Cryptojacking: cryptography in the service of the Devil

Published on Sun 07 January 2018 in Information Security • Tagged with cryptojacking, cryptography

A new  revenue stream has been implemented by the end of the last year. Maybe cryptojacking did not get yet the hype it deserves but it has been already widely used. Most Internet consumers are not aware of it though its intentions are far from being innocent. It may also generate inequalities among Internet users.

Continue reading

Vigenère cipher simplified implementation

Published on Sun 12 November 2017 in Information Security • Tagged with algorithms, cryptography

This is not an other dissertation on Vigenère cipher. This encryption algorithm is profusely discussed in cryptography literature. Here is rather a simplified yet efficient implementation of it.

Continue reading

Mozilla beheads SHA-1

Published on Fri 27 January 2017 in Information Security • Tagged with https

You have heard of SHA-1 deprecation since 2012. Mozilla finally confirms this is not a joke.

Continue reading

JavaScript malware

Published on Tue 24 January 2017 in Information Security • Tagged with malware, javascript

What are the JavaScript malware attack techniques and how to prevent from them?

Continue reading