Who goes there? Verifying identity online

We are all used to logging into networks where we have a unique identity, verified by the network server and associated with our account for other members of the network to see. Such an identity-based network system is useful ...

Flaw found in securing online transactions

Researchers on Wednesday revealed a flaw in the way data is scrambled to protect the privacy of online banking, shopping and other kinds of sensitive exchanges.

Scientists break satellite telephony security standards

Satellite telephony was thought to be secure against eavesdropping. German researchers at the Horst Gortz Institute for IT-Security (HGI) at the Ruhr University Bochum (RUB) have cracked the encryption algorithms of the European ...

Consumers urged to be vigilant in wake of Zappos cyberattack

(PhysOrg.com) -- As an estimated 24 million Zappos.com customers begin receiving notifications that some of their personal data have been compromised in a massive cyberattack, an Indiana University cybersecurity expert is ...

US, British officials victims of Stratfor hack: press

Email addresses and passwords belonging to British, US and NATO officials were posted online following the hacking of a US intelligence analysis firm over Christmas, the Guardian daily reported Monday.

Improving security in the cloud

Less and less of today's computing is done on desktop computers; cloud computing, in which operations are carried out on a network of shared, remote servers, is expected to rise as the demand for computing power increases. ...

Indonesia threatens to cut BlackBerry data service

Indonesia has threatened to cut data services used by millions of BlackBerry customers, the industry body said Saturday, in an ongoing spat over infrastructure and government access to information.

page 19 from 26