Saturday, September 26, 2015

2015 U.S. Economic Events & Analysis: Econoday Reports

Source: Econoday Report: Simply Economics September 28, 2015
Econoday International Perspective 9/18/15
By Anne D. Picker, Chief Economist

Source: Center for data dependence
Econoday Simply Economics 9/25/15
By Mark Pender, Senior Editor

Source: Today's Economic Calendar Week of Sept 28 thru Oct 2

Tuesday, September 15, 2015

Hacking Team, Computer Vulnerabilities, and the NSA | Georgetown Journal of International Affairs

Source:  Hacking Team, Computer Vulnerabilities, and the NSA | Georgetown Journal of International Affairs



HACKING TEAM, COMPUTER VULNERABILITIES, AND THE NSA

(www.perspecsys.com, Flickr Commons)
(www.perspecsys.com, Flickr Commons)
When the National Security Administration (NSA) — or any government agency — discovers a vulnerability in a popular computer system, should it disclose it or not? The debate exists because vulnerabilities have both offensive and defensive uses. Offensively, vulnerabilities can be exploited to penetrate others’ computers and networks, either for espionage or destructive purposes. Defensively, publicly revealing security flaws can be used to make our own systems less vulnerable to those same attacks. The two options are mutually exclusive: either we can help to secure both our own networks and the systems we might want to attack, or we can keep both networks vulnerable. Many, myself includedhave long argued that defense is more important than offense, and that we should patch almost every vulnerability we find. Even the President’s Review Group on Intelligence and Communications Technologiesrecommended in 2013 that “U.S. policy should generally move to ensure that Zero Days are quickly blocked, so that the underlying vulnerabilities are patched on U.S. Government and other networks.”

NSA preps quantum-resistant algorithms to head off crypto-apocalypse | Ars Technica

Source:  NSA preps quantum-resistant algorithms to head off crypto-apocalypse | Ars Technica


NSA preps quantum-resistant algorithms to head off crypto-apocalypse


Quantum computing threatens crypto as we know it. The NSA is taking notice.

Enlarge / A chip manufactured by D-Wave Systems that has some quantum properties.
The National Security Agency is advising US agencies and businesses to prepare for a time in the not-too-distant future when the cryptography protecting virtually all e-mail, medical and financial records, and online transactions is rendered obsolete by quantum computing.

Workshop on Cybersecurity in a Post-Quantum World

Source:  Workshop on Cybersecurity in a Post-Quantum World


Workshop on Cybersecurity in a Post-Quantum World

NIST Home > ITL > Computer Security Division > Cryptographic Technology Group > Workshop on Cybersecurity in a Post-Quantum World

Purpose:

The advent of practical quantum computing will break all commonly used public key cryptographic algorithms. In response, NIST is researching cryptographic algorithms for public key-based key agreement and digital signatures that are not susceptible to cryptanalysis by quantum algorithms. NIST is holding this workshop to engage academic, industry, and government stakeholders. The Post Quantum Workshop will be held on April 2-3, 2015, immediately following the 2015 International Conference on Practice and Theory of Public-Key Cryptography. NIST seeks to discuss issues related to post-quantum cryptography and its potential future standardization.

Agenda:

Presentations are linked within the agenda. 
Thursday, April 2, 2015
9:00am - 9:10amOpening Remarks
Donna F. Dodson, ITL Associate Director, Chief Cybersecurity Advisor, and Director of the National Cybersecurity Center of Excellence
9:10am - 10:30am
Session I: Multivariate and Code-based Cryptosystems
Session Chair: Daniel Smith-Tone, NIST
  1. Gui: Revisiting Multivariate Digital Signature Schemes based on HFEv- [paper
    presented by: Jintai Ding, University of Cincinnati
  2. QC-MDPC-McEliece: A public-key code-based encryption scheme
    presented by: Jean-Pierre Tillich, INRIA
  3. A New Code Based Public Key Encryption and Signature Scheme based on List Decoding
    presented by: Danilo Gligoroski, NTNU
  4. Rank based Cryptography: a credible post-quantum alternative to classical crypto [paper]
    presented by: Philippe Gaborit, University of Limoges
10:30am - 11:00amCoffee Break
11:00am - 11:50am
Session II: Invited talk by Bart PreneelKatholieke Universiteit Leuven
Introduced by: Dustin Moody, NIST
  1. Public Key Cryptography: the next 4 decades
11:50pm - 12:50pm
Session III: Higher level protocols
Session chair: Rene Peralta, NIST
  1. Post-quantum key exchange for the TLS protocol from RLWE problem [paper]
    presented by: Craig Costello, Microsoft
  2. Future Anonymity in Today’s Budget [paper]
    presented by: Aniket Kate, CISPA, Saarland University
  3. A quantum-safe circuit-extension handshake for Tor [paper]
    presented by: Zhenfei Zhang, Security Innovation
12:50pm - 2:00pmLunch
2:00pm - 2:50pm
Session IV: Invited Talk by David McGrewCisco Systems
Introduced by: Rene Peralta, NIST
  1. Living with Post-Quantum Cryptography
2:50pm - 3:20pmCoffee Break
3:20pm - 4:20pm
Session V: Hash-based Signature Schemes
Session chair: Ray Perlner, NIST
  1. Hash-based Signatures: An outline for a new standard [paper]
    presented by: Andreas Hulsing, Technische Universiteit Eindhoven
  2. Let Live and Let Die - Handling the state of Hash-based signatures [paper]
    presented by: Stefan-Lukas Gazdag, Genua mbh
  3. SPHINCS: practical stateless hash-based signatures [paper]
    presented by: Daniel Bernstein, University of Illinois at Chicago
4:20pm - 5:20pm
Session VI: Panel: Shoring up the Infrastructure: A strategy for Standardizing Hash SignaturesModerator: Burt Kaliski, Verisign
Panelists:
  • Andreas Hulsing, TU Eindhoven
  • David McGrew, Cisco Systems 
  • Aziz Mohaisen, Verisign Labs
  • Russ Housley, Vigil Security, LLC

Friday, April 3, 2015
9:00am - 11:00am
Session VII: Topics in Post-Quantum Cryptography
Session chair: Stephen Jordan, NIST
  1. Evaluating Post-Quantum Asymmetric Cryptographic Algorithm Candidates
    presented by: Dan Shumow, Microsoft
  2. Failure is not an option: Standardization issues for Post-Quantum key Agreement
    presented by: Mark Motley, Department of Defense
  3. PQCrypto project in the EU
    presented by: Tanja Lange, TU Eindhoven
  4. MQ Challenge: Hardness Evaluation of Solving MQ problems [paper]
    presented by: Takanori Yasuda, Institute of Systems, Information Technologies and Nanotechnologies
  5. Grobner Bases Techniques in Post-Quantum Cryptography
    presented by: Ludovic Perret, LIP6
  6. DTLS-HIMMO: Efficiently Securing PQ world with a fully-collusion resistant KPS [paper]
    presented by: Oscar Garcia-Morchon, Phillips Group Innovation
11:00am - 11:30amCoffee Break
11:30am - 12:20pm
Session VIII: Invited talk by Michele MoscaUniversity of Waterloo
Introduced by: Lily Chen, NIST
  1. Cybersecurity in a quantum world: will we be ready?
12:20pm - 1:20pmLunch
1:20pm - 3:00pm
Session IX: Key Management, and Lattice-based Cryptography
Session chair: Dustin Moody, NIST
  1. Panel: Key Management for Quantum-safe CryptographyModerator: Robert Griffin, RSA
    Panelists:
    • Elizabeth O’Sullivan, Queen’s University Belfast
    • Sean Parkinson, RSA
    • Gregoire Ribordy, ID Quantique
    • William Whyte, Security Innovation
  2. Practical Lattice-based Digital Signature Schemes[paper]presented by: Maire O'Neill, Queen's University Belfast
  3. Post-quantum Authenticated Key Exchange from Ideal Lattices [paper]
    presented by: Jintai Ding, University of Cincinnati 
3:00pm - 3:30pmCoffee Break
3:30pm - 5:00pm
Session X: Quantum and classical cryptanalysis
Session chair: Yi-Kai Liu, NIST
  1. Invited talk:  Paul LopataLaboratory for Physical SciencesExperimental Quantum Computing Progress in a Pre-Quantum World
  2. Renaissance of Pre-computation in a Post-Quantum World
    presented by: Aydin Aysu, Virginia Tech
  3. Trapdoor simulation of quantum algorithmspresented by: Daniel Bernstein, University of Illinois at Chicago
5:00pm - 5:10pm
Closing Remarks
Lily Chen, Acting Manager, Cryptographic Technology Group, NIST
Invited Speakers
Paul Lopata Laboratory for Physical Sciences
Topic: Experimental Quantum Computing Progress in a Pre-Quantum World
ABSTRACT: The anticipated promise of the field of quantum computing depends upon two major theoretical results: the construction of high-quality quantum algorithms; and the development of reasonable methods for noise-reduction through fault-tolerant operations. In addition, the continued success of the field relies on steady progress in experimental demonstrations of quantum computing primatives. This talk provides a survey of recent experimental successes, and places these results in the context of what needs to be achieved to someday experimentally demonstrate fault-tolerant operations and demonstrate quantum algorithms. 

David McGrew Cisco Systems
Topic: Living with Post-Quantum Cryptography
ABSTRACT: This presentation outlines a systems engineering approach that makes it easier to live with postquantum cryptography. There are asymmetric encryption and signature algorithms that will be secure even in the postquantum era, but they bring baggage: big signatures and ciphertexts, really big keys, costly key generation, and stateful signing. Adopting these algorithms into standard protocols in a straightforward way is possible, but is suboptimal. A better approach is to consider the overall security goals and adapt protocols to make good use of the capabilities of postquantum algorithms. This approach brings an important benefit: it eliminates the pressure to trade off security against systems constraints like computation and communication cost.

Michele Mosca Institute for Quantum Computing, University of Waterloo, Canada
Topic: Cybersecurity in a quantum world: will we be ready? 
ABSTRACT: Emerging quantum technologies will break currently deployed public-key cryptography which is one of the pillars of modern-day cybersecurity. Thus we need to migrate our systems and practices to ones that are quantum-safe before large-scale quantum computers are built. For systems protecting medium-term or long-term secrets, this migration should occur sufficiently many years before the current quantum-vulnerable tools are broken.
Impressive progress in developing the building blocks of a fault-tolerant scalable quantum computer indicates that the prospect of a large-scale quantum computer is a medium-term threat.
There are viable options for quantum-proofing our cryptographic infrastructure, but the road ahead is neither easy nor fast. A broad community of stakeholders will need to work together to quantum-proof our cyber systems within the required timeframe.  

Bart Preneel Electrical Engineering Department, Katholieke Universiteit Leuven, Belgium
Topic: Public Key Cryptography: the next 4 decades




Quantum computing - Wikipedia, the free encyclopedia

Source:  Quantum computing - Wikipedia, the free encyclopedia



Quantum computing studies theoretical computation systems (quantum computers) that make direct use of quantum-mechanical phenomena, such as superposition and entanglement, to perform operations on data.[1]Quantum computers are different from digital computers based on transistors. Whereas digital computers require data to be encoded into binary digits (bits), each of which is always in one of two definite states (0 or 1), quantum computation uses quantum bits (qubits), which can be in superpositions of states. A quantum Turing machine is a theoretical model of such a computer, and is also known as the universal quantum computer. Quantum computers share theoretical similarities with non-deterministic and probabilistic computers. The field of quantum computing was initiated by the work of Yuri Manin in 1980,[2] Richard Feynman in 1982,[3] and David Deutsch in 1985.[4] A quantum computer with spins as quantum bits was also formulated for use as a quantum space–time in 1968.[5]
As of 2015, the development of actual quantum computers is still in its infancy, but experiments have been carried out in which quantum computational operations were executed on a very small number of quantum bits.[6][citation needed] Both practical and theoretical research continues, and many national governments and military agencies are funding quantum computing research in an effort to develop quantum computers for civilian, business, trade, and national security purposes, such as cryptanalysis.[7]
Large-scale quantum computers will be able to solve certain problems much more quickly than any classical computers that use even the best currently known algorithms, like integer factorization using Shor's algorithm or thesimulation of quantum many-body systems. There exist quantum algorithms, such as Simon's algorithm, that run faster than any possible probabilistic classical algorithm.[8] Given sufficient computational resources, however, a classical computer could be made to simulate any quantum algorithm, as quantum computation does not violate the Church–Turing thesis.[9]



Wednesday, September 9, 2015

Revenge of the nannies | OnGuard Online

Source:  Revenge of the nannies | OnGuard Online



Are you a nanny or caregiver who lists your services on sites like care.com, sittercity.com, or craigslist.com? A few months ago, we warned about a scam that targets caregivers like you. Here’s a reminder: a con artist emails or texts an offer to hire you. The scammer also sends you a check and asks you to deposit it, keep some money for your services, and send the rest to someone else to — supposedly — pay for special items or medical equipment. But the check is fake, and it can take weeks for a bank to discover the forgery. If you deposit the check and withdraw the funds, you’ll wind up owing the bank all that money.
After the last post, we heard back from many people with great ideas to help avoid this scam:
  • Don’t deposit a check from — or send money to — anyone you don’t know.
  • Never share your bank account number — including with a potential client.
  • Be careful with potential clients who claim to be out of town or pressure you to deposit their check.
  • Check out your potential clients. Search online for their names, email addresses, phone numbers, and even the text of the message you received. Many people said that an easy search told them they were dealing with a scammer. 
  • Call MoneyGram (1-800-666-3947) or Western Union (1-800-448-1492) if you were tricked into transferring money. 
If you got a check through the U.S. mail, file a complaint with the U.S.Postal Inspection Service. And, as always, please tell the FTC.
Blog Topic: Avoid Scams

Another test of support by GoPro (GPRO). Here's the trade. (September 08, 2015)

Source: Another test of support by GoPro (GPRO). Here's the trade. (September 08, 2015)




I want you to look at GoPro ( NASDAQ:GPRO ), and here’s why: there’s no momentum in this stock other than down. Make no mistake. But, this was where support was before. Extend it out, this was where support was, again, in March, and this is where the stock is trading right now. You can say, “But Dan, but it’s a lower high here.” Why, yes it was, it was a lower high from here. But I’m not talking about what’s going to happen in October, November, December, or any of that, which is where this is actually relevant.
What I’m talking about is this; this is actually a low-risk buy point. What I mean by low-risk is, your idea, MY idea is that the stock is down at a level where buyers have come in before. It’s had massive selling here. You look at the big red spikes here; it’s had massive selling. It was up a bit, not a big deal, almost 2 percent today, which on any other day would be awesome. But every single stock, it seemed like, other than Netflix, was up and so I would kind of expect this to be up. I just like the fact that it’s down at support.
So what you do is, if the stock starts trading up tomorrow. Notice I said “if”, I really mean this, I was going to say, “I totally mean this,” but that would put me back about four decades into the San Fernando Valley. Look for a bounce here. If the stock bounces then you buy the stock, you keep a stop say underneath $36.00. This was the low, 36.38; shoot, put your stop at 36.25 or so. The idea is that the stock’s down here. Again, if it bounces, if it’s moving up tomorrow you take your trade, you’ve got your stop in and you figure out what you’re going to do with it when it gets up to about $50.00 or so.
Look, as strange as it sounds we’re coming into the holiday season already. Everybody wants to be a hero, everybody wants a hero, that’s what these guys are selling, and they’re doing drones too. How could it get better than drones and helmet cams? I can’t think of a way. So I think this could ultimately turn into an opportunity for you to be in GoPro ( NASDAQ:GPRO ). But I’m going to say it once again, as long as you have your stop defined; if you don’t, you’re out there on the wild frontier all alone, good luck to you.
FREE CHART

Tuesday, September 8, 2015

Understanding Anti-Virus Software

Source:  Understanding Anti-Virus Software



Security Tip (ST04-005)

Understanding Anti-Virus Software

What does anti-virus software do?
Although details may vary between packages, anti-virus software scans files or your computer’s memory for certain patterns that may indicate the presence of malicious software (i.e., malware). Anti-virus software (sometimes more broadly referred to as anti-malware software) looks for patterns based on the signatures or definitions of known malware. Anti-virus vendors find new and updated malware daily, so it is important that you have the latest updates installed on your computer.
Once you have installed an anti-virus package, you should scan your entire computer periodically.
  • Automatic scans – Most anti-virus software can be configured to automatically scan specific files or directories in real time and prompt you at set intervals to perform complete scans.
  • Manual scans – If your anti-virus software does not automatically scan new files, you should manually scan files and media you receive from an outside source before opening them. This process includes:
    • Saving and scanning email attachments or web downloads rather than opening them directly from the source.
    • Scanning media, including CDs and DVDs, for malware before opening files.
How will the software respond when it finds malware?
Sometimes the software will produce a dialog box alerting you that it has found malware and ask whether you want it to “clean” the file (to remove the malware). In other cases, the software may attempt to remove the malware without asking you first. When you select an anti-virus package, familiarize yourself with its features so you know what to expect.
Which software should you use?
There are many vendors who produce anti-virus software, and deciding which one to choose can be confusing. Anti-virus software typically performs the same types of functions, so your decision may be driven by recommendations, particular features, availability, or price. Regardless of which package you choose, installing any anti-virus software will increase your level of protection.
How do you get the current malware information?
This process may differ depending on what product you choose, so find out what your anti-virus software requires. Many anti-virus packages include an option to automatically receive updated malware definitions. Because new information is added frequently, it is a good idea to take advantage of this option. Resist believing alarmist emails claiming that the “worst virus in history” or the “most dangerous malware ever” has been detected and will destroy your computer’s hard drive. These emails are usually hoaxes. You can confirm malware information through your anti-virus vendor or through resources offered by other anti-virus vendors.
While installing anti-virus software is one of the easiest and most effective ways to protect your computer, it has its limitations. Because it relies on signatures, anti-virus software can only detect malware that has known characteristics. It is important to keep these signatures up-to-date. You will still be susceptible to malware that circulates before the anti-virus vendors add their signatures, so continue to take other safety precautions as well.

Author

US-CERT Publications
This product is provided subject to this Notification and this Privacy & Use policy.

BookMark