How to foil the NSA and GCHQ with strong encryption
The most interesting device shown at Mobile World Congress (MWC) in Barcelona this week was the secure Blackphone developed by Silent Circle and Geeksphone.The Blackphone features anonymous search,...
View ArticleFreedomPop announces The Privacy Phone, a modified Galaxy S2 with built-in...
At first it was apps like Wickr and Silent Circle designed to keep users’ communications safe but now we’re seeing more solutions baked right into handsets. Blackphone is perhaps the most popular...
View ArticleEdward Snowden speaks up for encryption at SXSW
Edward Snowden has taken part in a video conversation at the South By Southwest (SXSW) conference along with representatives of the American Civil Liberties Union.The talk was announced last week, and...
View ArticleQuantum Encryption Is On The Verge Of Solving The '100-Year Problem' In Data...
Michele Mosca is co-founder and Deputy Director of the Institute for Quantum Computing, and a founding member of the Perimeter Institute for Theoretical Physics.He's got a front row seat to all things...
View ArticleA new quantum-cryptography scheme to secure anonymous transactions
An international team has demonstrated a form of quantum cryptography that can protect people doing business with others they may not know or trust – a situation encountered often on the Internet and...
View ArticleGoogle starts encrypting search data to protect users from NSA snooping
Google has started encrypting its search data to protect users from surveillance by state intelligence outfits like the US National Security Agency (NSA) as well as hackers.Google said that the PRISM...
View ArticleFacebook's security chief talks encryption plan
Facebook has built its business upon the sharing of content between people worldwide, but protecting that data is a gargantuan responsibility -- one that demands an increasing amount of...
View ArticleDumb hackers leave encryption keys on victims' PCs
The latest Crypto ransomware scam – CryptoDefense – leaves victims with a key to unlock their own PC, according to security researchers.The aggressive CryptoLocker ransomware appeared last year,...
View ArticleResearchers uncover NSA tool, enables faster cracking of flawed RSA algorithm
In December 2013, RSA was accused – based on documents leaked by Edward Snowden – of entering into a secret $10 million agreement with the NSA to use a flawed encryption formula in its products, but a...
View ArticleTrueCrypt audit finds "no evidence of backdoors" or malicious code
On Monday, after seven months of discussion and planning, the first-phase of a two-part audit of TrueCrypt was released.The results? iSEC, the company contracted to review the bootloader and Windows...
View Article
More Pages to Explore .....