Thursday Jul 10
Managing Rights Management
Intel and Cisco DRM Patent Applications
Thursdays the PTO publishes new pending patent applications . Both of today's Spotlight Applications concern aspects of digital rights management .
Trending on the Topix Network
Wed Jul 09, 2014
Tunnel X Launches Secure Platform for Private Online Conversations
Tunnel X , a secure platform for discreet online conversations, today announced the availability of its service, the first solution bringing sophisticated encryption technology to chat-like communications.
Kobil Systems wins over Sparkasse Bank Malta with new server platform ...
Kobil Systems wins over Sparkasse Bank Malta with new server platform ; IT security specialist provides SecOVID OTP technology for secure netbanking - Kobil Systems, manufacturer and market leading trendsetter of innovative technologies for secure data and digital identities provides Sparkasse Bank Malta with security technology for their new ... (more)
Tue Jul 08, 2014
NSA Spying Hurts Cybersecurity for All of Us Say Privacy Advocates
The surveillance debate has focused on the legality of spying on Americans but some say the biggest danger is in the methods the NSA uses Privacy advocates Monday slammed the National Security Agency for conducting surveillance in a way they say undermines cybersecurity for everyone and harms U.S. tech companies.
Mon Jul 07, 2014
Is there a second NSA leaker?
Top experts say there could be a new person leaking details about the National Security Agency, in addition to former contractor Edward Snowden.
Our goal is for it to be your "cryptographic standard library". It supports Python 2.6-2.7, Python 3.2+, and PyPy.
An FBI forensic examiner recently provided a UB Law School audience with a fascinating look at a little-known arm of the agency - the Cryptanalysis and Racketeering Records Unit, which deciphers coded messages sent by prisoners, criminals and terrorists.
Fri Jul 04, 2014
Nuclear-inspection protocol inspired by game of marbles
Modern cryptography combined with simple radiation detectors could allow nuclear-weapons checks to be carried out with almost complete security.
Encrypting your communications will beat US police a quarter of the time
US wiretaps were beaten by encryption almost a quarter of the time it was encountered last year, in a small but growing trend of American police snooping.
Thu Jul 03, 2014
Recent Findings from Korea Institute of Science and Technology Has...
Editor at Information Technology Newsweekly -- New research on Information Technology is the subject of a report.
Patent Issued for Privacy-Preserving Communication
In other words, individuals would like to ensure information is afforded solely to intended recipients and/or that communication participants are unidentifiable.
Wed Jul 02, 2014
whiteCryption to Showcase Cryptanium Code and Data Protection at Booth 140 at Gartner Summit
Editor at Information Technology Newsweekly -- whiteCryption , a leading provider of software code and data protection, is showcasing their products at the Gartner Security and Risk Management Summit in .
Oxford Brookes Celebrates National Women in Engineering Day
On 23 June Oxford Brookes University and its' Department of Computing and Communication Technology and Department of Mechanical Engineering and Mathematical Science worked together to deliver a lively programme of workshops for year 11 and 12 girls from local schools, to celebrate National Women in Engineering Day.
Tue Jul 01, 2014
MegaCryption 6.4.1 Excels With Additions to Utilities, Algorithms,...
MegaCryption 6.4.1 developments include increased key storage and creation options, accelerated speed for OpenPGP decryption, enhancements to ISPF, as well as additional JCL procedures.
ProtonMail hit by PayPal account freeze
ProtonMail, a Swiss start-up that looks to simplify high-quality email encryption, has found its PayPal account frozen with little explanation.
The Knapsack Problem
I like problems that look simple and turn out to be really difficult. It's the way that something simple can hide a complexity that you never guessed at.
Black Hat USA 2014: Can You Keep a Secret?
Cryptography lets secrets remain secret, or at least that's the idea. Today's quartet of Black Hat Briefings all explore this oft-hidden world, shedding light on crypto flaws both small and momentous.
The title of this post is "solving... " but there weren't a lot of solutions --...
Consumers are becoming increasingly aware of the privacy and security aspects of their digital lives.
Garcia-Lasheras @Adam-Taylor: "security / cryptography is not broken...
I got really scared when I heard how easy an "unbreakable" system can by bypassed by skilled hackers.
Top 3 security certifications to target in 2015
The role of IT is increasing day by day and people are using this facility in order to work and also it is used in studies.