Experts protest Aussie law banning crypto export 
By Juha Saarinen | Jul 13, 2015 | Comment Now 
Defence Trade Controls Act threatens to "criminalise" cryptology.
 
'High severity' flaw discovered in OpenSSL 
By Juha Saarinen | Jul 10, 2015 | Comment Now 
Certificate bypass check possible.
 
Crypto experts slam govt encryption backdoor demands 
By Juha Saarinen | Jul 8, 2015 | Comment Now 
Revisiting a bad idea considered an even worse idea.
 
Defence laws threaten to shut down Aussie encryption 
By Daniel Mathews | May 20, 2015 | Comment Now 
[Opinion] Poorly drafted trade controls cast the net too wide.
 
OpenSSL patches nine security flaws 
By Juha Saarinen | Aug 7, 2014 | Comment Now 
Code security audits kicking in.
 
Serious new flaws discovered in OpenSSL 
By Juha Saarinen | Jun 6, 2014 | Comment Now 
'Man in the middle' attack possible.
 
NIST launches post-NSA review into crypto guidance 
By Juha Saarinen, Brett Winterford | May 15, 2014 | Comment Now 
Updated: Addressing concerns over compromised algorithms.
 
'Nearly unbreakable' crypto modeled off human body    
By Darren Pauli | Apr 7, 2014 | Comment Now 
Generates unlimited number of keys, cuts out noise.
 
Russia bans Bitcoin 
By Darren Pauli | Feb 7, 2014 | Comment Now 
'Curious' decision grates with Western government approaches.
 
NIST reviews crypto development after NSA algo backdoor 
 
Dope research drops trojans on chips 
By Darren Pauli | Sep 19, 2013 | Comment Now 
Proof of concept backdoor evades Intel chip checks.
 
NSA hacks iPhones, Android, Blackberrys: report 
 
Smartphone data can be intercepted by NSA: report 
 
Attackers raid BitCoin wallets via Android key flaws 
 
Flaw makes Android phones open to hijacking 
By Darren Pauli | Jul 4, 2013 | Comment Now 
Signatures silently modified.
 
Security holes poked in Mega's 'secure' cloud 
By Darren Pauli | Jan 22, 2013 | Comment Now 
MegaCracker tool could reveal Mega passwords.
 
MegaCracker tool could reveal Mega passwords 
By Darren Pauli | Jan 22, 2013 | Comment Now 
Boffin claims registration process reveals vulnerable hash.
 
Co-lo VMs busted by crypto attack 
By Darren Pauli | Nov 6, 2012 | Comment Now 
Side-channel cache-sniffers steal keys.
 
Researchers detail SSL implementation holes 
By Darren Pauli | Oct 29, 2012 | Comment Now 
Developers caught out by 'rude' report.
 
Researchers detail laundry list of dodgy crypto deployments 
By Darren Pauli | Oct 26, 2012 | Comment Now 
Developer hits back at 'rude' research.
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Should law enforcement be able to buy and use exploits?



   |   View results
Yes
  14%
 
No
  51%
 
Only in special circumstances
  17%
 
Yes, but with more transparency
  18%
TOTAL VOTES: 769

Vote