23 hrs ago
Security experts identify top 10 software design flaws
Security experts at the IEEE Center for Secure Design have published a report on the top 10 software security design flaws.
Tue Aug 26, 2014
Allied Minds Announces the Formation of Whitewood Encryption Systems, Inc.
Whitewood aims to develop next-generation systems of data encryption that leverage advanced cryptography technologies originating from U.S. research centers.
Welcome to Flaphead.com
How to encrypt internal and external file systems on BlackBerry smartphones
Java based BlackBerry smartphones that support external file storage using a media card BlackBerry Device Software 4.7 to 5.0 - If the Encrypt Media Files option is set to to Yes , the BlackBerry smartphone encrypts all files that have an audio, image, or video Multipurpose Internet Mail Extensions type, excluding OMA Digital Rights Management file ... (more)
Blackberry creates new division focusing on IoT, embedded software
The new division will include QNX , Project Ion , Certicom , and Paratek . Blackberry has created a new business unit called BlackBerry Technology Solutions, which will combine some of its innovative technologies including QNX, Project Ion, Paratek and Certicom along with 44,000 patents.
Revoke certificates when you need to -- the right way
A secure Internet runs off the assurance of digital certificates. Revoking those certificates is often necessary, but problematic.
Mon Aug 25, 2014
What's the matter with PGP?
If your cryptography predates The Fresh Prince, you need better cryptography. With recognition of the need for secure communication standards finally going mainstream, crypto researcher and Johns Hopkins University professor Matthew Green takes a hard look at the de facto standard everyone is jumping on, and suggests that we can and should do a lot ... (more)
Essentially, it's a credential management program written with amazon credentials in mind.
Sun Aug 24, 2014
Private Shell 126.96.36.19981
Autoconfiguration wizard helps you to setup basic and advanced SSH sessions. Even if you are not familiar with SSH, you can easily establish connections that use public key authentication and provide ssh tunneling for third-party applications .
Fri Aug 22, 2014
Docker Founder Details His Plan to Secure Virtualization
Solomon Hykes started the open-source Docker project in March of 2013, and over the last year and half watched it grow into one of the most talked about new virtualization efforts in the industry.
How to use OpenPGP to encrypt your email messages and files in the cloud
Putting sensitive data in email messages or cloud storage should give you the heebie-jeebies , but a good dose of cryptography can give you peace of mind.
Thu Aug 21, 2014
The People Behind the Code: Best and Brightest Converge at UCSB for Cryptology Conference
A little levity to break up the seriousness: Participants dance and sing their own song to the tune of The Village People's "YMCA" at this week's CRYPTO 2014 conference at UCSB.
AWS bolsters CloudFront security
SSL uses cryptography to secure communication over Web connections. CloudFront supported the use of secure HTTPS connections, but AWS said it is adding the following: Improved performance with two features called Session Tickets and OCSP Stapling.
Wed Aug 20, 2014
Our goal is for it to be your "cryptographic standard library". It supports Python 2.6-2.7, Python 3.2+, and PyPy.
ABCs of IBM z/OS System Programming Volume 1
The ABCs of IBMA z/OSA System Programming is a 13-volume collection that provides an introduction to the z/OS operating system and the hardware architecture.
A basic encryption strategy for storing sensitive data
A rule to live by with sensitive data is that at some point, your server will be compromised.
The Code Project
Nondeterministic Random Number Generation
I keep reading articles on the web about how all random number generators on a computer are "psuedo" random, or "deterministic".
OWASP AppSec USA 2014 Adds Leading Global Experts to List of Speakers
The conference will take place at the Denver Marriott City Center, Sept. 16-19. Sept.
Tue Aug 19, 2014
Schneier on Security
The Security of al Qaeda Encryption Software
The web intelligence firm Recorded Future has posted two stories about how al Qaeda is using new encryption software in response to the Snowden disclosures.
Mon Aug 18, 2014
Christian Science Monitor
Will these two new products be able to combat electronic spying?
Public concerns about the U.S. government's secretive surveillance programs exposed by Edward Snowden have spawned a slew of encryption products and privacy services that aim to make electronic spying more difficult.
BlackBerry forms business unit to hold patent portfolio, innovative tech assets
BlackBerry Ltd. has created a new business unit that will combine some of its most innovative technology, including QNX embedded software, Certicom cryptography applications and its patent portfolio.