encryption
BitTorrent introduces secure, serverless messaging system
Back in September, the company behind the BitTorrent P2P protocol and the BitTorrent and μTorrent file-sharing software announced that they have started working on …
Bomb-threatening student caught because he used Tor on school Wi-Fi
20-year-old Harvard student Eldo Kim has been accused of sending fake bomb threats to Harvard University on Monday. What makes this case interesting is that he used the Tor …
FreeBSD ditches suspect hardware-based crypto
Buried in the “Security” section of a report on the FreeBSD Developer Summit held in September in Malta is a small but important note about the FreeBSD …
CyanogenMod introduces built-in SMS encryption
CyanogenMod developers have announced the fruit of several months of labor headed by Open Whisper Systems’ Moxie Marlinspike: a seamless implementation of TextSecure, …
Microsoft promises wide-reaching encryption, more transparency
It took them a while, but Microsoft is finally announcing a concentrated effort to protect its customers and their data from unauthorised government surveillance. “Like …
Can we expect a cyberwar resurgence?
Neohapsis security experts predict that next year there will be a cyberwar resurgence, the cloud will begin to show its hidden costs, and privacy will continue to lose in the …
Open source crypto server for thwarting malicious insiders
Edward Snowden’s successful exfiltration of mountains of data from NSA systems and databases has once more put the spotlight back on the threat that insiders pose to …
Do large companies follow encryption best practices?
Following last month’s revelations of the existence of the MUSCULAR program, in which the NSA and the British GCHQ have collaborated in tapping the overseas fiber-optic …
Lavabit founder submits final arguments in potentially game-changing privacy case
The saga surrounding secure email provider Lavabit and its legal fight against the US government continues with a reply brief filed last Friday by the former, arguing that …
Twitter adds Forward Secrecy to thwart surveillance efforts
Following in the footsteps of Google and Facebook, Twitter has joined the ranks of Internet companies that have (or are working on) implementing Perfect Forward Secrecy, and …
NTRU public key crypto released to open source community
RSA and ECC are the two most common public-key crypto systems in use today. At the 2013 Black Hat conference, researchers declared that the math for cracking encryption …
Secure Dropbox data using a hardware security token
Intrinsic-ID released Saturnus, an application that enables enterprises to protect digital assets stored and shared on Dropbox. With Saturnus, files are encrypted before they …
Featured news
Resources
Don't miss
- What 35 years of privacy law say about the state of data protection
- 40 open-source tools redefining how security teams secure the stack
- Password habits are changing, and the data shows how far we’ve come
- Product showcase: Tuta – secure, encrypted, private email
- Henkel CISO on the messy truth of monitoring factories built across decades