LinuxSecurity.com
Share your story
The central voice for Linux and Open Source security news
Home News Topics Advisories HOWTOs Features Newsletters About Register

Welcome!
Sign up!
EnGarde Community
Login
Polls
What is the most important Linux security technology?
 
Advisories
Community
Linux Events
Linux User Groups
Link to Us
Security Center
Book Reviews
Security Dictionary
Security Tips
SELinux
White Papers
Featured Blogs
All About Linux
DanWalsh LiveJournal
Securitydistro
Latest Newsletters
Linux Security Week: October 27th, 2014
Linux Advisory Watch: October 24th, 2014
Subscribe
LinuxSecurity Newsletters
E-mail:
Choose Lists:
About our Newsletters
RSS Feeds
Get the LinuxSecurity news you want faster with RSS
Powered By

  
Cryptography
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.



Quantum crypto pitches for data centre links  05 December 2013 
Source: The Register UK - Posted by Alex   
The quantum crypto business is hardly crowded, but ID Quantique is hoping to set itself apart with a 100 Gbps-capable unit.
 
Twitter upping security to thwart government hacking  27 November 2013 
Source: CNET - Posted by Anthony Pell   
Following in the footsteps of other tech companies, Twitter is beefing up its security to make it harder for outsiders -- including the government -- to uncover data, the company announced Friday.
 
Thales, Microsoft serve secure crypto in the cloud  25 November 2013 
Source: ZDNet Blogs - Posted by Anthony Pell   
Are you concerned about the security of your data in the cloud? Of course you should be, even if you're just an isolated consumer. But what if you're responsible for the security of data for an enterprise?
 
Newegg trial: Crypto legend takes the stand, goes for knockout patent punch  25 November 2013 
Source: arsTechnica - Posted by Alex   
Newegg's courtroom face-off with patent-licensing giant TQP Development is nearing its end. TQP has sued hundreds of companies, saying it has patented the common Web encryption scheme of combining SSL with the RC4 cipher. Almost 140 companies have paid TQP a total of more than $45 million.
 
'Encrypt everything:' Google's answer to government surveillance is catching on  22 November 2013 
Source: Network World - Posted by Anthony Pell   
While Microsoft's busy selling t-shirts and mugs about how Google's "Scroogling" you, the search giant's chairman is busy tackling a much bigger problem: How to keep your information secure in a world full of prying eyes and governments willing to drag in data by the bucket load. And according to Google's Eric Schmidt, the answer is fairly straightforward.
 
Remembering legendary Enigma code breaker Mavis Batey  21 November 2013 
Source: CNET - Posted by Dave Wreski   
Cracking one of the most complicated cipher devices ever created -- the Enigma machine -- may not have been what Britain's Mavis Batey envisioned when she studied the German romantic poets at University College London when World War II broke out.
 
Experts applaud Google completion of SSL certificate upgrade  20 November 2013 
Source: CSO Online - Posted by Anthony Pell   
Google's faster-than-expected upgrade of all its SSL certificates to an RSA key length of 2048 bits will make cracking connections to the company's services more difficult without affecting performance, experts say.
 
NSA spying prompts open TrueCrypt encryption software audit to go viral  11 November 2013 
Source: Network World - Posted by Anthony Pell   
A unique effort to crowdsource a security audit of the popular TrueCrypt open source encryption software appears to be going viral three weeks after it was launched by two U.S. based researchers in response to concerns that the National Security Agency may have tampered with it.
 
SSL Study Shows Most Sites Incorrectly Configured  08 November 2013 
Source: eSecurity Planet - Posted by Dave Wreski   
Secure Sockets Layer is a standard mechanism websites use to help secure data and transactions, but according to Qualys security researcher Ivan Ristic, most SSL sites are actually misconfigured. Ristic delivered his study here at the Black Hat security conference as an update to the preliminary data he published last month.
 
Defending Against Crypto Backdoors  22 October 2013 
Source: Schneier on Security - Posted by Anthony Pell   
We already know the NSA wants to eavesdrop on the Internet. It has secret agreements with telcos to get direct access to bulk Internet traffic. It has massive systems like TUMULT, TURMOIL, and TURBULENCE to sift through it all. And it can identify ciphertext -- encrypted information -- and figure out which programs could have created it.
 
<< Start < Prev 7 8 9 Next > End >>

Results 61 - 70 of 1123
    
Partner

 

Latest Features
Peter Smith Releases Linux Network Security Online
Securing a Linux Web Server
Password guessing with Medusa 2.0
Password guessing as an attack vector
Squid and Digest Authentication
Squid and Basic Authentication
Demystifying the Chinese Hacking Industry: Earning 6 Million a Night
Free Online security course (LearnSIA) - A Call for Help
What You Need to Know About Linux Rootkits
Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition
Yesterday's Edition
Hackers Are Using Gmail Drafts to Update Their Malware and Steal Data
Hackers target unclassified White House network
BYOD: Why the biggest security worry is the fool within rather than the enemy without
Partner Sponsor

Community | HOWTOs | Blogs | Features | Book Reviews | Networking
 Security Projects |  Latest News |  Newsletters |  SELinux |  Privacy |  Home
 Hardening |   About Us |   Advertise |   Legal Notice |   RSS |   Guardian Digital
(c)Copyright 2014 Guardian Digital, Inc. All rights reserved.