Cryptography Newswire

Comprehensive Real-Time News Feed for Cryptography.

Results 1 - 20 of 1,720 in Cryptography

  1. A first glimpse inside a macroscopic quantum stateRead the original story w/Photo

    2 hrs ago | EurekAlert!

    ... and the same light power. It can also be used to distribute secret keys to two distant parties through quantum cryptography. Although it has long been believed that many macroscopic phenomena are caused by large-scale entanglement, up to now, this ...

    Comment?

  2. Noose around Internet's TLS system tightens with 2 new decryption attacksRead the original story w/Photo

    5 hrs ago | Ars Technica

    The noose around the neck of the Internet's most widely used encryption scheme got a little tighter this month with the disclosure of two new attacks that can retrieve passwords, credit card numbers and other sensitive data from some transmissions protected by secure sockets layer and transport layer security protocols. Both attacks work against the RC4 stream cipher , which is estimated to encrypt about 30 percent of today's TLS traffic.

    Comment?

  3. Westlake man accused of sexually abusing underage girls writes encrypted letter detailing...Read the original story w/Photo

    9 hrs ago | Cleveland.com

    A 38-year-old Westlake man jailed on charges of sexually abusing minors and creating child pornography wrote an encrypted letter to his mother this week asking for help to escape. William Waters III is facing a 102-count indictment.

    Comment?

  4. Afilias Supports the CrypTech Project - The Most Ambitious Hardware...Read the original story

    11 hrs ago | Information Technology

    ... said: "The CrypTech project is among the most ambitious and collaborative efforts to date in improving hardware cryptography and broadening its application, impacting the entire Internet community. Because the CrypTech Project is an open engine, ...

    Comment?

  5. Can Bitcoin Be Hacked?Read the original story w/Photo

    11 hrs ago | Investopedia

    ... cryptographic functions that it employs, and though it could be hacked one day in the future, technology and cryptography experts agree that such an attack is unlikely in the near-term. However, the networks and storage locations where bitcoins are ...

    Comment?

  6. How Silicon Valley Can Change Its Culture to Attract More WomenRead the original story w/Photo

    11 hrs ago | The New Yorker

    ... she believes, that of many girls. One sample cover, for an issue about the computer-security practice known as cryptography, features a drawing of a cat whispering into another cat's ear, and the words "Secret Messages" written in bubble letters and ...

    Comment?

  7. Quantum compute this: Mathematicians build code to take on toughest of cyber attacksRead the original story w/Photo

    15 hrs ago | Science Daily

    Washington State University mathematicians have designed an encryption code capable of fending off the phenomenal hacking power of a quantum computer. Using high-level number theory and cryptography, the researchers reworked an infamous old cipher called the knapsack code to create an online security system better prepared for future demands.

    Comment?

  8. Quantum compute thisRead the original story w/Photo

    15 hrs ago | R & D

    ... capable of fending off the phenomenal hacking power of a quantum computer. Using high-level number theory and cryptography, the researchers reworked an infamous old cipher called the knapsack code to create an online security system better prepared ...

    Comment?

  9. UK-Israel trade hit record high in 2014Read the original story

    15 hrs ago | Jewish Chronicle

    ... The research work is part of an Engineering and Physical Sciences Research Council initiative and will focus on cryptography, data anonymity and facial recognition. The two countries signed a deal on digital co-operation a year ago. They are among ...

    Comment?

  10. Fake SSL Certificates Target GoogleRead the original story w/Photo

    23 hrs ago | NewsFactor

    Despite the hefty competition between the two companies, Google and Microsoft can agree on at least one thing: there are fake SSL certificates floating around that bad actors could use to spoof content and execute man-in-the-middle or phishing attacks against unsuspecting consumers. certificates last Friday.

    Comment?

  11. Be wary of one-time pads and other crypto unicornsRead the original story

    Wednesday | Freedom to Tinker

    ... with. We don't have secure high-bandwidth channels for sharing one-time pads which don't rely on symmetric cryptography. Before using the one-time pad, both users need to get a copy of it. With an app like Zendo, this requires an in-person meeting ...

    Comment?

  12. Sharing secrets: Britain & Israel launch A 1.2mn cybersecurity projectRead the original story w/Photo

    Wednesday | Russia Taday

    ... Physical Sciences Research Council initiative, and is set to focus on data anonymity, facial recognition and cryptography. Other areas researchers will explore include identity management and mobile and cloud-based technology. Reflecting on the ...

    Comment?

  13. Popular Cryptography Game Released for iOS & AndroidRead the original story w/Photo

    Wednesday | MacMegasite

    Vito Technology Inc., award-winning developer has released an update and an Android version of their popular educational game Next Quote. The app offers a thrilling experience of deciphering a hidden message which contains an inspirational quote from famous authors, founding fathers and modern day politicians.

    Comment?

  14. Computer science professor Allison Lewko specializes in protecting dataRead the original story w/Photo

    Wednesday | Columbia Spectator

    ... half while we're trying to figure out a problem," Vitercik said in an email. But Lewko never expected to pursue cryptography. Throughout grade school and high school, Lewko said she vowed to never study anything quantitative. However, after taking a ...

    Comment?

  15. Industry-Leading Mobile Fraud and Security Firm InAuth Secures $20 Million from Bain Capital VenturesRead the original story

    Wednesday | Freshnews

    ... mobile security, so that their customers don't have to be." "The combination of bank-grade authentication, cryptography and fraud detection helps create a safe transaction environment," said George Peabody, Partner, with payments strategy ...

    Comment?

  16. Government announces A 1.2 million UK-Israel cyber security projectRead the original story w/Photo

    Tuesday Mar 24 | Jewish Chronicle

    ... The research work is part of an Engineering and Physical Sciences Research Council initiative and will focus on cryptography, data anonymity and facial recognition. Mr Maude has visited Israel a number of times to discuss joint work. The two ...

    Comment?

  17. Bain Capital Ventures leads $20 mln round for InAuthRead the original story w/Photo

    Wednesday | PE Hub

    ... mobile security, so that their customers don't have to be." "The combination of bank-grade authentication, cryptography and fraud detection helps create a safe transaction environment," said George Peabody, Partner, with payments strategy ...

    Comment?

  18. 5 Steps to Securing the IoTRead the original story w/Photo

    Wednesday | EETimes

    ... have a background in security engineering. Sticking to standard security methods, especially in the field of cryptography, dramatically decreases the chance for mishaps. In an ideal world, everyone would rally around a single organization and have ...

    Comment?

  19. What Ops Needs to Know about HTTP/2Read the original story w/Photo

    Tuesday | Sys-Con Media

    ... supportive of SSL Everywhere, it is important to note that when securing connections HTTP/2 requires stronger cryptography. This falls squarely in the lap of ops, as this level of support is generally configured and managed at the platform (web ...

    Comment?

  20. In Search of a Printer You Won't Want to DestroyRead the original story w/Photo

    Tuesday | Wall Street Journal

    It's 2015, why do we still hate our printers? WSJ's Joanna Stern tells you how to find a printer you can tolerate, if not love. I have come to believe that living inside the machine is a tiny demon whose sole purpose is to torture me with paper jams and failed wireless connections.

    Comment?