Cryptography Newswire

Comprehensive Real-Time News Feed for Cryptography.

Results 1 - 20 of 2,972 in Cryptography

  1. You need to act - Heartbleed bugRead the original story

    Friday Apr 11 | Osnn.net

    Heartbleed is a security bug in the open-source OpenSSL cryptography library, widely used to implement the Internet's Transport Layer Security protocol.

    Comment?

  2. Secret Shield Encryption 1.0.0.2Read the original story

    4 hrs ago | Softpedia

    Encrypting important files may seem like a daunting task but Secret Shield Encryption has been created to prove otherwise.

    Comment?

  3. Is Data Hoarding Necessary for Lawful Surveillance?Read the original story

    5 hrs ago | The Huffington Post

    ... Americans simply trust that every FBI agent will follow this policy faithfully? The answer is still no . Modern cryptography has moved far beyond merely encrypting and decrypting data. We can now perform many computations on encrypted data, while ...

    Comment?

  4. Tech Week: Earnings, A Heartbleed Arrest And Digital DistractionRead the original story

    13 hrs ago | WNYC-AM New York

    ... He denies it and may sue. Now, a linguistic analysis points the finger at Nick Szabo, "a well known name in cryptography circles," the Journal reports. Szabo has also denied being Nakamoto. A Japanese professor has designed a high-tech version of ...

    Comment?

  5. Court rejects bankruptcy protection for Mt. GoxRead the original story

    Wednesday Apr 16 | The Southtown Star

    ... The Mt. Gox mess has been a setback to the currency's image because its boosters have promoted bitcoin's cryptography as protecting it from counterfeiting and theft. But bitcoin proponents have insisted that Mt. Gox is an isolated case. Japanese ...

    Comment?

  6. Outsmart Heartbleed? I can't even remember my passwordRead the original story

    Saturday Apr 12 | The Globe and Mail

    There's a hole in the Internet where all your passwords could be sucked out at any moment, along with your confidential information and perhaps your bank account.

    Comment?

  7. Secure protocols for accountable warrant executionRead the original story

    Wednesday Apr 2 | Freedom to Tinker

    ... warrants. Today Josh Kroll and I, with colleagues at Stanford University, released a draft paper on how to use cryptography to implement warrants to data in a secure, private, and accountable way. Our solution is a set of multi-party cryptographic ...

    Comment?

  8. NetWare Retrospective Part 2: AuthenticationRead the original story

    Jan 15, 2014 | SysAdmin1138 Events

    This is a bit of a rehash of a post I did back in 2005 , but Novell did it right when it came to handling user credentials way back in the late 80's and early 90's.

    Comment?

  9. CryptographyRead the original story

    23 hrs ago | The Free Dictionary

    Cryptography prior to the modern age was effectively synonymous with encryption , the conversion of information from a readable state to apparent nonsense .

    Comment?

  10. HMRC to sell taxpayers' financial data to private companiesRead the original story w/Photo

    23 hrs ago | Computing.co.uk

    Treasury minister David Gauke is overseeing the plans and the government insists that safeguards against the release of personal data, which will be sold to companies, research organisations and other public bodies "where there is a public benefit".

    Comment?

  11. The Best Job in America Isn't One Most High Schoolers Dream AboutRead the original story

    Friday | ESchool News

    ... are diverse and rewarding." It seems that whether you're teaching quantitative methods, developing cutting-edge cryptography methods for the NSA or analyzing trends in air traffic control or marketing, mathematicians are both in demand and pretty ...

    Comment?

  12. The Heartbleed Bug DilemmaRead the original story

    Monday Apr 14 | American Society for Quality

    ... that two-thirds of web servers were vulnerable. In a blog post about the significance of the bug, noted cryptography expert Bruce Schneier wrote: "On the scale of 1 to 10, this is an 11." Security researchers say the breach allows hackers to access ...

    Comment?

  13. Security of Infrastructure SecretsRead the original story

    Nov 9, 2013 | Destroy all Malware

    ... , use Keyczar. Keyczar is a series of libraries built to have a simple API and sane defaults. The best cryptography algorithm will always change, but Keyczar provides file formats and mechanisms for changing these defaults over the life time of an ...

    Comment?

  14. Preventing Data Breaches and HackingRead the original story w/Photo

    Friday | Examiner.com

    ... of it -- thanks to the so-called Heartbleed bug which involves a vulnerability in the open-source OpenSSL cryptography library. If data breaches and hacking can happen to the likes of Sony and Target, it can happen to virtually any business . Now ...

    Comment?

  15. Snowden Email Provider Remains in ContemptRead the original story

    Friday | Courthouse News Service

    The former email provider of National Security Agency leaker Edward Snowden should be held in contempt for trying to keep its metadata out of the government's hands, the 4th Circuit ruled.

    Comment?

  16. Layered Security Is Key to Avoiding HeartbleedRead the original story w/Photo

    Friday | Sys-Con Media

    ... versions of your OS and software, another way to protect your company's data is to deploy multiple layers of cryptography. I mentioned earlier that we use GPG in addition to SSL for data-in-transit encryption. As another example, our customers use ...

    Comment?

  17. Flipping the switchRead the original story

    Thursday | EurekAlert!

    ... desktop computer. Where they will be used, he said, is in creating fiber optical networks that use quantum cryptography, a method for encrypting communications using the laws of quantum mechanics to allow for perfectly secure communication. Such ...

    Comment?

  18. Use of Tor will make you interesting to NSARead the original story

    Aug 6, 2013 | Sandipb.net

    Just now read a rather disturbing article from Sophos security. The article describes the interpretation of the law by NSA and some of the internal policies that they use in surveillance.

    Comment?

  19. Mobile App Development: 5 Worst Security DangersRead the original story

    Friday | InformationWeek

    ... ellular or one of three 60-minute one-on-one consultations with the survey author, Michael A. Davis.] 4. Broken cryptography Many widely used cryptographic algorithms and protocols, like MD5 and SHA1,

    Comment?

  20. Trend Micro Releases Free Heartbleed Scanners for PC, MobileRead the original story w/Photo

    Friday | CNet News

    ... Chrome Web Store and Google Play app store. The Heartbleed security bug was found in the open-source OpenSSL cryptography library, which is widely used to implement the Internet's Transport Layer Security (TLS) protocol. A fixed version of OpenSSL ...

    Comment?