Home Tags Digital Signature

Tag: Digital Signature

At death’s door for years, widely used SHA1 function is now...

(credit: Bob Embleton) For more than six years, the SHA1 cryptographic hash function underpinning Internet security has been at death's door. Now it's...

Encryption in 2016: Small victories add up

Technology development seems to gallop a little faster each year.But there's always one laggard: encryption. Why the deliberate pace? Because a single, small mistake...

NIST requests ideas for crypto that can survive quantum computers

Christmas miracle: Government preparing properly for problem expected to land in ~20 years The United States' National Institute of Standards and Technology has issued a...

The Best Encryption Software of 2017

The Electronic Frontier Foundation aims to protect Web traffic by encrypting the entire Internet using HTTPS.Chrome now puts a little warning marker in the...

Steganos Safe 18

Having your laptop stolen is traumatic; having the thief gain access to your sensitive documents could be catastrophic.To avert the possibility of catastrophe, use...

Google open-sources test suite to find crypto bugs

Working with cryptographic libraries is hard, and a single implementation mistake can result in serious security problems.To help developers check their code for implementation...

Google Test Suite Checks Open Source Cryptographic Library Security

Google's new Project Wycheproof will let software engineers look for previously known flaws in their open source cryptographic libraries. Google has released a set of...

Internet giants will join forces to stop online sharing of terrorist...

EnlargeFrettie reader comments 4 Share this story Facebook, Microsoft, Twitter, and YouTube have announced that they will be working together to curb the...

NSA could put undetectable “trapdoors” in millions of crypto keys

EnlargeJorge Láscar reader comments 30 Share this story Researchers have devised a way to place undetectable backdoors in the cryptographic keys that protect...

Welcome to the machine—Yahoo mail scanning exposes another US spy tool

EnlargeAurich / Thinkstock reader comments 25 Share this story Imagine a futuristic society in which robots are deployed to everybody's house, fulfilling a...

New cloud attack takes full control of virtual machines with little...

Enlargereader comments 33 Share this story The world has seen the most unsettling attack yet resulting from the so-called Rowhammer exploit, which flips...

The Best Encryption Software of 2016

Businesses, websites, and government agencies that store your personal data have a duty to protect that data from hackers. Not that even the best...