Bitcoin miner NiceHash reports hack, theft of its 'wallet'

The Slovenian-based bitcoin miner NiceHash says it is investigating a security breach and the possible theft of tens of millions of dollars' worth of bitcoins, as meanwhile the value of the virtual currency has soared to ...

DOJ's Rosenstein takes aim at Silicon Valley encryption

A high-ranking Department of Justice official is taking aim at Silicon Valley's methods for protecting privacy, saying there should be a public debate about whether companies should create digital lock boxes that cannot be ...

Researchers prove the security of the Vector Stream Cipher

How do we know if the electronic keys we use in our devices are really secure? While it is possible to rigorously test the strength of a cipher—a kind of digital data lock—there are rarely any definitive proofs of unbreakability. ...

Is fog more secure than cloud?

Computer scientists in Italy are working on a new concept for remote and distributed storage of documents that could have all the benefits of cloud computing but without the security issues of putting one's sensitive documents ...

Internet-connected 'smart' devices are dunces about security

These days, it's possible to use your phone—and sometimes just your voice—to control everything from your TV to your lights, your thermostat and shades, even your car or medical device. (At least, once you have gadgets ...

In world of internet-enabled things, US says security needed

The Obama administration urged companies on Tuesday to make millions of devices safe from hacking, underscoring the risks posed by an increasingly bewildering array of internet-connected products permeating daily life, covering ...

Bitcoin tanks after Hong Kong exchange 'hacked'

A major Hong Kong-based Bitcoin exchange has suspended trading after $65 million in the virtual unit was reportedly stolen by hackers—sending the digital currency plunging more than 20 percent.

Closing a malware security loophole

An add-on for antivirus software that can scan across a computer network and trap malicious activity missed by the system firewall is being developed by an international team. Details are reported in the International Journal ...

page 3 from 9