Defence laws threaten to shut down Aussie encryption 
By Daniel Mathews | 6 days ago | Comment Now 
[Opinion] Poorly drafted trade controls cast the net too wide.
 
OpenSSL patches nine security flaws 
By Juha Saarinen | Aug 7, 2014 | Comment Now 
Code security audits kicking in.
 
Serious new flaws discovered in OpenSSL 
By Juha Saarinen | Jun 6, 2014 | Comment Now 
'Man in the middle' attack possible.
 
NIST launches post-NSA review into crypto guidance 
By Juha Saarinen, Brett Winterford | May 15, 2014 | Comment Now 
Updated: Addressing concerns over compromised algorithms.
 
'Nearly unbreakable' crypto modeled off human body    
By Darren Pauli | Apr 7, 2014 | Comment Now 
Generates unlimited number of keys, cuts out noise.
 
Russia bans Bitcoin 
By Darren Pauli | Feb 7, 2014 | Comment Now 
'Curious' decision grates with Western government approaches.
 
NIST reviews crypto development after NSA algo backdoor 
 
Dope research drops trojans on chips 
By Darren Pauli | Sep 19, 2013 | Comment Now 
Proof of concept backdoor evades Intel chip checks.
 
NSA hacks iPhones, Android, Blackberrys: report 
 
Smartphone data can be intercepted by NSA: report 
 
Attackers raid BitCoin wallets via Android key flaws 
 
Flaw makes Android phones open to hijacking 
By Darren Pauli | Jul 4, 2013 | Comment Now 
Signatures silently modified.
 
Security holes poked in Mega's 'secure' cloud 
By Darren Pauli | Jan 22, 2013 | Comment Now 
MegaCracker tool could reveal Mega passwords.
 
MegaCracker tool could reveal Mega passwords 
By Darren Pauli | Jan 22, 2013 | Comment Now 
Boffin claims registration process reveals vulnerable hash.
 
Co-lo VMs busted by crypto attack 
By Darren Pauli | Nov 6, 2012 | Comment Now 
Side-channel cache-sniffers steal keys.
 
Researchers detail SSL implementation holes 
By Darren Pauli | Oct 29, 2012 | Comment Now 
Developers caught out by 'rude' report.
 
Researchers detail laundry list of dodgy crypto deployments 
By Darren Pauli | Oct 26, 2012 | Comment Now 
Developer hits back at 'rude' research.
 
Google hardens DKIM after founders served spoofed Gmail 
 
RedHat project fights Java vulnerabilities 
By Darren Pauli | Oct 25, 2012 | Comment Now 
Aussie security boffin builds vulnerability database to track flawed JARs.
 
Monash celebrates Turing’s 100th anniversary 
By David Braue | Sep 17, 2012 | Comment Now 
Cryptographic war hero celebrated as the father of modern computing.
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Should Optus make a bid for iiNet?

   |   View results
Yes
  43%
 
No
  57%
TOTAL VOTES: 576

Vote