Apr
16
2009
Comments Off on Sikh teen acquitted of kirpan assault – Toronto Star | tags: 3G, google, news, tv | posted in technical news
Apr
16
2009
Comments Off on Dozens arrested in Quebec Hells Angels sweep – CTV.ca | tags: google, news, tv | posted in technical news
Apr
16
2009
Comments Off on Crew Seized by Pirates Returns to US – New York Times | tags: google, Mac, news, tv, youtube | posted in technical news
Apr
15
2009
Comments Off on Dozens arrested in Quebec Hells Angels sweep – CTV.ca | tags: 3G, google, news, tv | posted in technical news
Apr
15
2009
Comments Off on Mountie can't recall discussions in meeting, Taser inquiry hears – CBC.ca | tags: google, news, tv | posted in technical news
Apr
15
2009
Comments Off on 'Gordon Campbell can't be trusted': Carole James – Vancouver Sun | tags: democrats, google, news, tv | posted in technical news
Apr
15
2009
Comments Off on Conquest Vacations closes – Toronto Star | tags: 3G, google, news, tv | posted in technical news
Apr
15
2009
Comments Off on 'Gordon Campbell can't be trusted': Carole James – The Province | tags: 3G, google, news, tv | posted in technical news
Apr
15
2009
BitTorrent is already an important tool for millions of people who prefer their television on-demand, but integration with traditional TV-sets is still lacking. This is about to change though, as the Tribler team announces version 5 of its next generation BitTorrent client.
Comments Off on Tribler 5 BitTorrent Powered TV is Coming | tags: tv | posted in technical news
Apr
15
2009
An anonymous reader sends in a story at Wired about the increasingly popular methods criminals are using to bypass PIN encryption and rack up millions of dollars in fraudulent withdrawals. Quoting: “According to the payment-card industry … standards for credit card transaction security, [PINs] are supposed to be encrypted in transit, which should theoretically protect them if someone intercepts the data. The problem, however, is that a PIN must pass through multiple HSMs across multiple bank networks en route to the customer’s bank. These HSMs are configured and managed differently, some by contractors not directly related to the bank. At every switching point, the PIN must be decrypted, then re-encrypted with the proper key for the next leg in its journey, which is itself encrypted under a master key that is generally stored in the module or in the module’s application programming interface, or API. ‘Essentially, the thief tricks the HSM into providing the encryption key,’ says Sartin. ‘This is possible due to poor configuration of the HSM or vulnerabilities created from having bloated functions on the device.'”

Read more of this story at Slashdot.


Comments Off on Subverting PIN Encryption For Bank Cards | tags: encrypted, encryption, google, network, program, programming, security, tv | posted in technical news