In the News

Want to solve GCHQ’s Christmas puzzle? Team up

Dyadic co-founder, Dr. Nigel Smart, talks about the GCHQ puzzle was a way to raise the profile of the agency’s cybersecurity work while trying to recruit new cryptological minds.

Read More >>

Think You’re More Secure than Instagram?

A Cyber Security Q&A with Dyadic Chief Scientist Yehuda Lindell. IT Briefcase sat down with Dr. Yehuda Lindellto focus on two of Instagram’s recently reported vulnerabilities that can be found in nearly every company today.

Read More >>

GCHQ-developed phone security ‘open to surveillance’

Dyadic co-founder, Dr. Nigel Smart, weighs in on the new security protocal being used to encrypt VOIP calls.

Read More >>

The Changing Face Of Encryption: What You Need To Know Now

Yehuda Lindell, Dyadic Security co-founder and chief scientist, contributes an article on the state of encryption today and offers five tips based on up-to-date best practices on encrypting data in your organisation.

Read More >>

Security researchers prepare for the ‘New normal’ post-CISA

Security researchers are preparing for the new normal that they will soon face in light of the cybersecurity legislation that was signed by President Obama last week. Now, researchers are bracing for the new challenge that an environment of automated information sharing would bring to an already challenging role.

Read More >>

Cybersecurity Checklist for Online Retailers This Holiday Season

Dyadic CEO offers an invaluable security checklist to retailers to help promote a safe and confident shopping experience for their consumers and to preserve revenue and reputation for their brands.

Read More >>

Librarians join privacy groups, as industry sources react to cybersecurity draft

Yehuda Lindell, Dyadic Security co-founder and chief scientist, warned about the prospect of government backdoors and de-encrypting technologies. He warned that once back doors are created for use by government authorities, it is much easier for hackers to access sensitive information by hacking the key to back doors.

Read More >>

Crytographic Key Reuse Exposed, Leaving Users at Risk

Using hardcoded private keys is a security disaster, according to Dr. Yehuda Lindell, co-founder and chief scientist at Dyadic. Lindell sees a number of reasons why the private keys may have been left exposed and reused by multiple vendors.

Read More >>

SC Magazine EBook on Application Security

Irene Abezgauz, product vice president at Dyadic, a New York-based firm which offers a software-only solution for protecting organizational secrets, agrees that all these challenges make protection of enterprise applications “a complex task.” Code that was tested for security today will be changed by next week or the next day, she says, so there’s a great need for ongoing security testing to constantly maintain a high level of security. In addition, with the growing lack of a network perimeter, the differentiation between friend and foe becomes much harder to identify, Abezguaz says.

Read More >>

Microsoft CEO Nadella unleashes security-first initiative

Dyadic Security co-founder and chief scientist Yehuda Lindell told SCMagazine.com that Microsoft’s security capabilities have “without a doubt” improved significantly in recent years.

Read More >>

Cybersecurity after the Paris attacks: Info-sharing in the spotlight

Dyadic Security co-founder and chief scientist Yehuda Lindell told SCMagazine.com there are “many things would make the job easier for law enforcement agencies,” including an ability to walk into anyone’s house at any time or search any car with or without cause. Lindell called the argument that private companies must provide access to unencrypted information to law enforcement and intelligence agencies “a joke,” since terrorists already encrypt their communication. “So you end up in a situation where the criminals encrypt their information and all of the rest of us do not,” he added.

Read More >>

Dyadic – Product of the Week

Powered by a multi-party computation (MPC)-based engine, Dyadic delivers powerful encryption, authentication and key protection. Organizations of all sizes can easily achieve effective, distributed protection of keys, credentials and data in any IT environment

Read More >>

Dyadic Protects Organizational Secrets and Sensitive Data with Comprehensive New Crypto Suite

Renowned cryptography professors transform multi-party computation research into technologically superior, easy-to-use encryption, authentication and distributed key protection solutions.

Read More >>

Mozilla may reject SHA-1 certificates six months early

“This is a matter of risk management, and it is bad risk management,” Yehuda Lindell, chief scientist at Dyadic, told SCMagazine.com. “In the end, we will all pay the price because of it,” he added.

Read More >>

Proposed cyber ‘squadron’ cultivates military-private partnerships to address cyber threats

Dyadic co-founder Dr. Yehuda Lindell echoed this sentiment. After researchers published a report demonstrating that it is possible for hackers to replicate a SHA-1 certificate for as little as $75,000 to $120,000, Lindell told SCMagazine.com the private sector is “waiting for actual damage to be inflicted before transitioning out of it.”

Read More >>

Researchers say SHA-1 will soon be broken, urge migration to SHA-2

Dr. Yehuda Lindell, chief scientist and co-founder of Dyadic, believes a full break of SHA-1 is just on the horizon. “I am convinced that large organizations (or governments) have already found collisions in SHA-1, Lindell said in a statement emailed to SCMagazine.com. “Attacks have been known for many years, but they are too costly for academic groups to carry out. Thus, no publicly published collision has been found. However, this does not mean that those with more means have not found them.“
Lindell concurred that a switch to SHA-2 should be fast tracked, but expressed dismay that the migration probably wouldn’t come soon enough. “There is no doubt that SHA-1 must be replaced immediately,” he said, explaining that, “industry is typically much too slow to make these changes, and so I expect that it will only happen after concrete attacks and damage have been inflicted.”

Read More >>

Researchers steal secret RSA encryption keys in Amazon’s cloud

Yehuda Lindell, chief scientist and co-founder of security firm Dyadic – which has a product for protecting secret cryptography keys – says the vulnerability is extraordinarily sophisticated – on the verge of being “magic.” He says but it proves the shortcomings, from a security perspective, of shared environments such as the cloud.
“Although a difficult attack to carry out, this further highlights the fact that secret keys are vulnerable, wherever they may be. They are even more vulnerable in cloud and virtualized environments where you have less direct control. This specific attack may be prevented by appropriate patching, as its 2009 predecessor was. However, the type of attack is almost impossible to completely prevent,” Lindell says.
Then of course there are a variety of security products on the market as well targeting this issue. Dyadic, where Lindell is chief scientist, has developed a way to spread encrypted keys out across multiple hosts, so that essentially no one single VM has all of the keys.

Read More >>

Amazon Downplays New Hack For Stealing Crypto Keys In Cloud

Yehuda Lindell, chief scientist and co-founder of encryption technology vendor Dyadic says the proof-of-concept developed by the WPI researchers shows how side-channel attacks make it possible for one process to steal a secret key held by another process.
“In order to carry out such an attack in the cloud, you first need to know that you are co-located on the same physical machine as a VM with the target application,” Lindell says. “This paper shows new ways of detecting collocation, and then methods for stealing the key using the side channels.”

Read More >>

Mapping Israel’s Cyber-Security Startups

As most readers know, Israeli high tech is much more of a general scientific and entrepreneurial renaissance than an extension of Israel’s military industrial complex. While many CISOs and corporate executives are familiar with Israeli cyber talent owing to Check Point, Imperva, CyberArk and other notable security success stories, the sheer scope of Israeli startup activity in the cyber sector is staggering. We have prepared the Israel CyberScape a general resource for CISOs, corporate development executives and investors keen on exploring Israeli cyber security. It includes 150 startup companies divided into 10 market segments.

Read More >>

Cutting-edge hack gives super user status by exploiting DRAM weakness

In one of more impressive hacks in recent memory, researchers have devised an attack that exploits physical weaknesses in certain types of DDR memory chips to elevate the system rights of untrusted users of Intel-compatible PCs running Linux.

Read More >>
Page 4 of 512345