Data breaches, hacked systems and hostage malware are frequently topics of evening news casts — including stories of department store, hospital, government and bank data leaking into unsavor... Read more
In the digital age, security of sensitive information is of utmost importance. Many data are encrypted before they enter the data highway. Mostly, these methods use a password for decryption... Read more
Special-purpose chip reduces power consumption of public-key encryption by 99.75 percent, increases speed 500-fold. Most sensitive web transactions are protected by public-key cryptography,... Read more
While the Justice Department wages a public fight with Apple over access to a locked iPhone, government officials are privately debating how to resolve a prolonged standoff with another tech... Read more
In the wake of the revelations that intelligence agencies have been engaged in mass surveillance activities, both industry and society at large are looking for practicable encryption solutio... Read more
If implemented on a wide scale, quantum key distribution technology could ensure truly secure commerce, banking, communications and data transfer. The largest information technology agreemen... Read more
The privacy of the data that we put online has been a hot topic over the last year. In order to protect against unwanted snooping, a group of scientists has created a new secure email servic... Read more
A revolutionary new method of encrypting confidential information has been patented by scientists at Lancaster University. They have been inspired by their discoveries from human biology, wh... Read more
American voters have no way of knowing that our votes have been counted, or counted correctly. We go to the polls and we punch buttons on a screen or fill out paper ballots and put them in a... Read more
The National Security Agency programs revealed on Sept. 5 in three media reports were perhaps the most important revelations yet this summer, and have profound implications for everyone who... Read more
A data-sharing scheme utilizing an encryption manager shows the way towards low-cost, flexible and secure cloud storage services Wider adoption of cloud storage services by organizations has... Read more
There’s nothing like attendance at the annual Black Hat and Def Con security/hacker conferences to hike your paranoia into the red zone and keep it there forever. You come away with the sens... Read more
University researchers have taken an important step forward on cloud security by proving it’s possible for a server to process encrypted data and to send back a still-encrypted result.... Read more
Quantum communication systems offer the promise of virtually unbreakable encryption. Unlike classical encryption, which is used to send secure data over networks today and whose security dep... Read more
Steganography: Speaking with silence SKYPE, a computer program that allows its users to have telephone-style conversations over the internet, is extremely popular. The service, owned... Read more