Bookmark

Add to MyYahoo RSS

Cryptography News

News on Cryptography continually updated from thousands of sources around the net.

9 hrs ago | CNet News

Docker Founder Details His Plan to Secure Virtualization

Solomon Hykes started the open-source Docker project in March of 2013, and over the last year and half watched it grow into one of the most talked about new virtualization efforts in the industry.

Comment?

Related Topix: Science, Computer Science, Science / Technology, Open Source Software, Linux

13 hrs ago | PC World

How to use OpenPGP to encrypt your email messages and files in the cloud

Putting sensitive data in email messages or cloud storage should give you the heebie-jeebies , but a good dose of cryptography can give you peace of mind.

Comment?

Related Topix: Science, Computer Science, Computer Security, Science / Technology, Computers

Thu Aug 21, 2014

Noozhawk

The People Behind the Code: Best and Brightest Converge at UCSB for Cryptology Conference

A little levity to break up the seriousness: Participants dance and sing their own song to the tune of The Village People's "YMCA" at this week's CRYPTO 2014 conference at UCSB.

Comment?

Related Topix: Disco, Village People, Science, Computer Science, UC Santa Barbara, Computers

ZDNet

AWS bolsters CloudFront security

SSL uses cryptography to secure communication over Web connections. CloudFront supported the use of secure HTTPS connections, but AWS said it is adding the following: Improved performance with two features called Session Tickets and OCSP Stapling.

Comment?

Related Topix: Science / Technology, Computer Security, Science, Computer Science

Wed Aug 20, 2014

Python

cryptography 0.5.4

Our goal is for it to be your "cryptographic standard library". It supports Python 2.6-2.7, Python 3.2+, and PyPy.

Comment?

Related Topix: Science / Technology, Computer Security, Science, Computer Science

IBM

ABCs of IBM z/OS System Programming Volume 1

The ABCs of IBMA z/OSA System Programming is a 13-volume collection that provides an introduction to the z/OS operating system and the hardware architecture.

Comment?

Related Topix: Science, Computer Science

ITworld

A basic encryption strategy for storing sensitive data

A rule to live by with sensitive data is that at some point, your server will be compromised.

Comment?

Related Topix: Science, Computer Science

The Code Project

Nondeterministic Random Number Generation

I keep reading articles on the web about how all random number generators on a computer are "psuedo" random, or "deterministic".

Comment?

Related Topix: Computers, Computer Security, Science / Technology, Science, Computer Science, CPU, Startups, Intel

Business Wire

OWASP AppSec USA 2014 Adds Leading Global Experts to List of Speakers

The conference will take place at the Denver Marriott City Center, Sept. 16-19. Sept.

Comment?

Related Topix: CIO News, Science, Computer Science, Computer Security, Science / Technology

Tue Aug 19, 2014

Schneier on Security

The Security of al Qaeda Encryption Software

The web intelligence firm Recorded Future has posted two stories about how al Qaeda is using new encryption software in response to the Snowden disclosures.

Comment?

Related Topix: Computer Security, Science / Technology, Science, Computer Science

Mon Aug 18, 2014

Christian Science Monitor

Will these two new products be able to combat electronic spying?

Public concerns about the U.S. government's secretive surveillance programs exposed by Edward Snowden have spawned a slew of encryption products and privacy services that aim to make electronic spying more difficult.

Comment?

Related Topix: Google, Startups, Science, Computer Science, Blog News, Computer Security

Brandon Sun

BlackBerry forms business unit to hold patent portfolio, innovative tech assets

BlackBerry Ltd. has created a new business unit that will combine some of its most innovative technology, including QNX embedded software, Certicom cryptography applications and its patent portfolio.

Comment?

Related Topix: Science, Computer Science

Sun Aug 17, 2014

The Code Project

Non-Deterministic Random Number Generation

I keep reading articles on the web about how all random number generators on a computer are "psuedo" random, or "deterministic".

Comment?

Related Topix: Science / Technology, Computer Security, Science, Computer Science

Fri Aug 15, 2014

Eff.org

EFF's Defcon 22 T-Shirt Puzzle Explained

This summer we proudly unveiled EFF's fifth limited edition member t-shirt to DEF CON 22 attendees at the annual hacker conference in Las Vegas.

Comment?

Related Topix: Science, Computer Science

Thu Aug 14, 2014

Common Dreams

NPR Presents CIA-Backed Group as Independent Expert on Snowden's 'Harm'

Glenn Greenwald was on Democracy Now! Wednesday morning talking about his new piece in the Intercept critical of an NPR report describing "tangible evidence" of a "direct connection" between Edward Snowden's revelations of unchecked National Security Agency spying and increased Al-Qaeda efforts to protect its communications via cryptography.

Comment?

Related Topix: Computer Security, Science / Technology, Science, Computer Science, US News, Liberal Political News

Hispanic Business

Patent Issued for Extending Credential Type to Group Key Management...

"Business data is growing at exponential rates, and along with that growth is a demand for securing that data.

Comment?

Related Topix: Science / Technology, Inventions, Science, Computer Science, Computer Security

Hispanic Business

Patent Issued for Remote Verification of File Protections for Cloud Data Storage

Cloud storage providers have an interest in demonstrating that files in their custody enjoy strong confidentiality and other protections, both to differentiate their services and to ease regulatory compliance for their clients.

Comment?

Related Topix: Science / Technology, Inventions, Computers, Science, Computer Science

Wed Aug 13, 2014

Information Technology

SPYRUS(R) Announces Its Encrypting and Bootable Windows To Go Drives...

BadUSB attacks were publicized at the recent presentation from the 2014 Black Hat Conference entitled "BadUSB: On accessories that turn evil," by Karsten Nohl and Jacob Lell of the SRLabs, Berlin.

Comment?

Related Topix: Arts, Industrial Design (Product Design), Science, Computer Science

F-Secure Antivirus Research Weblog

Ransomware Race (Part 3): SynoLocker Under The Hood

Last week we wrote about a new ransomware family called SynoLocker that was targeting network attached storage devices manufactured by Synology.

Comment?

Related Topix: Science, Computer Science

Tue Aug 12, 2014

IBM

ABCs of IBM z/OS System Programming Volume 6

The ABCs of IBMA z/OSA System Programming is an 11-volume collection that provides an introduction to the z/OS operating system and the hardware architecture.

Comment?

Related Topix: Science / Technology, CPU, Science, Computer Science

•••
•••
•••
•••
•••
•••
•••