Search for: "RSA Security" Results 161 - 180 of 393
Sorted by Relevance | Sort by Date
RSS Subscribe: 20 results | 100 results
18 Dec 2013, 3:25 pm by Dan Goodin
The technique, outlined in a research paper published Wednesday, has already been shown to successfully recover a 4096-bit RSA key used to decrypt e-mails by GNU Privacy Guard, a popular open source implementation of the OpenPGP standard. [read post]
3 Apr 2015, 5:44 am by Beth Deragon
The current statutory laws (RSA 275, RSA 279 and RSA 281-A:2) defining ‘employee’ have evolved to a point where the same factual circumstances involving an independent contractor can beget different, conflicting results. [read post]
24 Sep 2019, 3:56 am by Staff Attorney
The clients alleged that RSA misrepresented the safety and security of film tax credit notes purchased from the issuer, leading clients to believe their principal was not subject to significant risk. [read post]
27 Aug 2015, 5:00 am by Nicholas Weaver
  Yet as many cryptographers were suspicious of both Dual_EC's poor performance and "backdoor-capable" nature, the NSA also needed to use its market power to encourage adoption, including reportedly bribing RSA Data Security $10M to make it the default pRNG. [read post]
17 Jul 2015, 9:34 am by Thompson & Knight LLP
The Debtors’ indebtedness includes approximately $87.6 million in first lien, senior secured principal indebtedness to certain Prepetition First Lien Lenders (as defined in the Winn Declaration). [read post]
22 Oct 2007, 11:29 am
We would like to give an example of such company called Cyota RSA Security. [read post]
10 Feb 2011, 3:01 pm by Oliver G. Randl
It is held that RSA is the first viable, concretely implemented asymmetric cryptography system and nowadays it is a central component in many cryptographic security systems. [read post]
7 Dec 2011, 8:22 am by Matt Berg
Two-factor authentication has been in use for many years (perhaps most readily recognizable in the form of an RSA SecurID token key fob), and is superior to other forms of security because it requires that you have both. [read post]
3 Jul 2018, 2:08 pm
For example, if you know that you will receive voting securities or restricted share awards (RSAs) from your employer that entitle you to vote the shares and receive dividends, you may have to file and observe the waiting period before you receive them. [read post]
12 Jun 2011, 2:00 pm
The IMF uses RSA SecurID tokens, and though they are due to be replaced after RSA was attacked and critical SecurID was compromised, the memo said that there is no indication that the SecurID compromise played a role. [read post]
8 Mar 2010, 4:01 am by admin
Speaking at the RSA Conference, Schmidt, who was… Read this entire article for free, simply activate your free 15 day trial access to Privacy & Security Law Report now. [read post]
10 Jun 2014, 11:03 pm by Nadia Kayyali
” What’s worse, in December Reuters revealed that security giant “RSA received $10 million [from the NSA] in a deal that set [a purposefully flawed] NSA formula as the preferred, or default, method for number generation in the BSafe software. [read post]
11 Jul 2017, 9:24 am by Paul Rosenzweig
Victims include RSA, Lockheed Martin, Google, and the U.S. [read post]
7 Jan 2015, 1:00 pm by Dan Goodin
The Option ROM replaces the RSA encryption key Macs use to ensure only authorized firmware is installed. [read post]
19 Dec 2013, 1:05 pm by Dan Goodin
Credible doubts about the trustworthiness of the deterministic random bit generator surfaced almost immediately after National Security Agency officials shepherded it through an international standards body in 2006. [read post]
27 Oct 2015, 2:19 pm by rainey Reitman
For example, Reuters published a disturbing report showing how the NSA apparently compromised security industry mainstay RSA and enticed them with a $10 million payment to make an intentionally flawed and later-discredited cryptographic algorithm the default—introducing a backdoor into untold computer systems. [read post]
6 Apr 2015, 5:55 pm by Farbod Faraji
(FREAK stands for Factoring RSA Export Keys and refers to the exploitation of a weakness in the SSL/TLS protocol that allows attackers to force browsers to use weak encryption keys.) [read post]
6 Mar 2014, 4:52 am by Stewart Baker
Last year, I was arguing with a couple of my partners, Michael Vatis and Jason Weinstein over the latest developments in privacy and security law. [read post]
14 Oct 2019, 9:24 am by Deanna Besbekos-LaPage
Stokes was ordered to pay $201,000 plus interest in restitution to Investor #1 and a $20,000 fine for violating New Hampshire Blue Sky Laws, which prohibit the fraudulent sale of securities (RSA 421-B:5-501) and the sale of unregistered securities (RSA 421-B:3-301(a)). [read post]