Computer scientists develop tool to make the Internet of Things safer
Computer scientists at the University of California, San Diego, have developed a tool that allows hardware designers and system builders to test security- a first for the field. One of the tool's potential ...
New algorithm shakes up cryptography
Researchers at the Laboratoire Lorrain de Recherches en Informatique et ses Applications (CNRS/Université de Lorraine/Inria) and the Laboratoire d'Informatique de Paris 6 (CNRS/UPMC) have solved one aspect of the discrete ...
Google fixes APK nightmare-waiting-to-happen, sends patch to partners
Bluebox Security reveals Android vulnerability in run up to Blackhat convention
Beefing up public-key encryption
Most financial transactions on the Internet are safeguarded by a cryptographic technique called public-key encryption. Where traditional encryption relies on a single secret key, shared by both sender and ...
Mobile browsers fail researchers' safety test
(Phys.org)—How unsafe are mobile browsers? Unsafe enough that even cyber-security experts are unable to detect when their smartphone browsers have landed on potentially dangerous websites, according to ...
PlayStation 3 hack is decryption jolt for Sony
Japanese researchers achieve world record cryptanalysis of next-generation cryptography
Fujitsu Laboratories, National Institute of Information and Communications Technology and Kyushu University jointly broke a world cryptography record with the successful cryptanalysis of a 278-digit (923-bit)-long ...
Mobile tech 'can replace cheques'
(PhysOrg.com) -- With cheques due to be phased out in the UK by 2018 new security technology developed at Oxford University could offer a replacement, allowing people a secure way to pay in almost any situation.
Air Force grant to tighten online encryption
(PhysOrg.com) -- Computer scientist Rafael Pass is seeking new approaches to cryptographic security with a $600,000, five-year grant from the Air Force Office of Scientific Research.
Secure computers aren't so secure
(PhysOrg.com) -- Even well-defended computers can leak shocking amounts of private data. MIT researchers seek out exotic attacks in order to shut them down.