Beefing up public-key encryption

Most financial transactions on the Internet are safeguarded by a cryptographic technique called public-key encryption. Where traditional encryption relies on a single secret key, shared by both sender and recipient, public-key ...

India can monitor BlackBerry without codes: report

India has found a way to monitor BlackBerry corporate emails without asking developer Research in Motion (RIM) to hand over encryption codes a report said Wednesday, which could help end a standoff with the Canadian company.

Flaw found in securing online transactions

Researchers on Wednesday revealed a flaw in the way data is scrambled to protect the privacy of online banking, shopping and other kinds of sensitive exchanges.

New digital security program doesn't protect as promised

(PhysOrg.com) -- University of Texas at Austin scientists have shown that they can break "Vanish," a program that promised to self-destruct computer data, such as emails and photographs, and thereby protect a person's privacy.

Russia adds Google IPs to registry of banned sites

Russia's communications watchdog agency says it is adding some Google IP addresses to the state register of banned sites, as a dispute over a banned messaging app intensifies.

page 3 from 6