Hardware acceleration of password recovery has been a hot topic for quite some time already. We were the first to adopt widely available graphic cards for this purpose and we’re proud of this. Today I’d like to share some thoughts on hardware acceleration for password recovery, its past, present, and future. I will also cover the most frequently asked questions regarding GPUs.
It seems like monarchy is to reign in the cyber world. During the last weeks mass media heavily speak about the need of finding a proper authority who will be responsible for electronic information security issues: Obama seeks one for the White House, whereas EU commissioner for information society and media (Viviane Reding) announces that "Europe needs a ‘Mister Cyber Security’ as we have a ‘Mister Foreign Affairs’, a security tsar with authority to act immediately if a cyber attack is underway.”
Wow, Adobe rethinks PDF security. Curious why? Because of vulnerabilities in Abobe Reader (and so zero-day exploits), of course. From the article:
From time to time we’re receiving questions regarding various technologies used in our products, especially Thunder Tables™ and GPU acceleration. Today I’d like to explain what exactly Thunder Tables™ is (and what it’s not).
A number of D-link routers are now equipped with captcha feature. Sounds interesting.
Today’s businesses are very mobile. Sometimes you don’t even need to have a conventional office, it becomes virtual, it is always with you in your mobile phones, netbooks and laptops. Such mobile mini-offices stuffed with corporate documents and reports, partners’ data, confidencial correspondence, access passwords are in danger of being stolen, both virtually and physically. You can try to protect your laptop using laptop security cable locks but what if it was stolen? Let all your information go into adversary’s hands? Do you _really_ think that your Windows logon password is an impenetrable barrier for the adversary? Have you heard of Elcomsoft System Recovery? You still think your laptop is secure because you have BIOS password and/or partial drive encryption? Read an article by Kevin Beaver ‘Securing corporate data on your laptops’ , take off rose-colored glasses and revise your laptop security as suggested in Kevin’s step-by-step outline.
Probably you’ve already heard about this vicious circle thousand times:
There is a few, so I’ll put ’em all into a single blog post 🙂