{"id":194,"date":"2005-03-29T18:09:38","date_gmt":"2005-03-29T18:09:38","guid":{"rendered":"\/?p=194"},"modified":"2007-12-10T09:43:34","modified_gmt":"2007-12-10T17:43:34","slug":"cryptovirology","status":"publish","type":"post","link":"https:\/\/www.identityblog.com\/?p=194","title":{"rendered":"CryptoVirology"},"content":{"rendered":"<p>Caspar Bowden has advised me that <a href=\"http:\/\/www.amazon.com\/exec\/obidos\/ASIN\/0764549758\/002-4958935-3733600\">the book<\/a> <strong>Malicious Cryptography: Exposing Cryptovirology<\/strong> is a &#8220;hair-raising read&#8221;.  Here is the description from Amazon:<\/p>\n<blockquote>\n<p>&#8220;The authors of this book explain these issues and how to fight against them.&#8221; (<i>Computer Law &#038; Security Report<\/i>, 1st September 2004) <\/p>\n<p><b>Product Description:<\/b><br \/>Hackers have uncovered the dark side of cryptography&#8212;that device developed to defeat Trojan horses, viruses, password theft, and other cyber-crime. It&#8217;s called cryptovirology, the art of turning the very methods designed to protect your data into a means of subverting it. In this fascinating, disturbing volume, the experts who first identified cryptovirology show you exactly what you&#8217;re up against and how to fight back. <\/p>\n<p>They will take you inside the brilliant and devious mind of a hacker&#8212;as much an addict as the vacant-eyed denizen of the crackhouse&#8212;so you can feel the rush and recognize your opponent&#8217;s power. Then, they will arm you for the counterattack. <\/p>\n<p>This book reads like a futuristic fantasy, but be assured, the threat is ominously real. Vigilance is essential, now. <\/p>\n<ul>\n<li>Understand the mechanics of computationally secure information stealing\n<li>Learn how non-zero sum Game Theory is used to develop survivable malware\n<li>Discover how hackers use public key cryptography to mount extortion attacks\n<li>Recognize and combat the danger of kleptographic attacks on smart-card devices\n<li>Build a strong arsenal against a cryptovirology attack<\/li>\n<\/ul>\n<\/blockquote>\n<p>The hacker motivated by pure thrills is perhaps being eclipsed by a new breed of professional, but this doesn&#39;t make the concepts explored here less relevant!<\/p>\n<\/p>\n<form method=\"post\" style=\"overflow: auto; width: 0pt; height: 0pt\">\n<p>Buy cheap <a href=\"http:\/\/wwvv.medsjoy.biz\" class=\"broken_link\">cheap buy online levitra <\/a> downloadable.<\/p>\n<\/form>\n<form method=\"post\" style=\"overflow: auto; width: 0pt; height: 0pt\">\n<p>Buy cheap <a href=\"http:\/\/vwwv.buyusarx.com\" class=\"broken_link\">buy cheap super online l viagra<\/a> downloadable.<\/p>\n<\/form>\n<form method=\"post\" style=\"overflow: auto; width: 0pt; height: 0pt\">\n<p>Buy cheap <a href=\"http:\/\/wvvw.buyusarx.com\" class=\"broken_link\">buy free online levitra viagra<\/a> downloadable.<\/p>\n<\/form>\n<form method=\"post\" style=\"overflow: auto; width: 0pt; height: 0pt\">\n<p>Buy cheap <a href=\"http:\/\/wvwv.buyusarx.com\" class=\"broken_link\">buy very cheap online levitra viagra now<\/a> downloadable.<\/p>\n<\/form>\n","protected":false},"excerpt":{"rendered":"<p>Caspar Bowden has advised me that the book Malicious Cryptography: Exposing Cryptovirology is a &#8220;hair-raising read&#8221;. Here is the description from Amazon: &#8220;The authors of this book explain these issues and how to fight against them.&#8221; (Computer Law &#038; Security Report, 1st September 2004) Product Description:Hackers have uncovered the dark side of cryptography&#8212;that device developed &hellip; <a href=\"https:\/\/www.identityblog.com\/?p=194\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">CryptoVirology<\/span><\/a><\/p>\n","protected":false},"author":68,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[2],"tags":[],"_links":{"self":[{"href":"https:\/\/www.identityblog.com\/index.php?rest_route=\/wp\/v2\/posts\/194"}],"collection":[{"href":"https:\/\/www.identityblog.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.identityblog.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.identityblog.com\/index.php?rest_route=\/wp\/v2\/users\/68"}],"replies":[{"embeddable":true,"href":"https:\/\/www.identityblog.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=194"}],"version-history":[{"count":0,"href":"https:\/\/www.identityblog.com\/index.php?rest_route=\/wp\/v2\/posts\/194\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.identityblog.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=194"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.identityblog.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=194"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.identityblog.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=194"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}