Linux camp has key to Windows 8 boot lockout

(Phys.org)—Microsoft's rocky reputation with the open source community was not exactly obliterated with hardware news surrounding the upcoming launch of the operating system, Windows 8. Systems will come with Secure Boot ...

New record set for cryptographic challenge

An international team of computer scientists has set a new record for integer factorization, one of the most important computational problems underlying the security of nearly all public-key cryptography currently used today.

Cryptography without using secret keys

Most security applications, for instance, access to buildings or digital signatures, use cryptographic keys that must at all costs be kept secret. That also is the weak link: Who will guarantee that the key doesn't get stolen ...

Recommendation for cryptographic key generation

Cryptography is often used in information technology security environments to protect sensitive, high-value data that might be compromised during transmission or while in storage. It relies upon two basic components: an algorithm ...

Why do people still use fax machines?

The fax machine is a symbol of obsolete technology long superseded by computer networks – but faxing is actually growing in popularity.

Reported Yahoo email scanning revives surveillance concerns

Yahoo's reported willingness to search user email to assist U.S. government investigators has revived concerns about court-approved surveillance programs that companies aren't allowed to disclose to the people using their ...

page 1 from 3