Tuesday, April 5, 2016

Subgraph: the most effective operating system at the moment

It's still yet on Alpha phase but available for being downloaded, and its creators want "feedback" from the users. It's called Subgraph and it presents itself as the most safer open code operating system at the moment. We'll explain why and we'll  also talk about how to decode ransomware, a cybercriminal who is being judged and a new strategy to finish with traditional passwords.

Subgraph is an operating system created by the company with the same name, designed thinking on security, anonymity and usability, "to reduce risks on final systems, in such a way that worldwide people and organizations can communicate without fear to monitoring or interferences of sophisticated attackers". It's available to be downloaded since middle of March, but it's currently being tested, and we should consider it unsafe for now.

Decoding ransomware

We keep talking about software because ESET Spain has published an useful guide about the main tool which can decode systems encrypted by some terrible ransomware Locky, TeslaCrypt and Petya variants. It is worth taking a look to the article.


Meanwhile, on USA, the Romanian Marcel Lehel Lazar, of 44, better known as Guccifer, has his first trial day for breaking politicians, seniors officials and American actors email accounts, like George Bush, Hillary Clinton or Collin Powell and publishing their emails. He also filtered a Bush self-portrait in the bathroom.

Passwords according to context

We finish with new proposal for user authentication. The new solution, focused on the cloud, comes from CensorNet company and which proposes an authentication system via mobile devices and a second authentication factor but, as innovation, adds behaviour analysis based in the context, which allows to dynamically change the authentication level required at any particular time.

We're paying much attention to these new ideas because it's true the present password system doesn't work and it's important finding new authentication ways.


Post a Comment