Almost all cyber attacks target the human factor
Itsecurity placeholder

( Source: www.inside-it.ch )
» Read more
Watch out, cryptography!
Thumb analytics 3088958 1280

"Backdoors" are the rule.

Testing hardware and debugging software is not trivial today. How do you test millions of lines of code or billions of transistors? The more complex the technology, the more creative approaches are needed. Cryptographic systems often present an additional challenge. After all, many testing procedures are ultimately about checking whether the system delivers the output that matches the input. Cryptographic methods can also be reliably tested with known input-output pairs. Such input-output pairs are called test vectors and are usually provided by the...

» Read more