Weakness of 2G mobile phone networks revealed

The encryption scheme used for second generation (2G) mobile phone data can be hacked within seconds by exploiting weaknesses and using common hardware, A*STAR researches show. The ease of the attack shows an urgent need ...

The future of encryption

If you want to protect valuable information, wouldn't you keep it under lock and key?

FBI chief urges 'robust debate' on encryption

FBI Director James Comey called Monday for public debate on the use of encrypted communications, saying Americans may not realize how radical groups and criminals are using the technology.

CIA worked to break Apple encryption: report

The Central Intelligence Agency has been working for years to break encryption on Apple devices, to spy on communications of iPhone and iPad users, a report said Tuesday.

After Paris attacks, US and UK discuss privacy vs. security

President Barack Obama argued Friday that a resurgent fear of terrorism across Europe and the United States should not lead countries to overreact and shed privacy protections, even as British Prime Minister David Cameron ...

Who goes there? Verifying identity online

We are all used to logging into networks where we have a unique identity, verified by the network server and associated with our account for other members of the network to see. Such an identity-based network system is useful ...

Next generation FeliCa contactless IC chip to be launched

Sony Corporation announces today the launch of the next generation FeliCa IC chip with enhanced security adopting the Advanced Encryption Standard (AES) encryption. The new IC chip will support AES as well as the existing ...

RIM tells India no access for BlackBerry emails

BlackBerry maker Research In Motion (RIM) said Thursday it could not give Indian law enforcers a way to monitor its corporate mail service, days ahead of a government deadline for access.

page 3 from 4