Cryptography Newswire

Comprehensive Real-Time News Feed for Cryptography.

Results 1 - 20 of 1,755 in Cryptography

  1. salvage 0.1.1Read the original story

    2 hrs ago | Python

    ... the data. Salvage runs under Python 2.7 or Python 3.2 and later. The only external dependency is gpg , for the cryptography. For maximum utility, it is packaged as a single flat Python script that can be run with no installation. The algorithms and ...

    Comment?

  2. credo_manager 0.3.0Read the original story

    2 hrs ago | Python

    Essentially, it's a credential management program written with amazon credentials in mind. It uses your ssh key pairs to keep your credentials encrypted on disk until you need to use them.

    Comment?

  3. Setting up an OpenVPN server inside an Aws VPCRead the original story

    4 hrs ago | Agile Testing

    My goal in this post is to show how to set up an OpenVPN server within an AWS VPC so that clients can connect to EC2 instances via a VPN connection. It's fairly well documented how to configure a site-to-site VPN with an AWS VPC gateway, but articles talking about client-based VPN connections into a VPC are harder to find.

    Comment?

  4. Global AgendaWary of Intel Leaks, Jihadists Scaling Back Social Media UseRead the original story w/Photo

    9 hrs ago | Arutz Sheva Israel News

    ... killer had no mobile phone and no Facebook account. Faced with this problem, police are resorting to calling in cryptography and computing experts, but there are never enough, which slows down investigations. Last autumn ISIS published guidelines ...

    Comment?

  5. IBM Systems Magazine Publishes ASPG Cryptography ExpertiseRead the original story w/Photo

    20 hrs ago | PRWeb

    ASPG white paper, "Encryption Is Key to Security: Align Existing Competencies with Intuitive Best Practices," published in IBM Systems Magazine. The latest issue of IBM Systems Magazine contains an article written by ASPG cryptography specialist and MegaCryption product manager, Gregory Thomason.

    Comment?

  6. ASPG Announces Spring 2015 Technology Conference SponsorshipsRead the original story w/Photo

    20 hrs ago | PRWeb

    ... security conference, ASPG will be highlighting its suite of information security solutions, including its cryptography toolkit (MegaCryption), its RACF administration and reporting tool (ERQ), its SMF data management and movement utility (SMFUTIL), ...

    Comment?

  7. Jihadists increasingly wary of Internet, experts sayRead the original story w/Photo

    22 hrs ago | Bangkok Post

    ... killer had no mobile phone and no Facebook account. Faced with this problem, police are resorting to calling in cryptography and computing experts, but there are never enough, which slows down investigations. Last autumn, the Islamic State group ...

    Comment?

  8. David HolmesRead the original story w/Photo

    Friday | InformationWeek

    David Holmes is an evangelist for F5 Networks' security solutions, with an emphasis on distributed denial of service attacks, cryptography and firewall technology. He has spoken at conferences such as RSA, InfoSec and Gartner Data Center.

    Comment?

  9. Context (& Quality) Is King with Threat Intelligence By @AdamDVincent [#Cloud]Read the original story w/Photo

    Friday | Linux

    ... Squared Inc. He possesses over a decade of experience in programming, network security, penetration testing, cryptography design & cryptanalysis, identity and access control, and a detailed expertise in information security. The culmination of this ...

    Comment?

  10. Microsemi, Rambus Link In Cryptography DealRead the original story

    Friday | SocalTECH.com

    ... The two said the deal covers certain differential power analysis (DPA) technologies developed by Rambus in its Cryptography Research division, plus AES cryptogrpahic cores. Differential power analysis (DPA) apparently is being used by attackers to ...

    Comment?

  11. Jenkins: Super Bowl: NFL continually puts profits and popularity over peopleRead the original story w/Photo

    Thursday Jan 29 | The Washington Post

    A commissioner who acts like he wants his profile on a stamp and a rule book that must be read by cryptographers to be understood are just a couple of the NFL's problems on display this season. But neither of them comes close to the problem the NFL is going to have when the public fully awakens to its Big Tobacco-style corporate callousness, an indifference so cold and snowblind that this week a league exec urged parents to potentially compromise the brains of their 10-year-olds.

    Comment?

  12. Hardware Root of TrustRead the original story w/Photo

    Thursday | Design And Reuse

    ... compact Dragon-QT can be configured for nearly any cryptographic operation, including AES, SHA, elliptic curve cryptography, public key cryptography, advanced true random number generation, SCA/DPA countermeasures, and more. All cryptographic ...

    Comment?

  13. In Communications, Privacy And Security Are IllusionsRead the original story w/Photo

    Thursday Jan 29 | TechCrunch

    Editor's note: Robert R. Ackerman, Jr. is the founder and managing director of Allegis Capital focusing his investments on the cybersecurity market. President Obama has tried for three years to persuade Congress to pass a cybersecurity bill.

    Comment?

  14. The cost of doing business in China: SpyingRead the original story w/Photo

    Thursday Jan 29 | WAPI-AM Birmingham

    If you're a tech company and want to do business in China, you'll have to hand over the keys to your kingdom first. Strict, new Chinese government rules will subject foreign companies to tailor their products for use within China -- making them less secure.

    Comment?

  15. Passion Pit's Third Album, 'Kindred,' Comes Out in AprilRead the original story w/Photo

    Thursday Jan 29 | Spin

    Passion Pit frontman Michael Angelakos has been dropping unreleased demos on SoundCloud for a couple of months now, but today, the band officially revealed information about their third studio album, Kindred . They teased the record, which is set for an April release, with a mysterious clip on YouTube, and a coded tweet on Wednesday night.

    Comment?

  16. Sophisticated Cryptographic Algorithm Prevents Unwanted Sharing of Personal DataRead the original story w/Photo

    Thursday Jan 29 | Scientific Computing/Instrument.

    IBM researchers have announced plans for a cloud-based technology that holds potential to help consumers better protect online personal data, including date of birth, home address and credit card numbers. The technology, called Identity Mixer, uses a cryptographic algorithm to encrypt the certified identity attributes of a user, such as their age, nationality, address and credit card number in a way that allows the user to reveal only selected pieces to third parties.

    Comment?

  17. New business collaboration platform secures data with personalized cryptographyRead the original story w/Photo

    Thursday Jan 29 | BetaNews

    Data security is a big concern for both individuals and businesses. This doesn't only apply to the public face of a business, but to exchange of information and collaboration between employees too.

    Comment?

  18. Content Media Acquires International Sales Rights to Alex...Read the original story

    Thursday Jan 29 | BroadwayWorld.com

    The much anticipated documentary "Deep Web," which chronicles the October 2013 arrest of Ross William Ulbricht, the 30-year-old entrepreneur alleged to be "Dread Pirate Roberts" - founder of Silk Road, the notorious online black market best known for drug trafficking and the trade of all illegal goods and services, will screen first footage in Berlin as Content Media announced today that it has acquired international sales rights to the film. Directed, written and produced by Alex Winter , the feature-length documentary explores the rise of a new Internet; decentralized, encrypted, dangerous and beyond the law.

    Comment?

  19. Debate Simmers over Digital PrivacyRead the original story w/Photo

    Wednesday Jan 28 | CFR.org

    ... intelligent criminal could stymie every single one (and such criminals have already had access to strong cryptography for years ). Would introducing backdoors (secret access methods that investigators can use to overcome otherwise secure systems) ...

    Comment?

  20. Tech at Night: We have a right to lock our data, even if it inconveniences governmentRead the original story w/Photo

    Thursday Jan 29 | RedState

    ... empower these people to regulate anything. No Net Neutrality. No data privacy breach regulations. Certainly no cryptography regulation or escrowed encryption. Voluntary data sharing is as far as I'll go. I'm no anarchist, we need a government. But ...

    Comment?