Bookmark

Add to MyYahoo RSS

Cryptography News

News on Cryptography continually updated from thousands of sources around the net.

23 hrs ago | Computer Weekly

Security experts identify top 10 software design flaws

Security experts at the IEEE Center for Secure Design have published a report on the top 10 software security design flaws.

Comment?

Related Topix: Science, Computer Science

Tue Aug 26, 2014

Business Wire

Allied Minds Announces the Formation of Whitewood Encryption Systems, Inc.

Whitewood aims to develop next-generation systems of data encryption that leverage advanced cryptography technologies originating from U.S. research centers.

Comment?

Related Topix: Computer Security, Science / Technology, Science, Computer Science, Los Alamos National Laboratory

Welcome to Flaphead.com

How to encrypt internal and external file systems on BlackBerry smartphones

Java based BlackBerry smartphones that support external file storage using a media card BlackBerry Device Software 4.7 to 5.0 - If the Encrypt Media Files option is set to to Yes , the BlackBerry smartphone encrypts all files that have an audio, image, or video Multipurpose Internet Mail Extensions type, excluding OMA Digital Rights Management file ... (more)

Comment?

Related Topix: Digital Rights Management, Bluetooth, Science, Computer Science

Aurora Era-Banner

Blackberry creates new division focusing on IoT, embedded software

The new division will include QNX , Project Ion , Certicom , and Paratek . Blackberry has created a new business unit called BlackBerry Technology Solutions, which will combine some of its innovative technologies including QNX, Project Ion, Paratek and Certicom along with 44,000 patents.

Comment?

Related Topix: Science, Computer Science

InfoWorld

Revoke certificates when you need to -- the right way

A secure Internet runs off the assurance of digital certificates. Revoking those certificates is often necessary, but problematic.

Comment?

Related Topix: Science, Computer Science

Mon Aug 25, 2014

MetaFilter

What's the matter with PGP?

If your cryptography predates The Fresh Prince, you need better cryptography. With recognition of the need for secure communication standards finally going mainstream, crypto researcher and Johns Hopkins University professor Matthew Green takes a hard look at the de facto standard everyone is jumping on, and suggests that we can and should do a lot ... (more)

Comment?

Related Topix: Computer Security, Science / Technology, Science, Computer Science, Black Entertainment, Will Smith, Hip-Hop

Python

credo_manager 0.2.4

Essentially, it's a credential management program written with amazon credentials in mind.

Comment?

Related Topix: Science, Computer Science

Sun Aug 24, 2014

Softpedia

Private Shell 3.3.0.3281

Autoconfiguration wizard helps you to setup basic and advanced SSH sessions. Even if you are not familiar with SSH, you can easily establish connections that use public key authentication and provide ssh tunneling for third-party applications .

Comment?

Related Topix: Science, Computer Science, Computers

Fri Aug 22, 2014

CNet News

Docker Founder Details His Plan to Secure Virtualization

Solomon Hykes started the open-source Docker project in March of 2013, and over the last year and half watched it grow into one of the most talked about new virtualization efforts in the industry.

Comment?

Related Topix: Science, Computer Science, Science / Technology, Open Source Software, Linux

PC World

How to use OpenPGP to encrypt your email messages and files in the cloud

Putting sensitive data in email messages or cloud storage should give you the heebie-jeebies , but a good dose of cryptography can give you peace of mind.

Comment?

Related Topix: Science, Computer Science, Computer Security, Science / Technology, Computers

Thu Aug 21, 2014

Noozhawk

The People Behind the Code: Best and Brightest Converge at UCSB for Cryptology Conference

A little levity to break up the seriousness: Participants dance and sing their own song to the tune of The Village People's "YMCA" at this week's CRYPTO 2014 conference at UCSB.

Comment?

Related Topix: Disco, Village People, Science, Computer Science, UC Santa Barbara, Computers

ZDNet

AWS bolsters CloudFront security

SSL uses cryptography to secure communication over Web connections. CloudFront supported the use of secure HTTPS connections, but AWS said it is adding the following: Improved performance with two features called Session Tickets and OCSP Stapling.

Comment?

Related Topix: Science / Technology, Computer Security, Science, Computer Science

Wed Aug 20, 2014

Python

cryptography 0.5.4

Our goal is for it to be your "cryptographic standard library". It supports Python 2.6-2.7, Python 3.2+, and PyPy.

Comment?

Related Topix: Science / Technology, Computer Security, Science, Computer Science

IBM

ABCs of IBM z/OS System Programming Volume 1

The ABCs of IBMA z/OSA System Programming is a 13-volume collection that provides an introduction to the z/OS operating system and the hardware architecture.

Comment?

Related Topix: Science, Computer Science

ITworld

A basic encryption strategy for storing sensitive data

A rule to live by with sensitive data is that at some point, your server will be compromised.

Comment?

Related Topix: Science, Computer Science

The Code Project

Nondeterministic Random Number Generation

I keep reading articles on the web about how all random number generators on a computer are "psuedo" random, or "deterministic".

Comment?

Related Topix: Computers, Computer Security, Science / Technology, Science, Computer Science, CPU, Startups, Intel

Business Wire

OWASP AppSec USA 2014 Adds Leading Global Experts to List of Speakers

The conference will take place at the Denver Marriott City Center, Sept. 16-19. Sept.

Comment?

Related Topix: CIO News, Science, Computer Science, Computer Security, Science / Technology

Tue Aug 19, 2014

Schneier on Security

The Security of al Qaeda Encryption Software

The web intelligence firm Recorded Future has posted two stories about how al Qaeda is using new encryption software in response to the Snowden disclosures.

Comment?

Related Topix: Computer Security, Science / Technology, Science, Computer Science

Mon Aug 18, 2014

Christian Science Monitor

Will these two new products be able to combat electronic spying?

Public concerns about the U.S. government's secretive surveillance programs exposed by Edward Snowden have spawned a slew of encryption products and privacy services that aim to make electronic spying more difficult.

Comment?

Related Topix: Google, Startups, Science, Computer Science, Blog News, Computer Security

Brandon Sun

BlackBerry forms business unit to hold patent portfolio, innovative tech assets

BlackBerry Ltd. has created a new business unit that will combine some of its most innovative technology, including QNX embedded software, Certicom cryptography applications and its patent portfolio.

Comment?

Related Topix: Science, Computer Science

•••
•••
•••
•••
•••
•••
•••