• Linux
  • By Marius Nestor
  • May 17th, 2018
Purism Partners with Nitrokey to Reinforce the Security of Their Linux Laptops

Purism Partners with Nitrokey to Reinforce the Security of Their Linux Laptops

They created a OpenPGP-based security token called Purekey

  • Linux
  • By Marius Nestor
  • March 8th, 2018
Purism to Bring Hardware Encryption to Its Librem 5 Privacy-Focused Linux Phone

Purism to Bring Hardware Encryption to Its Librem 5 Privacy-Focused Linux Phone

The company has partnered with top cryptography pioneer

Google to Remove Weak "Crypto" Provider in Android N

Google to Remove Weak "Crypto" Provider in Android N

Developers should migrate to other Java encryption providers

Parrot Security OS 3.0 "Lithium" Is a Linux Distro for Cryptography & Anonymity

Parrot Security OS 3.0 "Lithium" Is a Linux Distro for Cryptography & Anonymity

A Debian-based, cloud-friendly penetration testing OS

Scientists Find New Way to Generate Random Numbers, Encryption Could Get a Boost

Scientists Find New Way to Generate Random Numbers, Encryption Could Get a Boost

University of Texas researchers find a way to merge two low-quality sources of random numbers into high-quality output

  • Security
  • By Catalin Cimpanu
  • December 19th, 2015
Researchers Break "Unbreakable" Quantum Cryptography

Researchers Break "Unbreakable" Quantum Cryptography

Quantum cryptography has its flaws, just like everybody else

  • Security
  • By Catalin Cimpanu
  • December 1st, 2015
Patent Troll Sues Big Companies over HTTPS

Patent Troll Sues Big Companies over HTTPS

Big brands are asked to pay royalties for usage of HTTPS

  • Security
  • By Catalin Cimpanu
  • November 12th, 2015
Cryptographically Secure Passwords Coming to WordPress, Laravel, and Symfony, but Not Joomla

Cryptographically Secure Passwords Coming to WordPress, Laravel, and Symfony, but Not Joomla

Popular PHP projects will get a boost in cryptography

All WordPress Websites at Risk, No CSPRNG Available

All WordPress Websites at Risk, No CSPRNG Available

Patch exists, but more work is necessary to be fully viable

NIST Needs to Cut Ties with the NSA, Says Advisory Committee

NIST Needs to Cut Ties with the NSA, Says Advisory Committee

Following the NSA scandal, trust in NIST is low

Bruce Schneier: Encryption Will Protect Us from Bulk Data Collection

Bruce Schneier: Encryption Will Protect Us from Bulk Data Collection

It may not keep you safe if the NSA targets you, but it has its uses

NIST Removes NSA-Made Crypto Algorithm from RNG Recommendations List

NIST Removes NSA-Made Crypto Algorithm from RNG Recommendations List

Since no one trusts this algorithm anymore, NIST removed it

Experts Find 11 Issues in TrueCrypt, but No Backdoors or Malicious Code

Experts Find 11 Issues in TrueCrypt, but No Backdoors or Malicious Code

Phase two of the audit will focus on cryptanalysis

Bruce Schneier: Surveillance Is Now the Business Model of the Internet

Bruce Schneier: Surveillance Is Now the Business Model of the Internet

We give our data to corporations and governments demand access

Belgian Cryptography Expert Was Hacked and the GCHQ and NSA Could Be Behind the Attack

Belgian Cryptography Expert Was Hacked and the GCHQ and NSA Could Be Behind the Attack

The attack was linked to the hacking of Belgacom

Bruce Schneier to Speak at TrustyCon

Bruce Schneier to Speak at TrustyCon

The agenda for the trustworthy technology conference has been finalized

BitTorrent Creator Working on Tool That Hides Secrets in Inconspicuous Files

BitTorrent Creator Working on Tool That Hides Secrets in Inconspicuous Files

Bram Cohen is collaborating with a team from Stanford on the project

 
Want more? Browse: