16 hrs ago
AES encryption envelope and Xamarin PCL
Recently I've been asked a question about how the AES encryption envelope can be used with a PCL build of Data Abstract, the issue being that PCL doesn't expose the needed cryptography API.
20 hrs ago
JackPair Lets You Encrypt Voice Calls Whatever Phone You're Using
It's no surprise that pro-privacy tech has risen up the agenda since NSA whistleblower Edward Snowden revealed the vast extent of government agencies' surveillance programs.
Patent Application Titled 'Secure Online Distributed Data Storage Services' Published Online
However, considerable skepticism exists regarding security, integrity and confidentiality of data in cloud-based storage.
Wed Jul 30, 2014
The NSA's Patents, in One Searchable Database
What do a voice identifier , an automated translator , a "tamper-indicating" document tube , and a supersecure manhole cover have in common? They're all technologies for which the secretive National Security Agency has been granted patents by the U.S. government, giving the agency the exclusive rights to its inventions.
Tue Jul 29, 2014
How To Write a Realtime Chat App in 10 Lines of Code
This article was published as a part of ProgrammableWeb's Sponsored Content Program.
Android vulnerability allows malware to compromise most devices and apps
The majority of Android devices currently in use contain a vulnerability that allows malware to completely hijack installed apps and their data or even the entire device.
Mon Jul 28, 2014
Pam's House Blend
Congressman Grayson Requests Answers on NSA's Weakening of Encryption Standards
Democratic congressman Alan Grayson, who serves on the Science, Space, and Technology Committee in the US House of Representatives, has written a letter to Director of National Intelligence James Clapper.
The Code Project
Crypt Library Demo
In simple terms, cryptography is the application of selected processes for encoding data so that the information can be stored and transmitted securely.
Sat Jul 26, 2014
Barrington Stage's 'Breaking the Code' tells little-known story of WWII genius
Just over six months after he was posthumously pardoned by Queen Elizabeth II, Alan Turing , the cryptologist who led Britain's successful efforts to crack the German's Enigma code during World War II, turns up on the Mainstage of the Barrington Stage Company in the person of actor Mark H. Dold , who gives a remarkable and memorable performance as ... (more)
Mystery 'Onion/Critroni' Ransom Trojan Evolves to Use More Sophisticated
Kaspersky Lab has added more detail on the fiendish 'Onion' ransom Trojan that uses the Tor anonymity service to hide its command and control as well as displaying a level of thoughtfulness about its encryption design that bodes ill for future attacks.
Thu Jul 24, 2014
Lightweight Diffusion Layer from the $k^th$ root of the MDS Matrix
The Maximum Distance Separable mapping, used in cryptography deploys complex Galois field multiplications, which consume lots of area in hardware, making it a costly primitive for lightweight cryptography.
Heartbleed security bug offers lessons in incident response
Perhaps the biggest security bug of this generation, Heartbleed offers a number of lessons for improving incident response.
Comparative Evaluation of Elliptic Curve Cryptography Based...
In this paper, we focus on Elliptic Curve Cryptography based approach for Secure Multiparty Computation problem.
Patent Issued for Systems and Methods for Creating a Form for...
Cryptography relies on the existence of codes that are 'hard to break': that is, one-way functions that are believed to be computationally infeasible to invert.
Wed Jul 23, 2014
Case Study from Intel Showcases Collaboration with Virginia Tech
A document from Intel highlights a successful, ongoing effort at Virginia Polytechnic Institute and State University .
The world's most secure OS may have a serious problem
The Tails operating system is one of the most trusted platforms in cryptography, favored by Edward Snowden and booted up more than 11,000 times per day in May. But according to the security firm Exodus Intelligence , the program may not be as secure as many thought.
TES - Text Encrypter 188.8.131.52
Encryption ensures file and data privacy, as it makes them inaccessible to others that do not have the proper password or cypher used for decryption.
Tue Jul 22, 2014
UK 'still exporting arms' to Russia
Britain is exporting millions of pounds worth of arms and other dual-use military equipment to Russia despite concerns Moscow is arming separatist rebels in Ukraine, MPs have warned.
Elevation Pictures' the Imitation Game & Nightcrawler to Premiere at 2014 Tiff
Canadian distributor Elevation Pictures is pleased to be a part of the premiere lineup, today announced at the Toronto International Film Festival press conference.
Secure Password Hashing for Python Developers
There have been many high profile incidents where a security breach resulted in hackers obtaining database dumps of user passwords.