Serious new flaws discovered in OpenSSL 
By Juha Saarinen | Jun 6, 2014 | Comment Now 
'Man in the middle' attack possible.
NIST launches post-NSA review into crypto guidance 
By Juha Saarinen, Brett Winterford | May 15, 2014 | Comment Now 
Updated: Addressing concerns over compromised algorithms.
'Nearly unbreakable' crypto modeled off human body    
By Darren Pauli | Apr 7, 2014 | Comment Now 
Generates unlimited number of keys, cuts out noise.
Russia bans Bitcoin 
By Darren Pauli | Feb 7, 2014 | Comment Now 
'Curious' decision grates with Western government approaches.
NIST reviews crypto development after NSA algo backdoor 
Dope research drops trojans on chips 
By Darren Pauli | Sep 19, 2013 | Comment Now 
Proof of concept backdoor evades Intel chip checks.
NSA hacks iPhones, Android, Blackberrys: report 
Smartphone data can be intercepted by NSA: report 
Attackers raid BitCoin wallets via Android key flaws 
Flaw makes Android phones open to hijacking 
By Darren Pauli | Jul 4, 2013 | Comment Now 
Signatures silently modified.
Security holes poked in Mega's 'secure' cloud 
By Darren Pauli | Jan 22, 2013 | Comment Now 
MegaCracker tool could reveal Mega passwords.
MegaCracker tool could reveal Mega passwords 
By Darren Pauli | Jan 22, 2013 | Comment Now 
Boffin claims registration process reveals vulnerable hash.
Co-lo VMs busted by crypto attack 
By Darren Pauli | Nov 6, 2012 | Comment Now 
Side-channel cache-sniffers steal keys.
Researchers detail SSL implementation holes 
By Darren Pauli | Oct 29, 2012 | Comment Now 
Developers caught out by 'rude' report.
Researchers detail laundry list of dodgy crypto deployments 
By Darren Pauli | Oct 26, 2012 | Comment Now 
Developer hits back at 'rude' research.
Google hardens DKIM after founders served spoofed Gmail 
RedHat project fights Java vulnerabilities 
By Darren Pauli | Oct 25, 2012 | Comment Now 
Aussie security boffin builds vulnerability database to track flawed JARs.
Monash celebrates Turing’s 100th anniversary 
By David Braue | Sep 17, 2012 | Comment Now 
Cryptographic war hero celebrated as the father of modern computing.
#Crytoparty in pictures. 
By Darren Pauli | Sep 4, 2012 | Comment Now 
From Australia to the US, Europe and the Middle East, Crytoparties are going viral. Photos via unless stated.
Cryptoparty goes viral 
By Darren Pauli | Sep 4, 2012 | Comment Now 
Pen testers, privacy geeks spread security to the masses.
Sign up to receive iTnews email bulletins
Latest Comments
What is delaying adoption of public cloud in your organisation?

   |   View results
Lock-in concerns
Application integration concerns
Security and compliance concerns
Unreliable network infrastructure
Data sovereignty concerns
Lack of stakeholder support
Protecting on-premise IT jobs
Difficulty transitioning CapEx budget into OpEx