encryption
GPG development will continue as donations pour in
An article by Julia Angwin on ProPublica has become the catalyst for an avalanche of much needed donations for the survival of Gnu Privacy Guard (GPG), a free email encryption …
Video: Bruce Schneier talks to Edward Snowden
As part of a Harvard computer science symposium, Bruce Schneier had a public conversation with Edward Snowden. The topics were largely technical, ranging from cryptography to …
VPN services blocked by China’s Great Firewall
A number of popular VPN services are the latest target of China’s Great Firewall, including Astrill, StrongVPN and Golden Frog’s VyprVPN. Virtual Private Networks …
UK PM Cameron demonizes encryption, US report says it’s vital
When British Prime Minister David Cameron announced on Tuesday his plan to introduce new surveillance powers in the UK by forcing businesses to plant backdoors in their …
Encrypted messaging and file storage app Peerio goes open beta
Canada-base Peerio has released the beta version of an app of the same name which combines secure messaging, file sharing and storage, and adds encryption to it. Peerio is …
Reactions to David Cameron’s plan to ban end-to-end encryption
On Tuesday, British Prime Minister David Cameron announced his plan to introduce new surveillance powers in the UK, and ban applications that use end-to-end encryption. Here …
OpenSSL release patches 8 vulnerabilities
The OpenSSL Project has released updates for the popular eponymous open-source library that implements the SSL and TLS protocols. The new releases – 1.0.1k, 1.0.0p and …
New LusyPOS malware is a cross between Dexter and Chewbacca
A new piece of Point-of-Sale RAM scraping malware has been submitted to VirusTotal and analyzed by researchers, who found that it’s a cross between two older and …
Why you should protect your wireless connection
It’s holiday shopping season again, and consumers will join the rush to buy devices and accessories for loved ones. They’ll scoop up phones and tablets, plus …
ENISA guidelines on cryptographic solutions
ENISA published two reports. “Algorithms, key size and parameters” is a reference document providing a set of guidelines to decision makers, in particular …
New non-profit CA aims to make HTTPS use universal
To become ubiquitous, encryption must be easy to set up and easy to use, and that’s why the Electronic Frontier Foundation (EFF), Mozilla, Cisco, Akamai, IdenTrust, and …
Open Whisper Systems helps WhatsApp achieve end-to-end encryption
The immensely popular Whatsapp instant messenger has the potential to become an even more attractive option for users, as the company has partnered with Open Whisper Systems …
Featured news
Resources
Don't miss
- The messy data trails of telehealth are becoming a security nightmare
- What Cloudflare’s 2025 internet review says about attacks, outages, and traffic shifts
- Update your Apple devices to fix actively exploited vulnerabilities! (CVE-2025-14174, CVE-2025-43529)
- Kali Linux 2025.4: New tools and “quality-of-life” improvements
- How researchers are teaching AI agents to ask for permission the right way