Cryptography Newswire

Cryptography Newswire

Comprehensive Real-Time News Feed for Cryptography.

Results 1 - 20 of 1,733 in Cryptography

  1. Beyond bitcoin: 7 ways to capitalize on blockchainsRead the original story

    53 min ago | ComputerWorld

    ... the person who holds the corresponding private key can decide what happens next to their coin. This layer of cryptography offers a certain amount of privacy because no names are recorded. But the cryptography offers a greater value in that it ...

    Comment?

  2. Spy found dead in bag 'had infuriated his MI6 bosses'Read the original story w/Photo

    12 hrs ago | The New Zealand Herald

    The British spy whose body was found padlocked inside a bag in his flat had illegally hacked into secret data on former U.S. president Bill Clinton, it has been revealed. Gareth Williams, 31, was discovered in a holdall in the bath at his London home five years ago this month, but the mystery surrounding his death has never been solved.

    Comment?

  3. Security On The Web By Advanced Encryption Standard (AES) and...Read the original story w/Photo

    13 hrs ago | The Code Project

    The most issues in the web is security matters and because of keeping and transdering sensitive data in the web, So we must provide secure system on it. The most popular and practical way to establish secure connection in the web is cryptography techniques.

    Comment?

  4. NSA wants encryption that fends off quantum computing hacksRead the original story w/Photo

    17 hrs ago | Engadget

    ... quickly as conventional algorithms. As the NSA explains, even a seemingly exotic technique like elliptic curve cryptography "is not the long term solution" people thought it was. Quantum computing is advancing quickly enough that the NSA and other ...

    Comment?

  5. MI6 spy found in holdall 'hacked into secret data about Bill Clinton'Read the original story w/Photo

    Yesterday | Mirror.co.uk

    Human Mole Peter Faulding who has cracked some of the greatest mysteries and now he reveals why he thinks there was foul play involved in the spy in the holdall The 31-year-old codebreaker was discovered inside a padlocked bag in a bathtub at his London home in 2010, sparking a real-life mystery worthy of any 007 thriller. Theories about the maths genius with a taste for cross-dressing included that he was killed by foreign spooks, eliminated by fellow agents and suffocated when a sex game went disastrously wrong.

    Comment?

  6. What Difference At This Point Does It Make? Clinton Secrets Hacked By Murdered SpyRead the original story w/Photo

    Apr 21, 2015 | Right Wing News

    Anyone else find it amazing the number dead bodies that have piled up around the Clintons over the years? Well, here's another one. A 31 year-old MI6 spy was found neatly folded and zipped into a luggage bag five years ago.

    Comment?

  7. Appeals Court Reverses NSA RulingRead the original story w/Photo

    Yesterday | NewsFactor

    A federal appeals court on Friday ruled in favor of the Obama administration in a dispute over the National Security Agency's bulk collection of telephone data on hundreds of millions of Americans. The U.S. Court of Appeals for the District of Columbia Circuit reversed a lower court ruling that said the program likely violates the Constitution's ban on unreasonable searches.

    Comment?

  8. Appeals court rules in favor of NSA telephone programRead the original story w/Photo

    Saturday | Recordpub.com

    A federal appeals court on Friday ruled in favor of the Obama administration in a dispute over the National Security Agency's bulk collection of telephone data on hundreds of millions of Americans.

    Comment?

  9. Blu-ray review: CitizenfourRead the original story w/Photo

    Friday | Washington Times

    A freedom fighter against Big Brother or a traitor to the United States, Edward Snowden became a vilified and celebrated figure after his security leaking exploits in 2013. The 2014 Academy Award-winning documentary about his polarizing activities Citizenfour arrives on Blu-ray to give viewers plenty of fodder to understand his stealing of classified documents and revealing the National Security Agency's technology that can ingest and analyze near every piece of digital communication of U.S. citizens and their contacts worldwide.

    Comment?

  10. U.S. court hands win to NSA over metadata collectionRead the original story

    Friday | WNFL-AM Green Bay

    A U.S. appeals court on Friday threw out a judge's ruling that would have blocked the National Security Agency from collecting phone metadata under a controversial program that has raised privacy concerns. The U.S. Court of Appeals for the District of Columbia Circuit said there were not sufficient grounds for the preliminary injunction imposed by the lower court.

    Comment?

  11. Is Telegram's Compliance with Iran Compromising the Digital Security of Its Users?Read the original story w/Photo

    Friday Aug 28 | Global Voices Online

    ... explained Telegram boasts secure communications, however security experts have questioned the robustness of its cryptography. Matthew Green, a Professor of Cryptography at John Hopkins University told Global Voices in an email the following, while ...

    Comment?

  12. Trend Advisor - Securing Networked Applications with Crypto-SegmentationRead the original story

    Tuesday Aug 18 | InformationWeek

    ... needed, enterprises must adopt new approaches to isolating and protecting sensitive information with strong cryptography. Crypto-segmentation solves the problem, recognizing that applications are now routinely shared with employees and partners in ...

    Comment?

  13. Appeals court sides with Obama government on phone data collectionRead the original story w/Photo

    Friday | The Globe and Mail

    ... harmed. The lawsuit was brought by Larry Klayman, a conservative lawyer, and Charles Strange, the father of a cryptography technician who was killed in Afghanistan when his helicopter was shot down in 2011. U.S. District Judge Richard Leon ruled in ...

    Comment?

  14. Appeals court reverses NSA ruling; U.S. can continue collecting dataRead the original story w/Photo

    Friday Aug 28 | Laguna Woods Globe

    A federal appeals court on Friday ruled in favor of the Obama administration in a dispute over the National Security Agency's bulk collection of telephone data on hundreds of millions of Americans. The U.S. Court of Appeals for the District of Columbia Circuit reversed a lower court ruling that said the program likely violates the Constitution's ban on unreasonable searches.

    Comment?

  15. Federal Appeals Rules in Favor of NSA Bulk Records CollectionRead the original story w/Photo

    Friday Aug 28 | TheBlaze.com

    A federal appeals court on Friday ruled in favor of the Obama administration in a dispute over the National Security Agency's bulk collection of telephone data on hundreds of millions of Americans. The U.S. Court of Appeals for the District of Columbia Circuit reversed a lower court ruling that said the program likely violates the Constitution's ban on unreasonable searches.

    Comment?

  16. U.S. court hands win to NSA over metadata collection challengeRead the original story w/Photo

    Friday Aug 28 | West Australian

    A U.S. appeals court on Friday threw out a judge's ruling that would have blocked the National Security Agency from collecting phone metadata under a controversial program that has raised privacy concerns. The U.S. Court of Appeals for the District of Columbia Circuit said there were not sufficient grounds for the preliminary injunction imposed by the lower court.

    Comment?

  17. NSA Acknowledges Quantum Computing ThreatRead the original story w/Photo

    Friday Aug 28 | Design And Reuse

    On August 11th, the National Security Agency announced their preliminary plans for transitioning to quantum resistant algorithms and away from the Suite B cryptographic algorithms specified by the National Institute of Standards and Technology . They even said that vendors that haven't yet switched to Suite B algorithms should not do so at this point and use their resources "to prepare for the upcoming quantum resistant algorithm transition."

    Comment?

  18. Vinton Cerf Heidelberg Laureate ForumRead the original story w/Photo

    Friday Aug 28 | InfoWorld

    RSA encryption algorithm co-inventor Leonard Adleman, 'Father of the Internet' Vint Cerf, and cryptography innovator Manuel Blum share their biggest fears It's safe to say that Turing Award winners know a thing or two about computing, so when they express concern about key trends in the tech world, it's worth paying attention. That, in fact, is just what three award winners did this week at the Heidelberg Laureate Forum in Germany, where they were gathered along with other leading thinkers in the fields of mathematics and computer science.

    Comment?

  19. Read All of 'Silence Like Diamonds,' Our Original Sci-Fi StoryRead the original story w/Photo

    Friday Aug 28 | Light Reading

    ... that our readers are facing today, and extrapolating those issues into tomorrow -- the latest developments in cryptography, drones, AI, and security. The second quality that makes the story unusual is the format: We ran it in 10 parts, just a ...

    Comment?

  20. Bugtraq: [security bulletin] HPSBGN03402 rev.2 - HP Performance...Read the original story

    Thursday Aug 27 | Security Focus

    Hash: SHA1 Note: the current version of the following document is available here: docDisplay?docId=emr_na-c04772190 SUPPORT COMMUNICATION - SECURITY BULLETIN Document ID: c04772190 Version: 2 HPSBGN03402 rev.2 - HP Performance Manager, Remote Disclosure of Information NOTICE: The information in this Security Bulletin should be acted upon as soon as possible. Release Date: 2015-08-26 Last Updated: 2015-08-26 Potential Security Impact: Remote disclosure of information Source: Hewlett-Packard Company, HP Software Security Response Team VULNERABILITY SUMMARY Potential security vulnerabilities have been identified in HP Performance Manager.

    Comment?