NIST Site Search
Search NIST.GOV
Custom Search
[Official NIST.GOV TIME]
Product Research

Advertise on this site
Search NIST IT Security
Search For:   Enhanced Query Form
Search In:
 
Results 1 - 1 of 1 in Content
bullet NIST FIPS 140-2
...dules to Federal Information Processing Standard (FIPS) 140-2 and other cryptography based standards. Download the complete NIST FIPS 140-2. Plea...
Posted on Wednesday 15 November 2006 - 20:44:06 in Federal Information Processing Standards (FIPS)

bullet NIST FIPS 197 - Advanced Encryption Standard (AES)
NIST announced the approval of FIPS 197 Advance Encryption Standard (AES) November 2001. AES specifies the Rijndael encryption algorithm as a FIPS-ap...
Posted on Saturday 21 January 2006 - 22:00:00 in Federal Information Processing Standards (FIPS)

bullet NIST SP 800-73 Interfaces for Personal Identity Verification
...ors, Federal Information Processing Standard 201 (FIPS 201) was developed to establish standards for identity credentials. This document, Special Publ...
Posted on Monday 06 February 2006 - 22:00:00 in Special Publications - SP 800 series

bullet NIST FIPS 201 Personal Identity Verification (PIV)
...t information systems. Download the complete NIST FIPS 201 Please use the NIST.org Forum to ask questions or discuss this document. The belo...
Posted on Monday 06 February 2006 - 22:00:00 in Federal Information Processing Standards (FIPS)

bullet Federal Information Processing Standards (FIPS)
With the passage of the Federal Information Security Management Act (FISMA) of 2002 all Federal Information Processing Standards (FIPS) are now manda...
Posted on Sunday 22 January 2006 - 16:44:21 in NIST.gov Publications

bullet Guide to NIST Computer Security Documents
In order to make NIST information security documents more accessible, especially to those just entering the security field or with limited needs for t...
Posted on Monday 30 April 2007 - 19:58:26 in NIST.gov Publications

bullet Announcing the Release of Special Publication 800-78-3
...key exponents with FIPS 186-3 and 2) to permit the use of SHA-1 after 12/31/2010 when signing revocation information, under limited circumstances.
Posted on Saturday 03 December 2011 - 14:17:00 in NIST Computer Security Division News

bullet NIST SP 800-48 Revision 1, Wireless Network Security for IEEE 802.11a/b/g and Bluetooth
...port for Federal Information Processing Standard (FIPS) validated cryptographic algorithms. Therefore, NIST recommends that organizations with existin...
Posted on Tuesday 07 August 2007 - 22:00:00 in Draft Special Publications (SP) 800 Documents

bullet NIST SP 800-78 Cryptographic Algorithms and Key Sizes for Personal Identity Verification
...es for PIV systems and is a companion document to FIPS 201. Download the entire NIST SP 800-78 PDF You may use the NIST.org Forum to ask question...
Posted on Monday 06 February 2006 - 22:00:00 in Special Publications - SP 800 series

bullet Important HSPD-12 Documents and Links
... how to implement it *OMB Memorandum M-05-24 *FIPS 140-2 *FIPS 201 NIST Special Publictions *NIST SP 800-73 *NIST SP 800-76 *NIST...
Posted on Sunday 05 February 2006 - 22:00:00 in HSPD-12

Results in Links
No matches found
Results 1 - 10 of 20 in News
bullet GSA Awards Large Contracts for 10 Encryption Products
... “data at rest”. All 10 products use NIST.gov FIPS 140-2 validated encryption modules. You will be hearing much more about these products in the c...
Posted on Wednesday 20 June 2007 - 22:52:35

bullet Evidence that Encrypting Data is the Easy Part
...a, classified, data, top, secret, key, truecrypt, fips, 140-2, fbi, keylogger, chi, mak, tai, security, china, aes, aes256, aes128, blowfish, CAST5, s...
Posted on Friday 25 May 2007 - 15:27:08

bullet NIST.gov releases RFID Security Publication and a NIST Security Table of Contents
..., sp, special, publication, table, contents, 800, fips@@@ NIST.gov has released NIST Special Publication (SP) 800-98, Guidelines for Securing Ra...
Posted on Tuesday 01 May 2007 - 05:56:20

bullet U.S. Government Agencies Banning Microsoft Vista
...curity, moratorium, nist, gov, dot, faa, federal, fips, aviation, administration, office, 2007, google, apps, ocio@@@ In what turning out to be...
Posted on Tuesday 13 March 2007 - 21:56:36

bullet NSA Posts Notice on ‘Suite B’ encryption
...ough the Federal Information Processing Standard (FIPS) 201 for identity cards makes no specific reference to it, said Brendan Ziolo, marketing direct...
Posted on Monday 12 December 2005 - 22:39:27

bullet FISMA guidance nearly complete
...ct, guidance, guidelines, compliance, omb, a-130, fips, 200, standard, processing, requirement@@@ The publication, titled “Guide for Assessing...
Posted on Thursday 01 December 2005 - 04:25:48

bullet NIST to set up Web site for products being FIPS-201-tested
NIST.GOV will be posting test results vendor smart cards and readers to see whether they conform to Federal Information Processing Standard-201 and NI...
Posted on Wednesday 30 November 2005 - 15:50:12

bullet NIST.gov releases draft of Wireless Network Security for IEEE 802.11a/b/g and Bluetooth
...tute, standards, ieee, access point, adhoc, WPAN, fips, encryption, wpan, wlan, wman, wwan@@@ Draft SP 800-48 Revision 1 provides an overview of...
Posted on Wednesday 08 August 2007 - 06:17:10

bullet News Release - LogLogic Announces FISMA Control and Compliance Suite Based On NIST For Government Organizations
...s - the Federal Information Processing Standards (FIPS), the National Institute of Standards and Technology (NIST) "Recommended Security Controls for ...
Posted on Sunday 13 May 2007 - 15:19:25

bullet SANS.org SOHO Backups and Encryption article
...ould be mentioned, though TrueCrypt offers a NIST FIPS approved algorithm (AES) the application is not on the NIST.gov Advanced Encryption Standard Al...
Posted on Monday 11 September 2006 - 17:05:55

Go to page       >>  
Results in Forum
No matches found
Results in Comments
No matches found
Results in Other Pages
No matches found
Translate to: French German Italian Spanish Portuguese GTM_LAN_DUTCH Russian Chinese Arabic Korean English
Google Ads




Headlines

»CVE-2015-1339 (linux_kernel)
Memory leak in the cuse_channel_release function in fs/fuse/cuse.c in the Linux kernel before 4.4 al ...
»CVE-2015-5370 (samba)
Samba 3.x and 4.x before 4.2.11, 4.3.x before 4.3.8, and 4.4.x before 4.4.2 does not properly implem ...
»CVE-2015-7515 (linux_kernel)
The aiptek_probe function in drivers/input/tablet/aiptek.c in the Linux kernel before 4.4 allows phy ...
»CVE-2015-8812
drivers/infiniband/hw/cxgb3/iwch_cm.c in the Linux kernel before 4.5 does not properly identify erro ...
»CVE-2015-8816
The hub_activate function in drivers/usb/core/hub.c in the Linux kernel before 4.3.5 does not proper ...
»CVE-2015-8844
The signal implementation in the Linux kernel before 4.3.5 on powerpc platforms does not check for a ...
»CVE-2015-8845
The tm_reclaim_thread function in arch/powerpc/kernel/process.c in the Linux kernel before 4.4.1 on ...
»CVE-2015-8852
Varnish 3.x before 3.0.7, when used in certain stacked installations, allows remote attackers to inj ...
»CVE-2016-0211
IBM DB2 9.7 through FP11, 9.8, 10.1 through FP5, and 10.5 through FP7 on Linux, UNIX, and Windows al ...
»CVE-2016-0774
The (1) pipe_read and (2) pipe_write implementations in fs/pipe.c in a certain Linux kernel backport ...
»CVE-2016-1185
The Cybozu kintone mobile application 1.x before 1.0.6 for Android allows attackers to discover an a ...
»CVE-2016-1202
Untrusted search path vulnerability in Atom Electron before 0.33.5 allows local users to gain privil ...
»CVE-2016-1205
Cross-site scripting (XSS) vulnerability in the shiro8 (1) category_freearea_ addition_plugin plugin ...
»CVE-2016-1386
The API in Cisco Application Policy Infrastructure Controller Enterprise Module (APIC-EM) 1.0(1) all ...
»CVE-2016-1389
Open redirect vulnerability in Cisco WebEx Meetings Server (CWMS) 2.6 allows remote attackers to red ...


Date published: 2016-04-29T04:50:00Z
Details

»Google Releases Security Update for Chrome
Original release date: April 28, 2016 Google has released Chrome version 50.0.2661.94 to addr ...
»Mozilla Releases Security Updates
Original release date: April 26, 2016 Mozilla has released security updates to address multip ...
»FTC Releases Alert on Earthquake Disaster Email Scams
Original release date: April 20, 2016 The Federal Trade Commission (FTC) has released an aler ...
»Cisco Releases Security Updates
Original release date: April 20, 2016 Cisco has released security updates to address vulnerab ...
»Oracle Releases Security Bulletin
Original release date: April 19, 2016 Oracle has released its Critical Patch Update for April ...
»Symantec Releases Security Updates
Original release date: April 19, 2016 Symantec has released security updates to address vulne ...
»VMWare Releases Security Updates
Original release date: April 14, 2016 VMware has released security updates to address a vulne ...
»IRS Warns Taxpayers About Scams as Tax Deadline Approaches
Original release date: April 13, 2016 The Internal Revenue Service (IRS) has issued a press r ...
»Google Releases Security Update for Chrome
Original release date: April 13, 2016 Google has released Chrome version 50.0.2661.75 to addr ...
»Cisco Releases Security Update
Original release date: April 13, 2016 Cisco has released a security update to address a vulne ...


Date published: not known
Details

»Paper: How It Works: Steganography Hides Malware in Image Files
A new paper by CYREN researcher Lordian Mosuela takes a close look ...
»Paying a malware ransom is bad, but telling people to never do it is unhelpful advice
The current ransomware plague is one of the worst threats the Inter ...
»VB2015 paper: VolatilityBot: Malicious Code Extraction Made by and for Security Researchers
In his VB2015 paper, Martin Korman presented his 'VolatilyBot' tool ...
»VB2016 programme announced, registration opened
We have announced 37 papers (and four reserve papers) that will be ...
»New tool helps ransomware victims indentify the malware family
The people behind the MalwareHunterTeam have released a tool that h ...
»It's fine for vulnerabilities to have names — we just need not to take them too seriously
The PR campaign around the Badlock vulnerability backfired when it ...
»Blog Throwback Thursday: The Number of the Beasts
The Virus Bulletin Virus Prevalence Table, which ran from 1992 unti ...
»Paper: All Your Meetings Are Belong to Us: Remote Code Execution in Apache OpenMeetings
Security researcher Andreas Lindh recently found a vulnerability in ...
»Throwback Thursday: 'In the Beginning was the Word...'
Word and Excel’s internal file formats used to be something in whic ...


Date published: not known
Details
Main Menu
· Home
Current Security News
 
US-CERT Current Activity

» Google Releases Security Update for Chrome
[28 Apr 2016 06:31pm]

» Mozilla Releases Security Updates
[26 Apr 2016 12:53pm]

» FTC Releases Alert on Earthquake Disaster Email Scams
[20 Apr 2016 03:05pm]

» Cisco Releases Security Updates
[20 Apr 2016 11:12am]

» Oracle Releases Security Bulletin
[19 Apr 2016 02:33pm]

» Symantec Releases Security Updates
[19 Apr 2016 11:30am]

» VMWare Releases Security Updates
[14 Apr 2016 07:08pm]

» IRS Warns Taxpayers About Scams as Tax Deadline Approaches
[13 Apr 2016 04:42pm]

» Google Releases Security Update for Chrome
[13 Apr 2016 03:18pm]

» Cisco Releases Security Update
[13 Apr 2016 11:50am]

***
US-CERT Alerts

» TA16-105A: Apple Ends Support for QuickTime for Windows; New Vulnerabilities Announced
[14 Apr 2016 01:48pm]

» TA16-091A: Ransomware and Recent Variants
[31 Mar 2016 04:00pm]

» TA15-337A: Dorkbot
[03 Dec 2015 04:40pm]

» TA15-314A: Compromised Web Servers and Web Shells - Threat Awareness and Guidance
[10 Nov 2015 06:12pm]

» TA15-286A: Dridex P2P Malware
[13 Oct 2015 05:23am]

» TA15-240A: Controlling Outbound DNS Access
[28 Aug 2015 11:31am]

» TA15-213A: Recent Email Phishing Campaigns – Mitigation and Response Recommendations
[01 Aug 2015 04:01pm]

» TA15-195A: Adobe Flash and Microsoft Windows Vulnerabilities
[14 Jul 2015 05:13pm]

» TA15-120A: Securing End-to-End Communications
[29 Apr 2015 10:00pm]

» TA15-119A: Top 30 Targeted High Risk Vulnerabilities
[28 Apr 2015 10:00pm]

***
Computerworld Security

» Phishing apps posing as popular payment services infiltrate Google Play
[29 Apr 2016 09:44am]

» Toy maker's website pushed growing ransomware threat
[29 Apr 2016 08:43am]

» Supreme Court approves rule change that expands FBI computer search powers
[29 Apr 2016 04:14am]

» Devs leak Slack access tokens on GitHub, put sensitive business data at risk
[28 Apr 2016 11:53am]

» Estonian man gets 7 years in prison for role in global DNS hijacking botnet
[28 Apr 2016 09:58am]

» ISIS' cyberattack abilities remain unorganized and underfunded -- for now
[28 Apr 2016 09:16am]

» The post-acquisition blues
[28 Apr 2016 07:32am]

» FBI confirms it won't tell Apple how it unlocked terrorist's iPhone
[28 Apr 2016 07:24am]

» House unanimously passes bill to protect email and cloud privacy
[27 Apr 2016 01:50pm]

» IDG Contributor Network: The Humble Hacker’s Book Bundle
[27 Apr 2016 12:00pm]

» Most breaches are still caused by PEBKAC and ID10T errors like falling for phishing
[27 Apr 2016 09:44am]

» Group uses Windows hotpatching method for malware
[27 Apr 2016 07:45am]

» Report says criminals are better communicators than IT staffers
[26 Apr 2016 02:17pm]

» SWIFT banking network warns customers of cyberfraud cases
[26 Apr 2016 10:14am]

» Empty DDoS threats deliver $100K to extortion group
[26 Apr 2016 08:35am]

***
Microsoft Security Advisories

» 3152550 - Update to Improve Wireless Mouse Input Filtering - Version: 1.1
[22 Apr 2016 01:00am]

» 3137909 - Vulnerabilities in ASP.NET Templates Could Allow Tampering - Version: 1.1
[10 Feb 2016 12:00am]

» 2871997 - Update to Improve Credentials Protection and Management - Version: 5.0
[09 Feb 2016 12:00am]

» 3123479 - Deprecation of SHA-1 Hashing Algorithm for Microsoft Root Certificate Program - Version: 1.0
[12 Jan 2016 12:00am]

» 3109853 - Update to Improve TLS Session Resumption Interoperability - Version: 1.0
[12 Jan 2016 12:00am]

» 3118753 - Updates for ActiveX Kill Bits 3118753 - Version: 1.0
[12 Jan 2016 12:00am]

» 2755801 - Update for Vulnerabilities in Adobe Flash Player in Internet Explorer and Microsoft Edge - Version: 53.0
[05 Jan 2016 12:00am]

» 3057154 - Update to Harden Use of DES Encryption - Version: 1.1
[08 Dec 2015 12:00am]

» 3123040 - Inadvertently Disclosed Digital Certificate Could Allow Spoofing - Version: 1.0
[08 Dec 2015 12:00am]

» 3119884 - Inadvertently Disclosed Digital Certificates Could Allow Spoofing - Version: 1.0
[30 Nov 2015 12:00am]

» 3108638 - Update for Windows Hyper-V to Address CPU Weakness - Version: 1.0
[10 Nov 2015 12:00am]

» 3097966 - Inadvertently Disclosed Digital Certificates Could Allow Spoofing - Version: 2.0
[13 Oct 2015 01:00am]

» 2960358 - Update for Disabling RC4 in .NET TLS - Version: 2.0
[13 Oct 2015 01:00am]

» 3042058 - Update to Default Cipher Suite Priority Order - Version: 1.1
[13 Oct 2015 01:00am]

» 3083992 - Update to Improve AppLocker Publisher Rule Enforcement - Version: 1.0
[08 Sep 2015 01:00am]

***
WIRED

» We’re Going HTTPS: Here’s How WIRED Is Tackling a Huge Security Upgrade
[28 Apr 2016 10:00am]

» The Critical Hole at the Heart of Our Cell Phone Networks
[28 Apr 2016 05:00am]

» Hacker Lexicon: What Is HTTPS?
[27 Apr 2016 08:00am]

» Two Tips to Keep Your Phone’s Encrypted Messages Encrypted
[26 Apr 2016 07:00am]

» Hack Brief: Site for ‘Beautiful’ People Suffers Ugly Million-Member Breach
[25 Apr 2016 12:38pm]

» Security This Week: If You Sue Ashley Madison, You’ll Have to Use Your Real Name
[23 Apr 2016 05:00am]

» The Ingenious Way Iranians Are Using Satellite TV to Beam in Banned Internet
[22 Apr 2016 05:00am]

» FBI Hints It Paid Hackers $1 Million to Get Into San Bernardino iPhone
[21 Apr 2016 02:26pm]

» Of Course Congress Is Clueless About Tech—It Killed Its Tutor
[21 Apr 2016 05:00am]

» Google’s New YouTube Analysis App Crowdsources War Reporting
[20 Apr 2016 08:17am]

***
Network World Security

» FBI: Ransomware threat at all-time high; how to protect company jewels
[29 Apr 2016 10:56am]

» IBM offers advice on how to secure blockchain in the cloud
[29 Apr 2016 09:07am]

» Toy maker Maisto’s website pushed growing CryptXXX ransomware threat
[29 Apr 2016 08:19am]

» Got ransomware? These tools may help
[29 Apr 2016 08:02am]

» What users love (and hate) about 4 leading firewall solutions
[25 Apr 2016 01:48pm]

» 10 no-cost home security mobile apps worth a download
[01 Apr 2016 06:39am]

» 7 VPN services for hotspot protection
[14 Mar 2016 04:00am]

» Review: Consider VPN services for hotspot protection
[14 Mar 2016 04:00am]

» Review: 5 application security testing tools compared
[01 Mar 2016 01:29pm]

» Skyport eases the pain of deploying and securing remote servers
[29 Feb 2016 04:00am]

» Review: 8 password managers for Windows, Mac OS X, iOS, and Android
[24 Feb 2016 05:58am]

» What users love (and hate) about 4 leading identity management tools
[22 Feb 2016 06:52am]

» REVIEW: Cyphort makes advanced threat protection easier than ever
[25 Jan 2016 04:00am]

» IBM offers advice on how to secure blockchain in the cloud
[29 Apr 2016 09:07am]

» Toy maker Maisto’s website pushed growing CryptXXX ransomware threat
[29 Apr 2016 08:19am]

***


More IT Security
News Feeds
More Sponsors

Advertise on this site
RSS Feeds
Our news can be syndicated by using these rss feeds.
rss1.0
rss2.0
rdf
Symantec News
Welcome
Username:

Password:


Remember me

[ ]

NIST.org is in no way connected to the U.S. government site NIST.gov

This site is © John Herron, CISSP. All Rights Reserved.

Please visit daily to stay up to date on all your IT Security compliance issues.

http://www.nist.org -
Hosted by BlueHost. We've never had a better hosting company.
{THEMEDISCLAIMER}