Web Application Security Mode:
(Page 3 of 330)  < Prev  1 2 3 4 5 6 7 8 9 10 11  Next >
RE: Secret Sharing 2013-08-03
JAntonakos excelsior edu

Symmetric encryption uses a single key. Asymmetric encryption uses public
and private keys.

You encrypt with the public key and decrypt with the private key.

Best,
JLA

Sent with Good (www.good.com)

-------- Original Message --------

From : listbounce (at) securityfocus (dot) com [email concealed]
To : saghar es

[ more ]  [ reply ]
Reply: End-to-End Email Encryption Solution 2013-08-03
Orfeo Chen (noir meta-4 me)
PGP Desktop fits quite well into the situation. It's commercial but the email encryption and decryption feature is absolutely free. Also, GPG if you want, it's open source.

Mohamed Farid <m.farid.shawara (at) gmail (dot) com [email concealed]>ï¼?

Dear All :

I am searching for a good End-to-End Email Security Solution ( Ope

[ more ]  [ reply ]
End-to-End Email Encryption Solution 2013-08-02
Mohamed Farid (m farid shawara gmail com) (5 replies)
Dear All :

I am searching for a good End-to-End Email Security Solution ( Open
Source of Commercial ) - Any advices ?
And previous experience ?

Thank you ,,,

This list is sponsored by Cenzic
--------------------------------------
Let Us Hack You. Before Hackers Do!
It's Finally Here - The Cenz

[ more ]  [ reply ]
Re: End-to-End Email Encryption Solution 2013-08-03
Adrian Puente (puenteadrian gmail com)
Re: End-to-End Email Encryption Solution 2013-08-03
Paulo Cesar Breim \(PCB\) (paulo breim com br) (1 replies)
Re: End-to-End Email Encryption Solution 2013-08-04
Manolis Mavrofidis (mmavrofides gmail com)
Re: End-to-End Email Encryption Solution 2013-08-03
Izhar Ahmed Mujaddidi (izhara hotmail com) (1 replies)
Re: End-to-End Email Encryption Solution 2013-08-05
Brian Fritts (bfritts wcmc org)
Re: End-to-End Email Encryption Solution 2013-08-03
Tracy Reed (treed ultraviolet org)
Re: End-to-End Email Encryption Solution 2013-08-03
Mufti, Mueen (Mueen Mufti bestway co uk)
OWASP Xenotix XSS Exploit Framework v4 Released 2013-08-01
Ajin Abraham (ajin25 gmail com)
Hi all,

I just released version 4 of OWASP Xenotix XSS Exploit Framework.

Have a look at:
https://www.owasp.org/index.php/OWASP_Xenotix_XSS_Exploit_Framework

OWASP Xenotix XSS Exploit Framework is an advanced Cross Site
Scripting (XSS) vulnerability detection and exploitation framework. It
provid

[ more ]  [ reply ]
Secret Sharing 2013-08-01
saghar estehghari (s estehghari gmail com) (2 replies)
Hi,

I'm working on a project which involves security of the cloud data.

The scenario is as follows:

Users A and B have registered to a cloud service (cloud assumed to be
semi-trusted). A and B both have secret keys (KA and KB) (for
symmetric encryption) and public keys (PKA and PKB) on the cloud

[ more ]  [ reply ]
Re: Secret Sharing 2013-08-03
Siim Põder (siim p6drad-teel net)
Re: Secret Sharing 2013-08-01
Jamie Riden (jamie riden gmail com) (1 replies)
Re: Secret Sharing 2013-08-03
Nir Izraeli (nirizr gmail com)
Ruxcon 2013 Final Call For Papers 2013-07-15
cfp ruxcon org au
Ruxcon 2013 Final Call For Papers
Melbourne, Australia, October 26th-27th
CQ Function Centre
http://www.ruxcon.org.au/call-for-papers/

The Ruxcon team is pleased to announce the final call for papers for Ruxcon.

This year the conference will take place over the weekend of the 26th and 27th
of Oc

[ more ]  [ reply ]
[CVE-2012-6458] Multiple Persistent XSS in silverstripe-ecommerce 2013-07-14
Craig Young (vuln-report secur3 us)
I am writing to inform you of multiple persistent XSS issues within
the ecommerce module
(https://code.google.com/p/silverstripe-ecommerce/) of SilverStripe
CMS. These issues have been fixed without a corresponding release
note or other indication of a security advisory. The author has been
unres

[ more ]  [ reply ]
SEC Consult blog :: Content security policy - assumptions vs. reality 2013-07-11
SEC Consult Vulnerability Lab (research sec-consult com)
SEC Consult Vulnerability Lab published a new blog entry titled:
Content Security Policy (CSP) - Another example on application security and
"assumptions vs. reality"

Abstract:
---------
Software applications have been around for quite some time. Since the first
security vulnerabilities and corre

[ more ]  [ reply ]
Ground Zero Summit - Call For Papers 2013-07-09
submit cfp (submitcfp g0s org)
Hi All,

Ground Zero Infosec Summit is an initiative of independent apex
not-for-profit body and is an outcome of an alliance between industry
and Government of India to tackle emerging cyber security threats
against critical information infrastructure. The summit is supported
by the Govt. of India.

[ more ]  [ reply ]
[HITB-Announce] REMINDER: #HITB2013KUL CFP Closes 25th July 2013-07-09
Hafez Kamal (aphesz hackinthebox org)
Hi everyone,

Just a gentle reminder that the Call for Papers for the 11th annual HITB
Security Conference in Malaysia, #HITB2013KUL, closes on the 25th of
July at 23:59 MYT!

As always, we're looking for talks that are highly technical, but most
importantly, material which is new, cutting edge and

[ more ]  [ reply ]
Arachni v0.4.3 has been released (Open Source Web Application Security Scanner Framework) 2013-07-06
Tasos Laskos (tasos laskos gmail com)
Hey folks,

There's a new version of Arachni, an Open Source, modular and
high-performance Web Application Security Scanner Framework written in Ruby.

The change-log is quite sizeable but some bullet points follow.

For the Framework (v0.4.3):

* Stable multi-Instance scans, taking advantage of

[ more ]  [ reply ]
Fwd: Top 5 Reasons to Implement Threat Modeling 2013-06-28
Reef Dsouza (reeftim gmail com)
Hi AppSec Ninjas,

As always, the Verizon Data Breach report highlighted some interesting
stats on attacks and breaches over the last year. And, no surprise
that hacking accounts for a high chunk of those attack vectors, with
SQL Injection still prominent.

In order to build software securely, we

[ more ]  [ reply ]
CFP Extended - OWASP InfoSec India Conference 2013 2013-06-13
Dhruv Soi (dhruv soi owasp org)
Good News for information security experts who couldn't yet submit
their papers for "OWASP InfoSec India Conference 2013" happening at
Hotel Crowne Plaza, Gurgaon, New Delhi NCR, India from August 30-31,
2013.

With few great papers submitted already, we would like to take this
opportunity to extend

[ more ]  [ reply ]
t2'13: Call for Papers 2013 (Helsinki / Finland) 2013-06-11
Tomi Tuominen (tomi tuominen t2 fi)

# t2'13 - Call For Papers #
Helsinki, Finland
October 24 - 25, 2013

We are pleased to announce the annual t2'13 infosec conference, which
will take place in Helsinki, Finland, from October 24 to 25, 2013.

We are looking for original, pre

[ more ]  [ reply ]
c0c0n 2013 CFP - Extended Deadline: 9 June, 2013 2013-05-26
c0c0n International Information Security Conference (c0c0n is-ra org)
c0c0n 2013 CFP - Extended Deadline: 9 June, 2013

Thanks to everyone for all the paper submissions. The CFP Review Committee
will be evaluating the same for selection. Based on the requests received,
we are extending the CFP deadline to June 9, 2013 in the hope of receiving
few more paper s

[ more ]  [ reply ]
CONFidence - May, 28-29, Krakow, Poland - a conference adventure that never stops! 2013-05-17
S³awomir Jabs (slawomir jabs gmail com)
Everything has a story, everything evolves, adapts to changing circumstances
but does your IT Sec strategy evolve with the development of the digital
world?

Are you wiling to gamble on the security of you systems?

Join the upcoming CONFidence conference and meet both renown speakers and
specialist

[ more ]  [ reply ]
RE: WASC Announcement: Static Analysis Technologies Evaluation Criteria Published 2013-05-16
Debasis Mohanty (dm mailinglists gmail com)
Good initiative! I feel one of the important element that is missing is the
"scoring mechanism". Based on what would you distinguish one product from
the other?

I created similar evaluation criteria nearly 7-8 years back for evaluating
SCA products using a QFD. That was the time I was introduced t

[ more ]  [ reply ]
[HITB-Announce] HITB Magazine Issue 010 2013-05-14
Hafez Kamal (aphesz hackinthebox org)
Hi everyone,

A small reminder that article submissions for HITB Magazine Issue 010
are due tomorrow (15th May 2013). If you're interested in submitting
please send your > 3000 word article to editorial (at) hackinthebox (dot) org [email concealed]

Topics of interest include, but are not limited to the following:

Next gen

[ more ]  [ reply ]
WASC Announcement: Static Analysis Technologies Evaluation Criteria Published 2013-05-10
announcements webappsec org
The Web Application Security Consortium (WASC) is pleased to announce the
Static Analysis Technologies Evaluation Criteria. The goal of the SATEC
project is to create a vendor-neutral set of criteria to help guide
application security professionals during the process of acquiring a
static code analy

[ more ]  [ reply ]
SpiderFoot 2.0 released 2013-05-04
Steve Micallef (steve binarypool com)
Hi everyone,

SpiderFoot is a free, open-source footprinting tool, enabling you to
perform various scans against a given domain name in order to obtain
information such as sub-domains, e-mail addresses, owned netblocks, web
server versions and so on. The main objective of SpiderFoot is to
automa

[ more ]  [ reply ]
(Page 3 of 330)  < Prev  1 2 3 4 5 6 7 8 9 10 11  Next >


 

Privacy Statement
Copyright 2010, SecurityFocus