled rather than getting owned – as in Troopers’ motto.

As posted by Rosalie Marshall in her today’s article, secret F-35 military plane design materials have been stolen presumably by Chinese hackers (?):