- Linux
- By Marius Nestor
- May 17th, 2018
Purism Partners with Nitrokey to Reinforce the Security of Their Linux Laptops
They created a OpenPGP-based security token called Purekey
- Linux
- By Marius Nestor
- March 8th, 2018
Purism to Bring Hardware Encryption to Its Librem 5 Privacy-Focused Linux Phone
The company has partnered with top cryptography pioneer
- Security
- By Catalin Cimpanu
- June 12th, 2016
Google to Remove Weak "Crypto" Provider in Android N
Developers should migrate to other Java encryption providers
- Linux Distributions
- By Marius Nestor
- May 30th, 2016
Parrot Security OS 3.0 "Lithium" Is a Linux Distro for Cryptography & Anonymity
A Debian-based, cloud-friendly penetration testing OS
- Security
- By Catalin Cimpanu
- May 19th, 2016
Scientists Find New Way to Generate Random Numbers, Encryption Could Get a Boost
University of Texas researchers find a way to merge two low-quality sources of random numbers into high-quality output
- Security
- By Catalin Cimpanu
- December 19th, 2015
Researchers Break "Unbreakable" Quantum Cryptography
Quantum cryptography has its flaws, just like everybody else
- Security
- By Catalin Cimpanu
- December 1st, 2015
Patent Troll Sues Big Companies over HTTPS
Big brands are asked to pay royalties for usage of HTTPS
- Security
- By Catalin Cimpanu
- November 12th, 2015
Cryptographically Secure Passwords Coming to WordPress, Laravel, and Symfony, but Not Joomla
Popular PHP projects will get a boost in cryptography
- Security Blog
- By Ionut Ilascu
- February 12th, 2015
All WordPress Websites at Risk, No CSPRNG Available
Patch exists, but more work is necessary to be fully viable
- Online Surveillance
- By Gabriela Vatu
- July 15th, 2014
NIST Needs to Cut Ties with the NSA, Says Advisory Committee
Following the NSA scandal, trust in NIST is low
- Security
- By Gabriela Vatu
- June 2nd, 2014
Bruce Schneier: Encryption Will Protect Us from Bulk Data Collection
It may not keep you safe if the NSA targets you, but it has its uses
- Online Surveillance
- By Gabriela Vatu
- April 23rd, 2014
NIST Removes NSA-Made Crypto Algorithm from RNG Recommendations List
Since no one trusts this algorithm anymore, NIST removed it
- Security Fixes and Improvements
- By Eduard Kovacs
- April 15th, 2014
Experts Find 11 Issues in TrueCrypt, but No Backdoors or Malicious Code
Phase two of the audit will focus on cryptanalysis
- Internet Life
- By Gabriela Vatu
- April 10th, 2014
Bruce Schneier: Surveillance Is Now the Business Model of the Internet
We give our data to corporations and governments demand access
- Online Surveillance
- By Gabriela Vatu
- February 3rd, 2014
Belgian Cryptography Expert Was Hacked and the GCHQ and NSA Could Be Behind the Attack
The attack was linked to the hacking of Belgacom
- Security Blog
- By Eduard Kovacs
- January 28th, 2014
Bruce Schneier to Speak at TrustyCon
The agenda for the trustworthy technology conference has been finalized
- Security Fixes and Improvements
- By Eduard Kovacs
- January 20th, 2014
BitTorrent Creator Working on Tool That Hides Secrets in Inconspicuous Files
Bram Cohen is collaborating with a team from Stanford on the project