- The WIP hosted #LocalVoicesTalk about Women in Islam, a Twitter event. July 22, 2014
- Infrastructure Hackers, Script Kiddies and “Watchdogs”: A Round-up of Monsters Under the Bed from CIS/MS-ISAC June 5, 2014
- Recent Activity from The European Cyber Army (ECA) April 15, 2014
- Summary of 2013 Malware Development March 26, 2014
- Turkey Thrashes Twitter, Leaks put Gov in a Twist March 21, 2014
- Commerce Dept. Cans ICANN March 21, 2014
- Point of Sale Target’ed, Millions of Credit Cards Scraped. February 12, 2014
- Hotels May Become New Data Breach Point February 12, 2014
- New White House Initiative Pledges $750 Million for Student Technology February 12, 2014
- Mask/Careto Unmasked, Shadowy Spanish Spybots Slink into Sunset February 12, 2014
Categories » Encryption
The remarkable story of Bletchley Park’s top female codebreaker Continue reading
Collision attack against widely used MD5 algorithm took 10 hours, cost just 65 cents. Continue reading
Open source tool tests connections for crypto flaws. Continue reading
“Privacy has never been an absolute right,” GCHQ chief Robert Hannigan says. Continue reading
Darkcoin, bitcoin’s more anonymous cousin, is increasingly being used for online drug deals. Ironically, this could actually help take it mainstream.
The post Online Drug Dealers Are Now Accepting Darkcoin, Bitcoin’s Stealthier Cousin appeared first on WIRED.
Homomorphic encryption is a method for securing data whose inventor just won the MacArthur Genius Award. It could make sensitive information more secure, but it’s incredibly difficult. The post Hacker Lexicon: What Is Homomorphic Encryption? appeared … Continue reading
Google reveals features designed to make Android “Lollipop” more secure Continue reading
Organised criminal gangs are increasingly targeting high-end cars with keyless security systems, a UK motoring industry group has warned. Continue reading
On Friday afternoon Kickstarter suspended the crowdfunding campaign for Anonabox, an initiative to sell a tiny, $45 router that would run all the user’s online traffic over the anonymity network Tor. The post Kickstarter Freezes Anonabox Privacy Router… Continue reading
FBI Director James Comey used his first major policy address to warn that new encryption techniques could lock out law enforcement trying to solve crimes. He wants a back door into smartphones. Continue reading
The Tor-enabled router project known as Anonabox successfully tapped into thousands of Internet users’ desire for simpler privacy tech. Unfortunately, it wasn’t ready for the scrutiny that success brought with it.
The post Privacy Router Anonabox Gets $600K in Crowdfunding—And Huge Backlash appeared first on WIRED.
As a journalist, Laura Poitras was the quiet mastermind behind the publication of Edward Snowden’s unprecedented NSA leak. As a filmmaker, her new movie Citizenfour makes clear she’s one of the most important directors working in documentary today. And when it comes to security technology, she’s a serious geek.
The post Laura Poitras on the Crypto Tools That Made Her Snowden Film Possible appeared first on WIRED.
A new take on the secure smartphone, with a secure messaging app to go with it. Continue reading
Yet another flaw could prove to be the final nail in SSLv3’s coffin. Continue reading
Apple says its new operating system for the iPhone features encryption so secure that not even Apple has the key to it. But the FBI warns that the software could limit its ability to fight crime. Continue reading
It took the upheaval of the Edward Snowden revelations to make clear to everyone that we need protection from snooping, governmental and otherwise. Snowden illustrated the capabilities of determined spies, and said what security experts have preached for years: Strong encryption of our data is a basic necessity, not a luxury.
The post Apple’s iPhone Encryption Is a Godsend, Even if Cops Hate It appeared first on WIRED.
30 September 2014- Gizmodo Self-Destructing SSDs Will Nuke Themselves If You Text Them a Code Word
22 September 2014- Wired MIT Students Battle State’s Demand for Their Bitcoin Miner’s Source Code