Linux camp has key to Windows 8 boot lockout

(Phys.org)—Microsoft's rocky reputation with the open source community was not exactly obliterated with hardware news surrounding the upcoming launch of the operating system, Windows 8. Systems will come with Secure Boot ...

Cryptography without using secret keys

Most security applications, for instance, access to buildings or digital signatures, use cryptographic keys that must at all costs be kept secret. That also is the weak link: Who will guarantee that the key doesn't get stolen ...

Recommendation for cryptographic key generation

Cryptography is often used in information technology security environments to protect sensitive, high-value data that might be compromised during transmission or while in storage. It relies upon two basic components: an algorithm ...

Why do people still use fax machines?

The fax machine is a symbol of obsolete technology long superseded by computer networks – but faxing is actually growing in popularity.

Reported Yahoo email scanning revives surveillance concerns

Yahoo's reported willingness to search user email to assist U.S. government investigators has revived concerns about court-approved surveillance programs that companies aren't allowed to disclose to the people using their ...

$1M Turing Award winners advocate for encryption

This year's $1 million A.M. Turing Award goes to a pair of cryptographers whose ideas helped make the Internet possible. Both men say giving governments control over encrypted communications puts everyone at risk.

page 1 from 3