Cryptography without using secret keys

Most security applications, for instance, access to buildings or digital signatures, use cryptographic keys that must at all costs be kept secret. That also is the weak link: Who will guarantee that the key doesn't get stolen ...

Your privacy online: Health information at serious risk of abuse

There is a significant risk to your privacy whenever you visit a health-related web page. An analysis of over 80,000 such web pages shows that nine out of ten visits result in personal health information being leaked to third ...

Sony removes data posted by hackers

Sony said Saturday about 2,500 customers' names and partial addresses stolen by hackers had been discovered posted online as it struggled to recover from the biggest-ever Internet security break-in.

'Pre-bunking' shows promise in fight against misinformation

Soon after the Russian invasion, the hoaxes began. Ukrainian refugees were taking jobs, committing crimes and abusing handouts. The misinformation spread rapidly online throughout Eastern Europe, sometimes pushed by Moscow ...

Singapore vows to hunt down Anonymous hackers

Singapore will "spare no effort" to hunt down hackers from activist group Anonymous who last week threatened to wage a cyber war against the government, Prime Minister Lee Hsien Loong said Wednesday.

Sony Ericsson's Canada site hacked: company

Hackers have attacked Sony Ericsson's Canadian eShop website, affecting 2,000 users, the latest online strike against the Japanese electronics and entertainment giant, a Sony spokesman said Wednesday.

page 1 from 7