21 hrs ago
Bitcoin-Libertarian Dream or Environmental Hazard?
Bitcoin is the latest fantasy object of utopian thinkers far and wide. Angry with the banks? It sidesteps them.
Announcing: The Prime Challenge
The biggest prime number ever discovered is 17 million decimal digits long. Previously, the biggest prime number was 12 million digits long.
Thu Dec 05, 2013
Security and Privacy for Implantable Medical Devices
Provides state-of-the-art research of interest to a multidisciplinary audience in electrical, computer and bio-engineering, computer networks and cryptography and medical and health sciences This book presents a systematic approach to analyzing the challenging engineering problems posed by the need for security and privacy in implantable medical ... (more)
Government Computer News
NTRU crypto software available to open-source community
Security Innovation, a company that specializes in application and crypto security, has announced availability of its NTRU public key cryptography system for free use in the open-source software community.
Bitcoins key in fraud probe
German police say they have arrested two people and seized illegally generated bitcoins worth more than 700,000 euros in an investigation of computer fraud.
Microsoft to Encrypt Services, Notify Customers of Gov't Data Requests
Microsoft moved to reassure business and government customers worldwide that it is committed to informing them of legal orders related to their data, and will fight in court any 'gag order' that prevents it from sharing such information with customers.
NSA has cracked encryption protecting your bank account, Gmail, and smartphone
Encryption techniques used by online banks, email providers, and many other sensitive Internet services to keep your personal data private and secure are no match for the National Security Agency and British surveillance authorities, according to new reports from The New York Times , ProPublica , and The Guardian .
Wed Dec 04, 2013
Studies from Marche Polytechnic University Describe New Findings in Information Security
Despite this, the original McEliece cryptosystem based on Goppa codes, has encountered limited interest in practical applications, partly because of some constraints imposed by this very special class of codes."
Bitcoin Has Company on Cryptocurrency Stage
In recent weeks, the hype and interest around the Bitcoin virtual currency have risen to new heights as the value of a Bitcoin has now surpassed $1,000 US.
"Why patent trolls love east Texas"
Mike Masnick on a jury verdict against Newegg: "Having Whit Diffie and Ron Rivest present on your behalf, showing that they did everything prior to Jones' patent, while further showing that what Newegg was doing relied on their work, not Jones', should have ended the case.
Tue Dec 03, 2013
F-Secure Antivirus Research Weblog
Good Passwords are KEY
Today marks the official launch date of F-Secure KEY . But we're guessing that it hardly feels like an especially busy day for product manager Juha Torkkel .
Mon Dec 02, 2013
What We Want Most in the Era of Surveillance
Since Edward Snowden's disclosures about widespread NSA surveillance, Americans and people everywhere have been presented with a digital variation on an old analog threat: the erosion of freedoms and privacy in exchange, presumably, for safety and security.
Speaking of Security
Secure Server: TLS v1.1 and v1.2 Support
The recent " BEAST " and " Lucky Thirteen " attacks have made clear that it is time to use the newer versions of TLS: v1.1 and v1.2. TLS v1.2 also adds the new, safer GCM cipher suites and changes the MD5/SHA-1 handshake hash for a simple SHA-2 hash.
Sat Nov 30, 2013
Sic Semper Tyrannis 2005
Is NSA Screwing the Pooch? - TTG
TheNSA used to target only foreign signals, and according to its own legal interpretations, that's whatit still does.
Fri Nov 29, 2013
Bitcoin Mania: How To Create Your Very Own Crypto-Currency, For Free
With Bitcoin now worth potentially more then an ounce of gold, I'm capping off my series of Bitcoin posts with an attempt to answer a recurring question.
Thu Nov 28, 2013
Encrypted social network vies for disgruntled WhatsApp, Facebook users
A new social network, Syme, is hoping to attract users with a feel close to Google Plus and Facebook but with encrypted content viewable only to invited members of a group.
Martin's Mobile Technology Page
Does a Certificate Authority See Your Private Key?
One of the questions I had for a long time now is if a Certificate Authority sees the private key of an SSL certificate for a web server during the certification process? If so, it would be quite a security issue.
Death and the Nsa: a Q&a With Bruce Schneier
Daniel_Stuckey writes "Since Edward Snowden's disclosures about widespread NSA surveillance, Americans and people everywhere have been presented with a digital variation on an old analog threat: the erosion of freedoms and privacy in exchange, presumably, for safety and security.
Wed Nov 27, 2013
Customer Interaction Solutions
NXP Semiconductors launches new SmartMX2-P40 platform
NXP Semiconductors NV, a provider of mixed signal and standard product solutions, has launched its new SmartMX2-P40 platform of chip card microcontrollers for the banking and electronic-Government, or eGov, markets.
WhiteSteg protects confidential information
WHITESTEG is a steganographic application that can be used to maintain the confidentiality of valuable information, more importantly to safeguard information from possible interception, theft or unauthorised viewing.