Bookmark

Add to MyYahoo RSS

Cryptography News

News on Cryptography continually updated from thousands of sources around the net.

4 hrs ago | Softpedia

TES - Text Encrypter 1.0.0.0

Encryption ensures file and data privacy, as it makes them inaccessible to others that do not have the proper password or cypher used for decryption.

Comment?

Related Topix: Privacy, Science, Computer Science

Tue Jul 22, 2014

BBC News

UK 'still exporting arms' to Russia

Britain is exporting millions of pounds worth of arms and other dual-use military equipment to Russia despite concerns Moscow is arming separatist rebels in Ukraine, MPs have warned.

Comment?

Related Topix: Science, Computer Science

BroadwayWorld.com

Elevation Pictures' the Imitation Game & Nightcrawler to Premiere at 2014 Tiff

Canadian distributor Elevation Pictures is pleased to be a part of the premiere lineup, today announced at the Toronto International Film Festival press conference.

Comment?

Related Topix: Benedict Cumberbatch, Science, Computer Science

NixCraft

Secure Password Hashing for Python Developers

There have been many high profile incidents where a security breach resulted in hackers obtaining database dumps of user passwords.

Comment?

Related Topix: Science / Technology, Computer Security, Science, Computer Science

Bit-tech.net

Tor-busting techniques pulled from Black Hat schedule

A talk on methods of de-anonymising Tor traffic has been cancelled by the legal department of the researcher's employer, for reasons yet unknown.

Comment?

Related Topix: Science, Computer Science

Mon Jul 21, 2014

Ask MetaFilter

Fictional characters to arrange key exchange over unsecure channel?

I'm presenting a cryptography demonstration to a small group of nerdy teenagers soon.

Comment?

Related Topix: Science, Computer Science, Family, Teenagers

Not Even Wrong

The NSA, NIST and the AMS

Among the many disturbing aspects of the behavior of the NSA revealed by the Snowden documents, the most controversial one directly relevant to mathematicians was the story of the NSA's involvement in a flawed NIST cryptography standard .

Comment?

Related Topix: Science, Computer Science, Science / Technology, Computer Security, Mathematics

CIO

Stealthy ransomware 'Critroni' uses Tor, could replace Cryptolocker

Cybercriminals are spreading a new file-encrypting ransomware program that's more powerful and resilient than Cryptolocker, a threat recently shut down by the U.S. Department of Justice.

Comment?

Related Topix: US News, Economics News, Bitcoin, Science, Computer Science, Computer Security, Science / Technology

InfoWorld

Net neutrality a key battleground in growing fight over encryption, activists say

Plans to favor some Internet packets over others threaten consumers' hard-won right to use encryption, a digital privacy advocate says.

Comment?

Related Topix: Computer Security, Science / Technology, Science, Computer Science, Internet Service Providers

ComingSoon.net

The Trailer for The Imitation Game, Starring Benedict Cumberbatch

The Weinstein Company has revealed the trailer for The Imitation Game , opening in theaters on November 21 and starring Benedict Cumberbatch, Keira Knightley, Matthew Goode, Mark Strong, Rory Kinnear, Charles Dance, Allen Leech and Matthew Beard.

Comment?

Related Topix: Science, Computer Science, Movies, Entertainment

Sys-Con Media

SPYRUS Announces New Ruggedized Water Resistant Versions of Certified Windows To Go Live Drives

The drive can function in temperatures as low as 0C degrees or as high as 70C degrees, and function if accidentally submerged in water.

Comment?

Related Topix: Microsoft, Startups, Science, Computer Science, Weather, Computer Security, Science / Technology

Sun Jul 20, 2014

Enter Stage Right

Real-time self-government in the cryptocurrency frontier: Set and setting

If you're one of the majority who's heard about Bitcoin, what you've heard has probably left you wary.

Comment?

Related Topix: Economics News, Bitcoin, Science, Computer Science

Fri Jul 18, 2014

ComputerWorld

Net neutrality a key battleground in growing fight over encryption, activists say

Plans to favor some Internet packets over others threaten consumers' hard-won right to use encryption, a digital privacy advocate says.

Comment?

Related Topix: Computer Security, Science / Technology, Science, Computer Science, Internet Service Providers, Social Software

National Vulnerability Database

CVE-2014-4263

NVD is the U.S. government repository of standards based vulnerability management data.

Comment?

Related Topix: Science, Computer Science

Thu Jul 17, 2014

Monster.com

Security Engineer, EC2

Thank you for your interest in the Security Engineer, EC2. To begin the application process, please enter your information below.

Comment?

Related Topix: Monster, Human Resources, Science, Computer Science, Cloud Computing, Science / Technology, Computer Security, Computers

Hispanic Business

Patent Issued for Secret Sharing in Cryptographic Devices via...

Unfortunately, such arrangements can be problematic when carried out using existing techniques.

Comment?

Related Topix: Inventions, Science / Technology, Computers, Science, Computer Science

Hispanic Business

Georgia SoftWorks Announces SSH Server for Windows Feature Release

The new version of the GSW SSH Server includes several new features and security measures.

Comment?

Related Topix: Science, Computer Science, Computer Security

Hispanic Business

Researchers Submit Patent Application, 'Apparatus, Systems, and...

In order to maintain security in such transactions and communications, many different forms of cryptography are utilized to encrypt transmitted data.

Comment?

Related Topix: Inventions, Science / Technology, Computers, Science, Computer Science, Computer Security

Hispanic Business

Study Data from S. Kwon and Co-Authors Update Knowledge of...

Editor at Information Technology Newsweekly -- A new study on Information Technology is now available.

Comment?

Related Topix: Science, Computer Science

Wed Jul 16, 2014

My ESM

Nest Nurtures New IoT Protocol

Even before its $3.2 billion acquisition by Google, Nest Labs was quietly building into all its products a low-power mesh networking protocol.

Comment?

Related Topix: Home Automation, Marketing, Science, Computer Science, Startups, Intel

•••
•••
•••
•••
•••
•••
•••