GSM system about to be compromised
India can monitor BlackBerry without codes: report
India has found a way to monitor BlackBerry corporate emails without asking developer Research in Motion (RIM) to hand over encryption codes a report said Wednesday, which could help end a standoff with the ...
Telegram issues $200,000 in Bitcoins challenge to crack code
Quantum key distribution technology: Secure computing for the 'Everyman'
The largest information technology agreement ever signed by Los Alamos National Laboratory brings the potential for truly secure data encryption to the marketplace after nearly 20 years of development at ...
If you seek to 'switch off' encryption, you may as well switch off the whole internet
Prime Minister David Cameron has stated that the UK government will look at "switching off" some forms of encryption in order to make society safer from terror attacks. This might make a grand statement but i ...
Smartphones set out to decipher a cryptographic system
While carrying out her master thesis on computer science, Ramasany Gowthami participated in the creation of an Android app by means of which users get together to crack a modern cryptographic code.
Quantum cryptography protocol doesn’t require shared reference frames (Update)
Dynamic encryption keeps secrets
Professor Lars Ramkilde Knudsen from DTU Compute has invented a new way to encrypt telephone conversations that makes it very difficult to 'eavesdrop'. His invention can help to curb industrial espionage.
Many in US believe the were hit by Heartbleed
Many Americans scrambled to protect their personal information online after learning of the Heartbleed Internet flaw, and some believe their data was stolen, a survey showed Wednesday.
Engineers devise new method for securing location-sensitive data by using quantum mechanics
(PhysOrg.com) -- A research group led by computer scientists at the UCLA Henry Samueli School of Engineering and Applied Science has proved that cryptography -- the practice and study of hiding information -- that is based ...
Data-sharing scheme shows the way towards low-cost, flexible and secure cloud storage
Wider adoption of cloud storage services by organizations has been hindered by security and privacy issues. A consequence of storing data on the cloud is that, by its very nature, the storage infrastructure ...
'Heartbleed' bug a critical Internet illness
The "Heartbleed" flaw in Internet security is as critical as the name implies and wider spread than first believed. Warnings about the danger exposed early this week reached widening circles on Thursday, with everyone from website o ...
New digital security program doesn't protect as promised
(PhysOrg.com) -- University of Texas at Austin scientists have shown that they can break "Vanish," a program that promised to self-destruct computer data, such as emails and photographs, and thereby protect a person's privacy.
Beating the dark side of quantum computing
A future quantum computer will be able to carry out calculations billions of times faster than even today's most powerful machines by exploit the fact that the tiniest particles, molecules, atoms and subatomic particles can ...