Don't-Miss Encryption Stories
Ash Carter will speak to big-name execs at the secretive Sun Valley conference
A modular approach makes it easier to switch encryption algorithms and keys
James Comey said that these communications may not be intercepted despite court orders
The s2n module could serve as a leaner replacement for the OpenSSL TLS module
Lack of specialized training for developers and crypto libraries that are too complex lead to widespread encryption failures
The flaw could allow an attacker to decrypt traffic exchanged by three Cisco virtual appliances
Let's Encrypt will start issuing a few certificates next month while it ensures the system is reliable
All public sites will be required to use the protocol by the end of 2016
GitHub revoked the keys, but it's not clear if they were ever abused by attackers
The company's change follows an industry move to retire the use of the SHA-1 hashing algorithm
Don't let hackers take your Facebook account. Protect your email notifications with OpenPGP.
On tap: the Project Vault secure MicroSD card, Project Abacus password replacement and other tech to improve users' security.
The flaw is closely related to FREAK and involves downgrading TLS connections to a weak key
The firms signed a group letter calling on the president to resist security workarounds demanded by law enforcement
TeslaCrypt creators negotiated with victims, earned over $76,000 in two months, electronic documents reveal.
Encryption ArticlesNext Page