crypto

NIST launches post-NSA review into crypto guidance

NIST launches post-NSA review into crypto guidance

Updated: Addressing concerns over compromised algorithms.
Juha Saarinen , Brett Winterford May 15 2014 11:12AM Security
Crypto flaw reveals pollies' hateful anonymous comments

Crypto flaw reveals pollies' hateful anonymous comments

Swedish journalists find weak crypto function.
Marcos Colon Dec 16 2013 12:00PM Security
Gagged Lavabit founder discusses closure

Gagged Lavabit founder discusses closure

Scorched earth closure may have prevented national security probe.
Darren Pauli Aug 14 2013 2:30PM Security
Attackers raid BitCoin wallets via Android key flaws

Attackers raid BitCoin wallets via Android key flaws

55 Bitcoins stolen.
Danielle Walker Aug 13 2013 10:40AM Security
Encrypted email services close on fear of US interception

Encrypted email services close on fear of US interception

Silent Circle, Lavabit take action.
Darren Pauli Aug 12 2013 6:24AM Security
Silent Circle, Lavabit crypto mail shut down

Silent Circle, Lavabit crypto mail shut down

Fears of lawful interception.
Darren Pauli Aug 9 2013 3:54PM Security
Crypto collisions cause denial of service in major hashes

Crypto collisions cause denial of service in major hashes

Researchers poke holes in Murmurhash, CityHash, and others.
Darren Pauli Jan 31 2013 7:14AM Security
Crypto collisions cause denial of service in major hashes

Crypto collisions cause denial of service in major hashes

Researchers poke holes in Murmurhash, CityHash, and others.
Darren Pauli Jan 30 2013 11:09AM Security
Review: Astaro Security Gateway

Review: Astaro Security Gateway

Solid functionality with easy-to-manage policy controls, but it needs an easier way to change the default IP address.
Peter Stephenson Aug 29 2011 2:16PM Security
AISA conference draws Cisco, Schneier and CommBank

AISA conference draws Cisco, Schneier and CommBank

Themed the security 'revolution'.
SC Australia Staff Aug 22 2011 4:08PM Security
US jails Chinese crypto smuggler

US jails Chinese crypto smuggler

Defence goodies in bag.
Liam Tung Sep 17 2010 7:11AM Security
A naive view of crypto

A naive view of crypto

The idea that you can stop consumers copying electronic media doesn't hold water. But people will still try.
Nick Barron Jul 25 2007 7:57AM Security
Toshiba cracks quantum crypto conundrum

Toshiba cracks quantum crypto conundrum

Security hole in quantum key distribution plugged.
Clement James Feb 26 2007 7:55AM Security
Quantum leap for UK crypto technology

Quantum leap for UK crypto technology

The UK is finally moving into the brave new world of quantum cryptology after the commercial release of quantum encryption devices. Now Wireless will be offering MagiQ Technologies after securing a distribution deal with the New York company.
David Quainton Mar 31 2005 10:29AM Security
Crypto world rocked by potential flaws

Crypto world rocked by potential flaws

Reports from the Crypto 2004 conference have demonstrated potential attacks against MD5 and SHA hashing algorithms.
Jon Tullett Aug 19 2004 5:42PM Security
Review: Crypto Anywhere

Review: Crypto Anywhere

Encrypting email is a must for the paranoid among us, and Crypto Anywhere provides the tools necessary to encrypt and decrypt email messages. Among its new features are Outlook integration and the ability to create an executable that can run off a floppy or flash disk, thereby circumventing the need to install software on a terminal when using Crypto Anywhere in an internet café.

René Millman Jul 23 2004 12:00AM Security
Crypto man

Crypto man

Whitfield Diffie made his name in encryption back in the 1970s, paving the way for modern e-commerce. Andy Coote learns more about his early work and hears his predictions for web services and grid computing
Andy Coote Jul 8 2004 4:07PM Security
SQL Server to gain crypto

SQL Server to gain crypto

Microsoft is building encryption into its upcoming version of SQL Server.
Jon Tullett May 26 2004 2:53PM Security
Review: PicoDisk Crypto

Review: PicoDisk Crypto

The thing about carrying data on a small plug-and-play device is that the majority of them are not secure. But, if it comes from the Chrison stable of products, you can be pretty sure it will be.

Jayne Parkhouse Nov 1 2003 12:00AM Security

Log In

  |  Forgot your password?