- The WIP hosted #LocalVoicesTalk about Women in Islam, a Twitter event. July 22, 2014
- Infrastructure Hackers, Script Kiddies and “Watchdogs”: A Round-up of Monsters Under the Bed from CIS/MS-ISAC June 5, 2014
- Recent Activity from The European Cyber Army (ECA) April 15, 2014
- Summary of 2013 Malware Development March 26, 2014
- Turkey Thrashes Twitter, Leaks put Gov in a Twist March 21, 2014
- Commerce Dept. Cans ICANN March 21, 2014
- Point of Sale Target’ed, Millions of Credit Cards Scraped. February 12, 2014
- Hotels May Become New Data Breach Point February 12, 2014
- New White House Initiative Pledges $750 Million for Student Technology February 12, 2014
- Mask/Careto Unmasked, Shadowy Spanish Spybots Slink into Sunset February 12, 2014
Categories » Encryption
Americans retailers and banks are preparing for the wide release of a security technology in which a chip embedded into credit and debit cards can substantially reduce many forms of fraud. Continue reading
Prosecutors invoke 18th-century All Writs Act to get around thorny problem. Continue reading
Proof-of-concept exploit against LastPass could easily be extended to other apps. Continue reading
In 1989, the year the Berlin Wall began to fall, American artist Jim Sanborn was busy working on his Kryptos sculpture, a cryptographic puzzle wrapped in a riddle that he created for the CIA’s headquarters and that has been driving amateur and professional cryptographers mad ever since. To honor the 25th anniversary of the Wall’s […]
The post Finally, a New Clue to Solve the CIA’s Mysterious Kryptos Sculpture appeared first on WIRED.
The remarkable story of Bletchley Park’s top female codebreaker Continue reading
Collision attack against widely used MD5 algorithm took 10 hours, cost just 65 cents. Continue reading
Open source tool tests connections for crypto flaws. Continue reading
“Privacy has never been an absolute right,” GCHQ chief Robert Hannigan says. Continue reading
Darkcoin, bitcoin’s more anonymous cousin, is increasingly being used for online drug deals. Ironically, this could actually help take it mainstream.
The post Online Drug Dealers Are Now Accepting Darkcoin, Bitcoin’s Stealthier Cousin appeared first on WIRED.
Homomorphic encryption is a method for securing data whose inventor just won the MacArthur Genius Award. It could make sensitive information more secure, but it’s incredibly difficult. The post Hacker Lexicon: What Is Homomorphic Encryption? appeared … Continue reading
Google reveals features designed to make Android “Lollipop” more secure Continue reading
Organised criminal gangs are increasingly targeting high-end cars with keyless security systems, a UK motoring industry group has warned. Continue reading
On Friday afternoon Kickstarter suspended the crowdfunding campaign for Anonabox, an initiative to sell a tiny, $45 router that would run all the user’s online traffic over the anonymity network Tor. The post Kickstarter Freezes Anonabox Privacy Router… Continue reading
FBI Director James Comey used his first major policy address to warn that new encryption techniques could lock out law enforcement trying to solve crimes. He wants a back door into smartphones. Continue reading
The Tor-enabled router project known as Anonabox successfully tapped into thousands of Internet users’ desire for simpler privacy tech. Unfortunately, it wasn’t ready for the scrutiny that success brought with it.
The post Privacy Router Anonabox Gets $600K in Crowdfunding—And Huge Backlash appeared first on WIRED.
As a journalist, Laura Poitras was the quiet mastermind behind the publication of Edward Snowden’s unprecedented NSA leak. As a filmmaker, her new movie Citizenfour makes clear she’s one of the most important directors working in documentary today. And when it comes to security technology, she’s a serious geek.
The post Laura Poitras on the Crypto Tools That Made Her Snowden Film Possible appeared first on WIRED.
A new take on the secure smartphone, with a secure messaging app to go with it. Continue reading