Serious new flaws discovered in OpenSSL 
By Juha Saarinen | Jun 6, 2014 | Comment Now 
'Man in the middle' attack possible.
 
NIST launches post-NSA review into crypto guidance 
By Juha Saarinen, Brett Winterford | May 15, 2014 | Comment Now 
Updated: Addressing concerns over compromised algorithms.
 
'Nearly unbreakable' crypto modeled off human body    
By Darren Pauli | Apr 7, 2014 | Comment Now 
Generates unlimited number of keys, cuts out noise.
 
Russia bans Bitcoin 
By Darren Pauli | Feb 7, 2014 | Comment Now 
'Curious' decision grates with Western government approaches.
 
NIST reviews crypto development after NSA algo backdoor 
 
Dope research drops trojans on chips 
By Darren Pauli | Sep 19, 2013 | Comment Now 
Proof of concept backdoor evades Intel chip checks.
 
NSA hacks iPhones, Android, Blackberrys: report 
 
Smartphone data can be intercepted by NSA: report 
 
Attackers raid BitCoin wallets via Android key flaws 
 
Flaw makes Android phones open to hijacking 
By Darren Pauli | Jul 4, 2013 | Comment Now 
Signatures silently modified.
 
Security holes poked in Mega's 'secure' cloud 
By Darren Pauli | Jan 22, 2013 | Comment Now 
MegaCracker tool could reveal Mega passwords.
 
MegaCracker tool could reveal Mega passwords 
By Darren Pauli | Jan 22, 2013 | Comment Now 
Boffin claims registration process reveals vulnerable hash.
 
Co-lo VMs busted by crypto attack 
By Darren Pauli | Nov 6, 2012 | Comment Now 
Side-channel cache-sniffers steal keys.
 
Researchers detail SSL implementation holes 
By Darren Pauli | Oct 29, 2012 | Comment Now 
Developers caught out by 'rude' report.
 
Researchers detail laundry list of dodgy crypto deployments 
By Darren Pauli | Oct 26, 2012 | Comment Now 
Developer hits back at 'rude' research.
 
Google hardens DKIM after founders served spoofed Gmail 
 
RedHat project fights Java vulnerabilities 
By Darren Pauli | Oct 25, 2012 | Comment Now 
Aussie security boffin builds vulnerability database to track flawed JARs.
 
Monash celebrates Turing’s 100th anniversary 
By David Braue | Sep 17, 2012 | Comment Now 
Cryptographic war hero celebrated as the father of modern computing.
 
#Crytoparty in pictures. 
By Darren Pauli | Sep 4, 2012 | Comment Now 
From Australia to the US, Europe and the Middle East, Crytoparties are going viral. Photos via unless stated.
 
Cryptoparty goes viral 
By Darren Pauli | Sep 4, 2012 | Comment Now 
Pen testers, privacy geeks spread security to the masses.
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
What is delaying adoption of public cloud in your organisation?







   |   View results
Lock-in concerns
  22%
 
Application integration concerns
  3%
 
Security and compliance concerns
  30%
 
Unreliable network infrastructure
  9%
 
Data sovereignty concerns
  24%
 
Lack of stakeholder support
  4%
 
Protecting on-premise IT jobs
  4%
 
Difficulty transitioning CapEx budget into OpEx
  3%
TOTAL VOTES: 539

Vote