Page 4,328«..1020..4,3274,3284,3294,330..4,3404,350..»

ODG Works With Citrix To Bring Cloud-Hosted Apps To Smartglasses (Updated) – Tom’s Hardware

Update, 05/23/2017, 2:00pm PT: ODG replied to our inquiry and confirmed that Citrix works on all ODG smartglasses.We adjusted the copy below accordingly.

Original article, 5/23/17, 11:45am PT:

Osterhout Design Group announced a partnership with Citrix that would bring Citrixs virtualization and virtual desktop enterprise suites to ODGs self-contained AR smartglasses.

In the IT sector, the name Citrix is nearly ubiquitous. If your company uses virtual desktops and dumb clients to access digital workstations, theres a good chance that the backend is powered by Citrixs technology.

The Citrix Receiver, Citrix XenApp, Citrix XenDesktop platforms enable enterprises to cut down on hardware deployment and software licensing costs. These platforms also enable companies to empower their employees with the ability to access their work from any device. The Citrix Receiver allows you to log in to a virtual desktop from any device with an internet connection, such a PC, laptop, tablet, or smartphone. And now, you can add ODG smartglasses to that list.

... we are working with ODG to combine our HDX application delivery technology with ODG smartglasses to showcase the future of work for enterprises and industry, said Chris Fleck, vice president and technical fellow at Citrix. We have been extremely impressed with the power and performance of ODGs devices and believe it is an ideal device on which to expand into new mobile use cases and help drive the next-generation mobile computing platform.

Citrix added full support for ODGs smartglasses to its virtualization platforms. ODG smartglasses can now access XenDesktop-hosted Windows and Linux virtual desktops, as well as cloud-hosted business applications, through XenApp.

Today, ODGs smartglasses are a powerful tool being used or tested by many of the Fortune 500 in both heavy industry and the enterprise to improve efficiencies and drive cost savings, said Bobby King,VP of Special Projects at ODG. With Citrixs suite of software, we extend the appeal and reach of our devices as practical, everyday products that deliver an unparalleled, secure, end-to-end head-worn computing solution for business and personal use.Its an exciting new dawn for business mobility.

Citrixs virtual hosting platform introduces more performance and versatility to ODGs Smartglasses. Hosted desktops and applications benefit from the performance of the server clusters advanced capabilities, such as accessing Machine Learning and AI algorithms that you couldnt dream of using on a mobile device without backend help.

The Citrix Reciever for ODG Smartglasses is available today. ODG said the software works on the company's entire portfolio of smartglasses.

Read more here:
ODG Works With Citrix To Bring Cloud-Hosted Apps To Smartglasses (Updated) - Tom's Hardware

Read More..

IBM boosts power of quantum computing processors as it lays … – www.computing.co.uk

IBM Research Staff Member Katie Pooley examines a cryostat with the new prototype of a commercial quantum processor inside

IBM has built and tested two new quantum processors, far in advance of its previous best 5-qubit processor. They will form the foundation of upcoming systems.

First is a freely-accessible 16-qubit processor, which can be reached through the IBM Cloud; while the second, a prototype commercial 17-qubit processor, is at least' twice as powerful as what is available to the public on the IBM Cloud today. This 17-qubit processor 'leverages significant materials, device, and architecture improvements', and will form the core of the first IBM Q early-access systems.

IBM Q is the company's move to build commercially-available universal quantum computing systems, for business and science applications. Systems and services will be delivered via the IBM Cloud, which the public have been using to access IBM's quantum processors for more than a year; to date, they have run more than 300,000 quantum experiments using the platform.

The company has adopted a new metric to measure the computational power of quantum computing systems, called Quantum Volume. The metric accounts for the number and quality (an important way of increasing quantum power) of qubits, circuit connectivity, and error rates of operation. The 17-qubit processor is a significant advance in Quantum Volume; and, over the coming years, IBM plans to increase the metric further, including incorporating 50- or more qubits.

Quantum computers can achieve much greater computational power than classical computers. Instead of bits made of ones and zeroes, qubits (quantum bits) can act as both a one and a zero at the same time (known as superposition'). Another difference from classic computing is entanglement', which can tell an observer how one qubit will act by observing another. Superposition and entanglement are responsible for much of the extra processing power that quantum computers can achieve.

Beta access to the 16-qubit processor is available through Github.

Excerpt from:
IBM boosts power of quantum computing processors as it lays ... - http://www.computing.co.uk

Read More..

IBM makes leap in quantum computing power – ITworld

Thank you

Your message has been sent.

There was an error emailing this page.

IBM has some new options for businesses wanting to experiment with quantum computing.

Quantum computers, when they become commercially available, are expected to vastly outperform conventional computers in a number of domains, including machine learning, cryptography and the optimization of business problems in the fields of logistics and risk analysis.

Where conventional computers deal in ones and zeros (bits) the processors in quantum computers use qubits, which can simultaneously hold the values one and zero. This -- to grossly oversimplify -- allows a quantum computer with a 5-qubit processor to perform a calculation for 32 different input values at the same time.

On Wednesday, IBM put a 16-qubit quantum computer online for IBM Cloud platform customers to experiment with, a big leap from the five-qubit machine it had previously made available. The company said that machine has already been used to conduct 300,000 quantum computing experiments by its cloud service users.

But that's not all: IBM now has a prototype 17-qubit system working in the labs, which it says offers twice the performance of the 16-qubit machine.

Quantum computing performance is hard to compare. Much depends on the "quality" of the qubits in the processor, which rely on shortlived atomic-level quantum phenomena and are thus somewhat unstable.

IBM is proposing a new measure of quantum computing performance that it calls quantum volume, which takes into account the interconnections between the cubits and the reliability of the calculations they perform.

The company's quantum computing division, IBM Q, has set its sights on producing a commercial 50-qubit quantum computer in the coming years.

Peter Sayer covers European public policy, artificial intelligence, the blockchain, and other technology breaking news for the IDG News Service.

Sponsored Links

Excerpt from:
IBM makes leap in quantum computing power - ITworld

Read More..

US playing catch-up in quantum computing – The Register-Guard

The May 14 Commentary essay, Miracle Machine needs fuel, co-authored by Alphabet executive chairman Eric Schmidt, touted quantum computing as an upcoming revolutionary technology with the capability to affect our lives in major ways, and argued that government support for its development is essential. Schmidt is correct: The time is right for a major U.S. investment in quantum computing.

Most technologies that benefit us resulted from earlier science breakthroughs, many of which were enabled by government investment. For example, the Internet was invented by university and industry scientists supported by federal government grants. When it became operational, it was supported further through infrastructure investments for many years until private corporations saw the benefit of taking it on.

Now an international race is on to see who can create the first working quantum computer and to put it to beneficial uses.

What is quantum computing, and how is it revolutionary?

A quantum computer would be able to compute answers to many important problems that no ordinary computer could handle: designing new industrial materials, determining the optimal molecular structures of pharmaceutical drugs, monitoring patterns of activity in communication networks, searching databases and other yet-to-be discovered applications.

Ordinary computers store each bit of information in the states of miniature electrical switches. A switch can be on or off to represent a bit of data. A program of switching these on and off drives a computers operation.

A quantum computer would store information in quantum switches, or qubits, which can in a sense be in the on state and the off state simultaneously. This gives quantum computers unique capabilities.

The challenges to building working quantum computers are formidable. Controlling qubits is extremely difficult because they can be disrupted by any unwanted outside influence.

Scientists have yet to create a quantum computer, but they are getting closer. They have learned how to tame qubits and entice them to perform the needed steps to carry out calculations using quantum principles.

Some leading companies, including IBM, Microsoft, Google and Intel, have begun investing in efforts to construct quantum computers. But a gap exists between the kind of trained experts the companies need and the available scientific labor pool. What is needed are quantum engineers, and industry is not in a position to train such a workforce. And, really, at this point no one has the engineering know-how to build quantum computers.

Other kinds of quantum technologies are also on the horizon. Quantum communication technologies have been invented that can promise complete security against messages being intercepted and read while in transit over the Internet. Quantum-based gravity sensors and accelerometers can be used in geo-exploration and in navigation where GPS is unavailable. And quantum magnetic-field sensors can enhance medical diagnostic technology and research.

For these reasons, I recently became involved with a wide cohort of scientists and engineers in industry, government laboratories and universities who are calling for a major national investment in developing the engineering framework and scientific workforce needed to bring quantum technologies to fruition. This would be a quantum moonshot effort, like the government-funded Human Genome Project, which now affects medical research and practice in big ways, and creates growth in the economy.

Following a meeting last fall at the White House Office of Science and Technology, some of us began working together and with professional scientific societies to encourage a major federal investment in quantum technologies, including quantum computers.

The U.S. is playing catch up, as European governments are investing around $2 billion and it is believed Chinas investment in quantum technology is moving quickly, including the launch of a quantum-enabled satellite.

It would be nice if we could leave it up to the private sector to create the first quantum computer, but there are limits to what industry can achieve on its own. Its easy to say that taxpayers shouldnt have to foot the bill for science and engineering, but in many cases these investments provide exponential returns to the people who pay for them. The Internet, GPS, medical imagers, and countless other innovations have come about thanks to federally funded basic and applied research.

Ultimately, these partnerships benefit the taxpayers, private industry and society. The same kind of successes can be had with quantum technology, but only if we commit to a race whose finish is far closer than once thought.

To hear about the development of quantum computers from one of the pioneers in the field, you can attend the free public lecture at 7 p.m. May 30 by Nobel prize-winning physicist David Wineland, in the Straub Hall auditorium on the University of Oregon campus.

Michael Raymer, a University of Oregon professor of physics, is the author of Quantum Physics: What Everyone Needs to Know.

More Guest Viewpoint articles

See the original post here:
US playing catch-up in quantum computing - The Register-Guard

Read More..

Researchers push forward quantum computing research – The … – Economic Times

San Francisco, May 21 (IANS) Stanford University electrical engineering Professor Jelena Vuckovic and colleagues at her laboratory are working on new materials that could become the basis for quantum computing.

While silicon transistors in traditional computers push electricity through devices to create digital ones and zeros, quantum computers work by isolating spinning electrons inside a new type of semiconductor material.

When a laser strikes the electron, it reveals which way it is spinning by emitting one or more quanta, or particles, of light.

Those spin states replace the ones and zeros of traditional computing.

In her studies of nearly 20 years, Vuckovic has focused on one aspect of the challenge: creating new types of quantum computer chips that would become the building blocks of future systems, Xinhua reported.

The challenge is developing materials that can trap a single, isolated electron.

To address the problem, the Stanford researchers have recently tested three different approaches, one of which can operate at room temperature, in contrast to what some of the world's leading technology companies are trying with materials super-cooled to near absolute zero, the theoretical temperature at which atoms would cease to move.

In all three cases, the researchers started with semiconductor crystals, namely materials with a regular atomic lattice like the girders of a skyscraper.

By slightly altering this lattice, they sought to create a structure in which the atomic forces exerted by the material could confine a spinning electron.

One way to create the laser-electron interaction chamber is through a structure known as a quantum dot, or a small amount of indium arsenide inside a crystal of gallium arsenide.

The atomic properties of the two materials are known to trap a spinning electron.

In a paper published in Nature Physics, Kevin Fischer, a graduate student in the Vuckovic lab, describes how the laser-electron processes can be exploited within such a quantum dot to control the input and output of light.

By sending more laser power to the quantum dot, the researchers could force it to emit exactly two photons rather than one. It has advantages over other leading quantum computing platforms but still requires cryogenic cooling.

So, the result may not be useful for general-purpose computing, but quantum dot could have applications in creating tamper-proof communications networks.

Another way to electron capture, as Vuckovic and her colleagues have investigated in two other cases, is to modify a single crystal to trap light in what is called a colour centre.

In a paper published in NanoLetters, Jingyuan Linda Zhang, a graduate student in Vuckovic's lab, described how a 16-member research team replaced some of the carbon atoms in the crystalline lattice of a diamond with silicon atoms.

The alteration created colour centres that effectively trapped spinning electrons in the diamond lattice.

Like the quantum dot, however, most diamond colour centre experiments require cryogenic cooling.

But the field is still in its early days, and the researchers aren't sure which method or methods will win out.

"We don't know yet which approach is best, so we continue to experiment," Vuckovic noted.

--IANS

qd/

See the original post here:
Researchers push forward quantum computing research - The ... - Economic Times

Read More..

Check It Out: No need to unplug after reading books on internet security – The Columbian

A A

Jan Johnston is the Collection Development Coordinator for the Fort Vancouver Regional Library District. Email her at readingforfun@fvrl.org.

Last weeks worldwide cyberattack by ransomware dubbed WannaCry (and Im sure some people did) left me feeling vulnerable once again. The malware didnt affect me personally, but still, sometimes it feels like bad stuff is creeping in closer and closer, digitally speaking. Something, somewhere is always out to hack its way into our plugged-in lives. But I dont want to give up my computer and smartphone or any other techie device I happen to use. I dont want to unplug because Im too dependent on having online access. And you know what? Thats what the hackers count on.

The question then becomes, what can the average person do to protect his or her online presence? Well, knowledge is power, so a good place to start is to visit your local library, check out some titles on computer security and internet security measures (these are library subject headings you can use to begin your search), and get informed. To help you navigate your way through the bits and bytes of information available on these topics, here is a brief reading list. Youll find it to be a mix of cyber history, practical advice and forewarning. You may not agree with Nicholas G. Carrs assessment of technology in Utopia is Creepy which the publisher describes as a freewheeling, sharp-shooting indictment of our tech-besotted culture, but it definitely is food for thought.

The Art of Invisibility: The Worlds Most Famous Hacker Teaches You How to be Safe in the Age of Big Brother and Big Data, by Kevin D. Mitnick.

Boundaries in an Overconnected World: Setting Limits to Preserve Your Focus, Privacy, Relationships, and Sanity, by Anne Katherine.

Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World, by Bruce Schneier.

Hacking Exposed: Malware and Rootkits: Security Secrets & Solutions, by Christopher C. Elisan.

Overcomplicated: Technology at the Limits of Comprehension, by Samuel Arbesman.

Rise of the Machines: A Cybernetic History, by Thomas Rid.

Utopia is Creepy: And Other Provocations, by Nicholas G. Carr.

Jan Johnston is the collection development coordinator for the Fort Vancouver Regional Library District. Email her at readingforfun@fvrl.org.

The rest is here:
Check It Out: No need to unplug after reading books on internet security - The Columbian

Read More..

Internet security firm calls for law to compel information sharing to … – The Star, Kenya

Internet security firm, ESET East Africa, is lobbying for legislation to compel private and public institutions to share information in case of a cyber security breach.

The firm says that this will help responsible branches of government businesses as well as cyber security firms stay ahead of hackers.

Due to the isolated and secretive manner in which breaches are reported in Kenya, another attack similar to WannaCryptor ransomware could be devastating if directed to critical institutions such as health, government and especially the financial services sector, ESET country manager Teddy Njoroge said.

Ministry of Information and Communications Technology CS Joe Mucheru during a Cyber Security forum on Monday said breach reporting had to be industry driven as the ICT state department has no mandate to force firms to report online crimes.

Even if we put policies and laws in place, if people do not feel confident enough to come out and actually say there has been a crime here on cyber security, by law we cant necessarily force you to report, Mucheru said.

Njoroge said that a standardized and shared reporting system would be a welcome move in developing a unified preventive or counteractive measure to cripple the growth of malware and other forms of cybercrime in the country.

Breach notification eliminates the clandestine attempts by hackers to attack systems and enables synergized efforts towards the prevention of the criminal activity as well as their prosecution, Njoroge said.

ESET recorded eight Wannacryptor attack attempts in Kenya during the period May 14 and 16 2017. In Africa, worst hit was Egypt which recorded 1,592 attempts followed by South Africa at 386 and Nigeria at 42 attempts out of the 15 countries that registered attack attempts.

Read the original post:
Internet security firm calls for law to compel information sharing to ... - The Star, Kenya

Read More..

It is critical to take the attitude that data must be protected at source. – ITProPortal

There are many encryption challenges in the tech world today, particularly as the importance of encryption as a fundamental, rather than nice to have for data security, becomes the norm for businesses. An increasing number of organisations worldwide are adopting encryption to address the growing concerns of data safety and data privacy for compliance regulations.

The prevalence of data breaches has played a huge role in this along with the growth of mobile and public cloud services becoming the norm in the enterprise IT infrastructure. For example, there have been a number of hacks that have underlined the risks of using 3rd party storage or Enterprise File Sync and Share (EFSS) solutions as either a primary storage solution for corporate data or where employees are allowed to put corporate data onto their personal accounts.

But its not just the cloud services, working with files or cloud services through unauthorised hardware such as home computers or mobile devices, increases the risks to a company of a security breach taking place. This could be a hack, or data being shared accidentally in an unencrypted format to an unauthorised person. Devices off the corporate network, and in the shadows, are not protected to the same level as those known to corporate IT, and the same is true of cloud services. They will not be subject to the same corporate, regulatory (HIPPA, SOX, PCI, etc.) policies in relation to encryption, authentication, identity and access management, threat detection, device management, or something as straightforward as password policy. The new EU General Data Protection Regulation (GDPR) set to come into force in from 25th May 2018 will place significant responsibilities and penalties on those that process, or store data related to EU citizens, regardless of the companys location in the world.

It is critical to take the attitude that data must be protected at source. This means knowing what controls are in place to control the way data moves to internal and external network resources, and how its protected in those locations. Any data that you would fear losing, or is sensitive in any way, should always be encrypted at the end point in the organisation. Taking that approach will ensure that when data leaves the organisation it is encrypted at those external end points meaning access to the files remains completely under the control of the organisation, and the centrally controlled encryption key server.

One example of where this is very valuable, is when a personal cloud service account is used by an employee, who then leaves the organisation. Without encryption the user retains access to those files, and the organisation would have no way of removing them from the cloud service, or in fact any other device. Using centrally managed encryption, the users access can be removed in the policy engine of software the user instantly loses the ability to decipher and read the encrypted files.

Data encryption is a time-tested tool that can severely hinder attackers in their goal to steal confidential user and customer data, trade secrets, and more. In addition, to the complex regulations, the increasing adoption of new technologies such as mobility, cloud and virtualisation have also found the need for encryption more than ever before.

With more organisations encrypting more and more data, the key management still remains one of the biggest challenges. The problem with encryption has always been around the management strategy, if youre working with the different platforms, such as FDE, servers, file and folder, removable media, mobile devices, cloud IaaS, and cloud EFSS you should prep your management strategy before undergoing the project. Having a unified tool that can perform the key management responsibilities and also maintain the different platforms is an essential part of not only implementation, but ensuing solid ongoing security.

There are a lot of things to think about today when managing encryption and keys. Organisations should make sure they have a product that could reach the many different platforms within their organisation; all platforms at one point in time could require encryption. In addition, organisations should make sure the product they choose can manage all the keys spanning those different platforms. Below are just some examples of the different environments in which encryption might need to be managed for a typical enterprise.

FDE (Full Disk Encryption)

o BiLocker (Take over and manage) o Software Encryption o Apple FileVault (Take over and manage) o SED (Self Encrypting Drives)

File and Folder Encryption

o SFE (Secure File Encryption) with persistence

Removable Media and Container encryption Mobile Device Encryption Cloud IaaS (Private, Hybrid, Public) o AWS o Azure o VMWare o Citrix Zen o HyperV

Cloud EFSS o Google Drive o Dropbox o OneDrive o Box

Control over your data is one of the major benefits of centralised key encryption, rather than with external service providers, such as cloud storage services. This adds yet another level of protection should a breach of usernames/passwords occur at a 3rd party cloud service provider they cant get the encryption keys.

Its easy to see how things can quickly get very complex, and why Its important that organisations enforce encryption automatically through their security policy to help avoid disaster. Encrypting at the source may not stop a hacker from gaining access to data, but it will prevent the data itself from being disclosed.

Data encryption, when executed properly, protects the sensitive information stored within any given organisation. Although there are many myths attributed to data encryption, the surprising truth of the matter is that at its core, data encryption provides a foundational piece to any data security and cloud strategy. Many companies, when asked think they are well protected from attack, but ultimately every company should expect to become the victim of a data breach, whether accidentally at the hands of a miss-sent employee email, lost device, hacktivists, or the nefarious intentions of cyber criminals. Its only by taking that attitude that well ensure we have the best protection we can in place.

Mark Hickman, Chief Operating Officer, WinMagic Image Credit: Sergey Nivens / Shutterstock

See the original post:
It is critical to take the attitude that data must be protected at source. - ITProPortal

Read More..

Manitowoc scanners go quiet with encryption – Herald Times Reporter

Manitowoc police officer Lt. Matt Wallander demonstrates the new radio Friday, May. 19, 2017, in Manitowoc, Wis. Josh Clark/USA TODAY NETWORK-Wisconsin(Photo: Josh Clark/USA TODAY NETWORK-Wisconsin)Buy Photo

MANITOWOC -For those listening in on a police scanner, radio transmissions have gone eerily quiet in Manitowoc County.

Over the past year, Manitowoc County Sheriffs Department, Manitowoc Police Department and Two Rivers Police Department have made the switch to exclusively using encrypted channels for their radio transmissions.

Sheriff Robert Hermann said the decision to switch was mainly to keep law enforcement officers safe. The encryption used in Manitowoc County is the same used for federal-level law enforcement and prevents people from hearing the chatter between officers.

OTHER NEWS:Manitowoc police search for shooting suspect

OTHER NEWS:For the Record court listings, public meetings: May 21, 2017

I can understand people like to monitor the scanners to find out what is happening in certain situations, Hermann said. However, our officers safety certainly outweighs that curiosity.

The Manitowoc County Sheriffs Department switched to encrypted communication in November while the Manitowoc Police Department has been using encrypted channels since July.

Hermann said the widespread use of smartphones and the availability of the police scanner app for anyone who has access to the internet meant more people committing crimes were able to listen in on what the officers were doing.

Manitowoc Police Chief Nick Reimer said city officers were encountering situations where someone who was trespassing or stealing had their phones out to listen to the police scanner in case officers were responding to their location.

Its really a good thing, this decision, Reimer said. It is available to us, so why not use it?We want to make sure to keep everybody safe, including our officers.

Reimer said law enforcement has had the ability to use encryption for years, and they would occasionally use it for sensitive situations. However, it did open up officers and dispatchers to confusion about whether they needed to use the encrypted channels or not, and communications were often delayed while officers switched back and forth between channels.

The whole county recently switched to using digital rather than analog signals for their communications and the switch to using encryptions came in concert with that. Reimer said communications have been stronger and clearer with the new equipment.

Reimer said he still wants to make sure the police department is as transparent as possible. He said he will be sending information to the public through press releases, social media posts and email.

We always want people to feel we are being transparent we want people to know what we do, Reimer said. But the information shared on our radios could damage our investigation if the wrong people found out.

One of the new radios used by the Manitowoc Police Department Friday, May. 19, 2017, in Manitowoc, Wis. Josh Clark/USA TODAY NETWORK-Wisconsin(Photo: Josh Clark/USA TODAY NETWORK-Wisconsin)

Law enforcement radio encryption is not a new thing. Police and sheriff's departments across the nationhave been exclusively using encrypted channels for years. The Sheboygan Police Department also recently decided to make the switch, which will take effect in November.

Not everyone is thrilled with the change. In a previous USA TODAY NETWORK-Wisconsin article, Bill Lueders, president of the Wisconsin Freedom of Information Council, said it would be a tragic decision to take information away from the public.

There are questions about police conduct and accountability that hinges on the ability of media to know, real-time, what is happening in communities in regards to police response, Lueders said. Why would the police, especially at this point in our history, demand less scrutiny and culpability? Are they trying to keep people with their cellphone cameras away? Is that what they are really after?

Alisa M. Schafer: 920-686-2105 or aschafer@gannett.com

Read or Share this story: http://htrne.ws/2qJcKA1

Read the rest here:
Manitowoc scanners go quiet with encryption - Herald Times Reporter

Read More..

Available Tools Making Dent in WannaCry Encryption – Threatpost

Tools are beginning to emerge that can be used to start the process of recovering files encrypted by WannaCry on some Windows systems.

This takes on extra urgency because today marks one week from the initial outbreak, and files encrypted during that first wave are on the clock and close to being lost forever.

Adrien Guinet, of Quarkslab, yesterday released a tool to the public called Wannakey that tries to recover one prime number from memory used to factor the RSA public key stored by the malware on the local drive. Once the public key is retrieved, it can be used to rebuild the private key and eventually, with a decryptor, recover encrypted files.

Guinet said he had some luck once hed recovered the private key to decrypt files from an infected XP machine using Benjamin Delpys WanaDecrypt tool.

I actually tried the Wanadecrypt tool. It works pretty well once youve got the private RSA key, Guinet told Threatpost. It should be noted as well that these tools put victims on the road to recovering only from the WannaCry ransomware, and that the exploit used last week to spread the malware requires the MS17-010 patch from Microsoft. WannaCry may be spread by a number of different means aside from the EternalBlue NSA exploit, including phishing emails and exploit kits.

Wannakey has some limitations to it given that it was only able work on Windows XP machines since the prime numbers are overwritten in memory on later versions of the Microsoft OS.

Delpy overcame those limitations with his Wanakiwi tool that works on Windows XP and Windows 7 machines, with the implication being that it would work on all Windows versions including Windows Server 2003, Windows Vista, Windows 8 and Windows Server 8 R2, researcher Matt Suiche said.

The available tools try to recover the prime numbers of WannaCrys RSA private key, by searching for them in the wcry executable dropped by the ransomware. Guinet said this is the process that generates the RSA private key. The prime numbers are available, he said, because the CryptReleaseContext function available through the Windows Crypto API in later versions of Windows overwrites memory wiping out the prime numbers. In XP, Guinet said, the function does not clean up memory.

Guinet admitted there is a bit of good fortune involved in recovering the prime numbers, first and foremost that the associated memory has been erased and that theyre still in memory.

His tool is very ingenious as it does not look for the actual key but the prime numbers in memory to recompute the key itself, Suiche said of Wannakey. In short, his technique is totally bad ass and super smart.

Suiche stresses that victims should not reboot their infected machines if they havent already. Suiche, who did a breakdown of the crypto implementation of WannaCry during a webinar with Kaspersky Lab this week, said today that the killswitch domain he registered is still recording infection attempts, including a spike of almost 5,000 last night from Malaysia.

In the meantime, Guinet said that WannaCry authors properly use the Windows Crypto API, and the fact the prime numbers are recoverable are more on Microsoft than an implementation error.

I think the overall cryptographic scheme is good. It could have been done differently, but it works in theory, Guinet said. When you look at the part of the codes that handle cryptography, care has been taken so that what we are trying to do does not actually work. The issue is that the MS Crypto API does not cleanup memory, and theres not much the authors could have done against that, apart from using another cryptographic library that takes care of these issues. So, IMHO, on the cryptographic part, they made a decent job.

Continued here:
Available Tools Making Dent in WannaCry Encryption - Threatpost

Read More..