Bookmark

Add to MyYahoo RSS

Cryptography News

News on Cryptography continually updated from thousands of sources around the net.

7 hrs ago | Oracle

The solution is to import the LDAP server's public key into UCM Java's default keystore in $JAVA_HOME/jre/lib/security/cacerts file using $JAVA_HOME/bin/keytool command 1. In Linux or Unix, if not already set, add write permissions to the /jre/lib/security/cacerts file Note: The command must be all on one line, must match the server's JVM version, ... (more)

Comment?

Related Topix: Science / Technology, Programming Languages, Java, Science, Computer Science

12 hrs ago | CIO

Attackers can easily create dangerous file-encrypting malware, new threat

A new program that encrypts files to extort money from users highlights that attackers don't need advanced programming skills to create dangerous and effective ransomware threats, especially when strong encryption technology is freely available.

Comment?

Related Topix: Science, Computer Science, Science / Technology, Computer Security

Thu Jul 31, 2014

Patrick Kerpan

AES encryption envelope and Xamarin PCL

Recently I've been asked a question about how the AES encryption envelope can be used with a PCL build of Data Abstract, the issue being that PCL doesn't expose the needed cryptography API.

Comment?

Related Topix: Science / Technology, Computer Security, Science, Computer Science, Libraries

TechCrunch

JackPair Lets You Encrypt Voice Calls Whatever Phone You're Using

It's no surprise that pro-privacy tech has risen up the agenda since NSA whistleblower Edward Snowden revealed the vast extent of government agencies' surveillance programs.

Comment?

Related Topix: Headphones, Science, Computer Science

Hispanic Business

Patent Application Titled 'Secure Online Distributed Data Storage Services' Published Online

However, considerable skepticism exists regarding security, integrity and confidentiality of data in cloud-based storage.

Comment?

Related Topix: Science, Computer Science

Wed Jul 30, 2014

Foreign Policy

The NSA's Patents, in One Searchable Database

What do a voice identifier , an automated translator , a "tamper-indicating" document tube , and a supersecure manhole cover have in common? They're all technologies for which the secretive National Security Agency has been granted patents by the U.S. government, giving the agency the exclusive rights to its inventions.

Comment?

Related Topix: Inventions, Science / Technology, Science, Computer Science, Patent / Trademark Law, Law

Tue Jul 29, 2014

ProgrammableWeb.com

How To Write a Realtime Chat App in 10 Lines of Code

This article was published as a part of ProgrammableWeb's Sponsored Content Program.

Comment?

Related Topix: GitHub, Science, Computer Science

CIO

Android vulnerability allows malware to compromise most devices and apps

The majority of Android devices currently in use contain a vulnerability that allows malware to completely hijack installed apps and their data or even the entire device.

Comment?

Related Topix: Science, Computer Science, Google, Startups

Mon Jul 28, 2014

Pam's House Blend

Congressman Grayson Requests Answers on NSA's Weakening of Encryption Standards

Democratic congressman Alan Grayson, who serves on the Science, Space, and Technology Committee in the US House of Representatives, has written a letter to Director of National Intelligence James Clapper.

Comment?

Related Topix: James R. Clapper, National Institute of Standards and Technology, Science, Computer Science, Computer Security, Science / Technology

The Code Project

Crypt Library Demo

In simple terms, cryptography is the application of selected processes for encoding data so that the information can be stored and transmitted securely.

Comment?

Related Topix: Computer Security, Science, Computer Science

Sat Jul 26, 2014

Examiner.com

Barrington Stage's 'Breaking the Code' tells little-known story of WWII genius

Just over six months after he was posthumously pardoned by Queen Elizabeth II, Alan Turing , the cryptologist who led Britain's successful efforts to crack the German's Enigma code during World War II, turns up on the Mainstage of the Barrington Stage Company in the person of actor Mark H. Dold , who gives a remarkable and memorable performance as ... (more)

Comment?

Related Topix: Science, Computer Science, Europe, World News, United Kingdom

CIO

Mystery 'Onion/Critroni' Ransom Trojan Evolves to Use More Sophisticated

Kaspersky Lab has added more detail on the fiendish 'Onion' ransom Trojan that uses the Tor anonymity service to hide its command and control as well as displaying a level of thoughtfulness about its encryption design that bodes ill for future attacks.

Comment?

Related Topix: Science, Computer Science

Thu Jul 24, 2014

CiteULike

Lightweight Diffusion Layer from the $k^th$ root of the MDS Matrix

The Maximum Distance Separable mapping, used in cryptography deploys complex Galois field multiplications, which consume lots of area in hardware, making it a costly primitive for lightweight cryptography.

Comment?

Related Topix: Science / Technology, Computer Security, Science, Computer Science

TechTarget

Heartbleed security bug offers lessons in incident response

Perhaps the biggest security bug of this generation, Heartbleed offers a number of lessons for improving incident response.

Comment?

Related Topix: Science / Technology, Computer Security, Science, Computer Science

CiteULike

Comparative Evaluation of Elliptic Curve Cryptography Based...

In this paper, we focus on Elliptic Curve Cryptography based approach for Secure Multiparty Computation problem.

Comment?

Related Topix: Science / Technology, Computer Security, Science, Computer Science

Hispanic Business

Patent Issued for Systems and Methods for Creating a Form for...

Cryptography relies on the existence of codes that are 'hard to break': that is, one-way functions that are believed to be computationally infeasible to invert.

Comment?

Related Topix: Inventions, Science, Computer Science, Computer Security

Wed Jul 23, 2014

Freshnews

Case Study from Intel Showcases Collaboration with Virginia Tech

A document from Intel highlights a successful, ongoing effort at Virginia Polytechnic Institute and State University .

Comment?

Related Topix: Core Security Technologies, Computer Security, Science / Technology, Science, Computer Science, Computers

Linux Today

The world's most secure OS may have a serious problem

The Tails operating system is one of the most trusted platforms in cryptography, favored by Edward Snowden and booted up more than 11,000 times per day in May. But according to the security firm Exodus Intelligence , the program may not be as secure as many thought.

Comment?

Related Topix: Science / Technology, Computer Security, Science, Computer Science

Softpedia

TES - Text Encrypter 1.0.0.0

Encryption ensures file and data privacy, as it makes them inaccessible to others that do not have the proper password or cypher used for decryption.

Comment?

Related Topix: Privacy, Science, Computer Science

Tue Jul 22, 2014

BBC News

UK 'still exporting arms' to Russia

Britain is exporting millions of pounds worth of arms and other dual-use military equipment to Russia despite concerns Moscow is arming separatist rebels in Ukraine, MPs have warned.

Comment?

Related Topix: Science, Computer Science

•••
•••
•••
•••
•••
•••
•••