Bookmark

Add to MyYahoo RSS

Cryptography News

News on Cryptography continually updated from thousands of sources around the net.

Thursday Jul 10 | Managing Rights Management

Intel and Cisco DRM Patent Applications

Thursdays the PTO publishes new pending patent applications . Both of today's Spotlight Applications concern aspects of digital rights management .

Comment?

Related Topix: Science / Technology, Digital Rights Management, Science, Computer Science

Wed Jul 09, 2014

Freshnews

Tunnel X Launches Secure Platform for Private Online Conversations

Tunnel X , a secure platform for discreet online conversations, today announced the availability of its service, the first solution bringing sophisticated encryption technology to chat-like communications.

Comment?

Related Topix: Computer Security, Science / Technology, Science, Computer Science

Hispanic Business

Kobil Systems wins over Sparkasse Bank Malta with new server platform ...

Kobil Systems wins over Sparkasse Bank Malta with new server platform ; IT security specialist provides SecOVID OTP technology for secure netbanking - Kobil Systems, manufacturer and market leading trendsetter of innovative technologies for secure data and digital identities provides Sparkasse Bank Malta with security technology for their new ... (more)

Comment?

Related Topix: Science / Technology, Computer Security, Science, Computer Science

Tue Jul 08, 2014

Time

NSA Spying Hurts Cybersecurity for All of Us Say Privacy Advocates

The surveillance debate has focused on the legality of spying on Americans but some say the biggest danger is in the methods the NSA uses Privacy advocates Monday slammed the National Security Agency for conducting surveillance in a way they say undermines cybersecurity for everyone and harms U.S. tech companies.

Comment?

Related Topix: Computer Security, Science / Technology, Science, Computer Science, Computers

Mon Jul 07, 2014

The Hill

Is there a second NSA leaker?

Top experts say there could be a new person leaking details about the National Security Agency, in addition to former contractor Edward Snowden.

Comment?

Related Topix: Science, Computer Science

Python

cryptography 0.5

Our goal is for it to be your "cryptographic standard library". It supports Python 2.6-2.7, Python 3.2+, and PyPy.

Comment?

Related Topix: Science / Technology, Computer Security, Science, Computer Science

UB Reporter

Cracking Codes

An FBI forensic examiner recently provided a UB Law School audience with a fascinating look at a little-known arm of the agency - the Cryptanalysis and Racketeering Records Unit, which deciphers coded messages sent by prisoners, criminals and terrorists.

Comment?

Related Topix: US Federal Bureau of Investigation, Computer Science, Buffalo, NY

Fri Jul 04, 2014

PhysicsWeb Events

Nuclear-inspection protocol inspired by game of marbles

Modern cryptography combined with simple radiation detectors could allow nuclear-weapons checks to be carried out with almost complete security.

Comment?

Related Topix: Science, Computer Science

Aurora Era-Banner

Encrypting your communications will beat US police a quarter of the time

US wiretaps were beaten by encryption almost a quarter of the time it was encountered last year, in a small but growing trend of American police snooping.

Comment?

Related Topix: Science / Technology, Computer Security, Science, Computer Science, University of Pennsylvania

Thu Jul 03, 2014

Hispanic Business

Recent Findings from Korea Institute of Science and Technology Has...

Editor at Information Technology Newsweekly -- New research on Information Technology is the subject of a report.

Comment?

Related Topix: Journalism, Science, Computer Science

Hispanic Business

Patent Issued for Privacy-Preserving Communication

In other words, individuals would like to ensure information is afforded solely to intended recipients and/or that communication participants are unidentifiable.

Comment?

Related Topix: Science / Technology, Inventions, Science, Computer Science

Wed Jul 02, 2014

Hispanic Business

whiteCryption to Showcase Cryptanium Code and Data Protection at Booth 140 at Gartner Summit

Editor at Information Technology Newsweekly -- whiteCryption , a leading provider of software code and data protection, is showcasing their products at the Gartner Security and Risk Management Summit in .

Comment?

Related Topix: Science / Technology, Computer Security, Science, Computer Science

Asian Correspondent

Oxford Brookes Celebrates National Women in Engineering Day

On 23 June Oxford Brookes University and its' Department of Computing and Communication Technology and Department of Mechanical Engineering and Mathematical Science worked together to deliver a lively programme of workshops for year 11 and 12 girls from local schools, to celebrate National Women in Engineering Day.

Comment?

Related Topix: Engineering, Mechanical Engineering, Science, Computer Security, Science / Technology, Computer Science, Robots

Tue Jul 01, 2014

Hispanic Business

MegaCryption 6.4.1 Excels With Additions to Utilities, Algorithms,...

MegaCryption 6.4.1 developments include increased key storage and creation options, accelerated speed for OpenPGP decryption, enhancements to ISPF, as well as additional JCL procedures.

Comment?

Related Topix: Science, Computer Science, Science / Technology, Computer Security

Bit-tech.net

ProtonMail hit by PayPal account freeze

ProtonMail, a Swiss start-up that looks to simplify high-quality email encryption, has found its PayPal account frozen with little explanation.

Comment?

Related Topix: Science, Computer Science, Science / Technology, Computer Security

I programmer

The Knapsack Problem

I like problems that look simple and turn out to be really difficult. It's the way that something simple can hide a complexity that you never guessed at.

Comment?

Related Topix: Science, Computer Science

Dark Reading

Black Hat USA 2014: Can You Keep a Secret?

Cryptography lets secrets remain secret, or at least that's the idea. Today's quartet of Black Hat Briefings all explore this oft-hidden world, shedding light on crypto flaws both small and momentous.

Comment?

Related Topix: Science, Computer Science

EETimes

The title of this post is "solving... " but there weren't a lot of solutions --...

Consumers are becoming increasingly aware of the privacy and security aspects of their digital lives.

Comment?

Related Topix: Science, Computer Science, Science / Technology, Computer Security

EETimes

Garcia-Lasheras @Adam-Taylor: "security / cryptography is not broken...

I got really scared when I heard how easy an "unbreakable" system can by bypassed by skilled hackers.

Comment?

Related Topix: Science / Technology, Computer Security, Science, Computer Science

Examiner.com

Top 3 security certifications to target in 2015

The role of IT is increasing day by day and people are using this facility in order to work and also it is used in studies.

Comment?

Related Topix: Wireless, Emerging Technology, Computer Security, Science / Technology, Science, Computer Science

•••
•••
•••
•••
•••
•••
•••