Bookmark

Add to MyYahoo RSS

Cryptography News

News on Cryptography continually updated from thousands of sources around the net.

3 hrs ago | Python

cryptography 0.5.4

Our goal is for it to be your "cryptographic standard library". It supports Python 2.6-2.7, Python 3.2+, and PyPy.

Comment?

Related Topix: Science / Technology, Computer Security, Science, Computer Science

10 hrs ago | IBM

ABCs of IBM z/OS System Programming Volume 1

The ABCs of IBMA z/OSA System Programming is a 13-volume collection that provides an introduction to the z/OS operating system and the hardware architecture.

Comment?

Related Topix: Science, Computer Science

14 hrs ago | ITworld

A basic encryption strategy for storing sensitive data

A rule to live by with sensitive data is that at some point, your server will be compromised.

Comment?

Related Topix: Science, Computer Science

18 hrs ago | The Code Project

Nondeterministic Random Number Generation

I keep reading articles on the web about how all random number generators on a computer are "psuedo" random, or "deterministic".

Comment?

Related Topix: Computers, Computer Security, Science / Technology, Science, Computer Science, CPU, Startups, Intel

23 hrs ago | Business Wire

OWASP AppSec USA 2014 Adds Leading Global Experts to List of Speakers

The conference will take place at the Denver Marriott City Center, Sept. 16-19. Sept.

Comment?

Related Topix: CIO News, Science, Computer Science, Computer Security, Science / Technology

Tue Aug 19, 2014

Schneier on Security

The Security of al Qaeda Encryption Software

The web intelligence firm Recorded Future has posted two stories about how al Qaeda is using new encryption software in response to the Snowden disclosures.

Comment?

Related Topix: Computer Security, Science / Technology, Science, Computer Science

Mon Aug 18, 2014

Christian Science Monitor

Will these two new products be able to combat electronic spying?

Public concerns about the U.S. government's secretive surveillance programs exposed by Edward Snowden have spawned a slew of encryption products and privacy services that aim to make electronic spying more difficult.

Comment?

Related Topix: Google, Startups, Science, Computer Science, Blog News, Computer Security

Brandon Sun

BlackBerry forms business unit to hold patent portfolio, innovative tech assets

BlackBerry Ltd. has created a new business unit that will combine some of its most innovative technology, including QNX embedded software, Certicom cryptography applications and its patent portfolio.

Comment?

Related Topix: Science, Computer Science

Sun Aug 17, 2014

The Code Project

Non-Deterministic Random Number Generation

I keep reading articles on the web about how all random number generators on a computer are "psuedo" random, or "deterministic".

Comment?

Related Topix: Science / Technology, Computer Security, Science, Computer Science

Fri Aug 15, 2014

Eff.org

EFF's Defcon 22 T-Shirt Puzzle Explained

This summer we proudly unveiled EFF's fifth limited edition member t-shirt to DEF CON 22 attendees at the annual hacker conference in Las Vegas.

Comment?

Related Topix: Science, Computer Science

Thu Aug 14, 2014

Common Dreams

NPR Presents CIA-Backed Group as Independent Expert on Snowden's 'Harm'

Glenn Greenwald was on Democracy Now! Wednesday morning talking about his new piece in the Intercept critical of an NPR report describing "tangible evidence" of a "direct connection" between Edward Snowden's revelations of unchecked National Security Agency spying and increased Al-Qaeda efforts to protect its communications via cryptography.

Comment?

Related Topix: Computer Security, Science / Technology, Science, Computer Science, US News, Liberal Political News

Hispanic Business

Patent Issued for Extending Credential Type to Group Key Management...

"Business data is growing at exponential rates, and along with that growth is a demand for securing that data.

Comment?

Related Topix: Science / Technology, Inventions, Science, Computer Science, Computer Security

Hispanic Business

Patent Issued for Remote Verification of File Protections for Cloud Data Storage

Cloud storage providers have an interest in demonstrating that files in their custody enjoy strong confidentiality and other protections, both to differentiate their services and to ease regulatory compliance for their clients.

Comment?

Related Topix: Science / Technology, Inventions, Computers, Science, Computer Science

Wed Aug 13, 2014

Information Technology

SPYRUS(R) Announces Its Encrypting and Bootable Windows To Go Drives...

BadUSB attacks were publicized at the recent presentation from the 2014 Black Hat Conference entitled "BadUSB: On accessories that turn evil," by Karsten Nohl and Jacob Lell of the SRLabs, Berlin.

Comment?

Related Topix: Arts, Industrial Design (Product Design), Science, Computer Science

F-Secure Antivirus Research Weblog

Ransomware Race (Part 3): SynoLocker Under The Hood

Last week we wrote about a new ransomware family called SynoLocker that was targeting network attached storage devices manufactured by Synology.

Comment?

Related Topix: Science, Computer Science

Tue Aug 12, 2014

IBM

ABCs of IBM z/OS System Programming Volume 6

The ABCs of IBMA z/OSA System Programming is an 11-volume collection that provides an introduction to the z/OS operating system and the hardware architecture.

Comment?

Related Topix: Science / Technology, CPU, Science, Computer Science

Mon Aug 11, 2014

BBC News

Quantum computers to crack the world

And the money that keeps global banking systems lubricated only does so thanks to cryptographic software that turns a stream of data into unintelligible nonsense.

Comment?

Related Topix: Computers, Science, Computer Science

NewsFactor

Yahoo, Google To Encrypt E-mail

End-to-end encryption tools like PGP and GnuPG have been around for a long time, but they require a lot of technical know-how and manual effort to use.

Comment?

Related Topix: Widevine Technologies, Emerging Technology, Search Engines, Internet, Science / Technology, Microsoft, Startups, Science, Computer Science

Sun Aug 10, 2014

Slashdot

Clever Workaround: Visual Cryptography On Austrian Postage Stamps

An anonymous reader writes Have you heard of personalized postage stamps? You pay the value of the stamps plus a fee and the post office prints official stamps usable for postage which show anything you can put into a jpeg file.

Comment?

Related Topix: Science / Technology, Computer Security, Science, Computer Science

Off the Kuff

Weekend link dump for August 10

"The [Harry] Potter books in general are a prolonged argument for tolerance , a prolonged plea for an end to bigotry."

Comment?

Related Topix: Emerging Technology, Wireless, Science / Technology, Computer Security, Science, Computer Science

•••
•••
•••
•••
•••
•••
•••