Cryptography Newswire

Comprehensive Real-Time News Feed for Cryptography.

Results 1 - 20 of 1,494 in Cryptography

  1. Digital currency lawsuits: Bitcoin scrambles to boost consumer confidenceRead the original story w/Photo

    4 hrs ago | Christian Science Monitor

    ... processing fees," Coinbase said. "I actually believe that we are moving toward a system in the future in which cryptography and decentralization will become incredibly important," says Professor Harvey. Whether bitcoin or some other form of digital ...

    Comment?

  2. Attackers can easily create dangerous file-encrypting malware, new threat suggestsRead the original story

    7 hrs ago | ComputerWorld

    ... the affected files, they need the private key, which the malware author owns," Itabashi said. In public-key cryptography, which OpenPGP is based on, users generate a pair of associated keys, one that is made public and one that is kept private. ...

    Comment?

  3. Read the original story

    7 hrs ago | Oracle

    The solution is to import the LDAP server's public key into UCM Java's default keystore in $JAVA_HOME/jre/lib/security/cacerts file using $JAVA_HOME/bin/keytool command 1. In Linux or Unix, if not already set, add write permissions to the /jre/lib/security/cacerts file Note: The command must be all on one line, must match the server's JVM version, ... (more)

    Comment?

  4. U.S. Court Orders Microsoft to Hand Over Cloud Data Located in IrelandRead the original story

    10 hrs ago | DevX

    ... anies wish to regain the trust of their global customers, they must embrace security technologies such as cloud cryptography which can provide real privacy protections where the law does not."

    Comment?

  5. Attackers can easily create dangerous file-encrypting malware, new threatRead the original story

    12 hrs ago | CIO

    ... the affected files, they need the private key, which the malware author owns," Itabashi said. In public-key cryptography, which OpenPGP is based on, users generate a pair of associated keys, one that is made public and one that is kept private. ...

    Comment?

  6. Debian: 2994-1: nss: SummaryRead the original story

    Thursday | LinuxSecurity.com

    Debian Security Advisory DSA-2994-1 security@debian.org http://www.debian.org/security/ Raphael Geissert July 31, 2014 http://www.debian.org/security/faq - Package : nss CVE ID : CVE-2013-1741 CVE-2013-5606 CVE-2014-1491 CVE-2014-1492 Several vulnerabilities have been ... (more)

    Comment?

  7. UCLA Engineering to lead new NSF-funded cybersecurity research centerRead the original story

    Thursday | PressReleasePoint

    ... for someone to keep a secret if an adversary can see how every neuron in her brain behaves," Sahai said. "In cryptography, traditionally we have modeled the world as divided into friends, with whom we want to share our secrets, and enemies. But what ...

    Comment?

  8. If only it was 2009: BlackBerry releases a BBM app for Windows PhoneRead the original story w/Photo

    Thursday | GigaOM

    ... Earlier this summer, BlackBerry released a version of BBM that meets stringent U.S. government requirements for cryptography. The paid service, eBBM Suite , is not the consumer-focused BBM available on Windows Phone, but BlackBerry plans to port it ...

    Comment?

  9. ASPG Expands International Reach with Representation in the United...Read the original story w/Photo

    Thursday | PRWeb

    ... will offer the full line of ASPG software solutions, including flagship products such as MegaCryption for z/OS cryptography, ReACT for self-service password reset, and ERQ for RACF administration and reporting. Inspired Solutions Ltd. is a ...

    Comment?

  10. AES encryption envelope and Xamarin PCLRead the original story

    Thursday | Patrick Kerpan

    Recently I've been asked a question about how the AES encryption envelope can be used with a PCL build of Data Abstract, the issue being that PCL doesn't expose the needed cryptography API.

    Comment?

  11. JackPair Lets You Encrypt Voice Calls Whatever Phone You're UsingRead the original story w/Photo

    Thursday | TechCrunch

    It's no surprise that pro-privacy tech has risen up the agenda since NSA whistleblower Edward Snowden revealed the vast extent of government agencies' surveillance programs.

    Comment?

  12. Patent Issued for Method and System for Directed Call Establishment...Read the original story

    Thursday | Hispanic Business

    Ease of use and convenience contribute to this rapid growth. Internet banking allows customers to satisfy their banking needs anytime and anywhere that Internet access is available.

    Comment?

  13. Patent Application Titled 'Secure Online Distributed Data Storage Services' Published OnlineRead the original story

    Thursday | Hispanic Business

    However, considerable skepticism exists regarding security, integrity and confidentiality of data in cloud-based storage.

    Comment?

  14. More organisations demand business partners meet international...Read the original story w/Photo

    Thursday | PRWeb

    ... it easier to integrate multiple management system standards, and specific controls have also been added around cryptography and security in supplier relationships.

    Comment?

  15. Encrypted Andriod Smart Phone TechnologyRead the original story

    Thursday | PR Log

    ... standard. It is stipulated by National Institute of Standards and Technology (NIST). A RSAi1 4sAn algorithm for cryptography. CEN-02 adopts RSA-2048, the length of the code is 2048 binary. A CCi1 4sCommon Criteria, stipulated by National Information ...

    Comment?

  16. 2 CMU experts said to unmask surfing softwareRead the original story

    Wednesday | Post-gazette.com

    Two Carnegie Mellon University researchers may have removed the veil of secrecy from the Tor Project, a free software program that allows users to anonymously surf the Internet.

    Comment?

  17. Cigital Releases One Hundredth Episode of The Silver Bullet Security Podcast with Dr. Gary McGrawRead the original story

    Wednesday | Hispanic Business

    Joining McGraw to discuss the top security topics within the industry, guests have included computer security guru and computer security expert and columnist Mikko Hypponen.

    Comment?

  18. NSA sued over fears that former director is selling secretsRead the original story w/Photo

    Wednesday Jul 30 | Russia Taday

    The National Security Agency has received its fair share of lawsuits since former contractor Edward Snowden began to disclose secret documents last year, and now the NSA is being taken to court for failing to produce files about its former director.

    Comment?

  19. States Debate Regulating Digital CurrencyRead the original story

    Wednesday Jul 30 | Clarks Hometown News Patriot

    ... Litecoin and Peercoin. All are examples of cryptocurrencies, a subset of digital currencies that rely on cryptography to function. Many of the headlines generated by bitcoin and other digital currencies to date have focused on problems with the ...

    Comment?

  20. Signal: An App That Brings Free, Encrypted Phone Calls To Your iPhoneRead the original story w/Photo

    Wednesday Jul 30 | Fast Company

    Open Whisper Systems, a company specializing in communications tools, has just put out an iOS app that promises users free, encrypted phone calls from anywhere in the world.

    Comment?