Techies vs. NSA: Encryption arms race escalates

Encrypted email, secure instant messaging and other privacy services are booming in the wake of the National Security Agency's recently revealed surveillance programs. But the flood of new computer security services is of ...

US data mining system technical details murky

The US government's vast online data collection system revealed this week could tap into companies like Google and Facebook without the knowledge of top executives, experts said.

Nokia engineer blogs on Windows 8 game hacks

(Phys.org)—Nokia Engineer Justin Angel works with Windows 8 and decided to share on his blog site what he eventually discovered: Various tactics can succeed in pirating Windows 8 games distributed through the Microsoft ...

German researchers break W3C XML encryption standard

Standards are supposed to guarantee security, especially in the WWW. The World Wide Web Consortium (W3C) is the main force behind standards like HTML, XML, and XML Encryption. But implementing a W3C standard does not mean ...

Major step ahead for cryptography

Imagine you could work out the answer to a question, without knowing what the question was. For example, suppose someone thinks of two numbers and then asks another person to work out their sum, without letting them know ...

Secure computers aren't so secure

(PhysOrg.com) -- Even well-defended computers can leak shocking amounts of private data. MIT researchers seek out exotic attacks in order to shut them down.

page 2 from 7