cryptography

Can data science save social media?

The unfettered internet is too often used for malicious purposes and is frequently woefully inaccurate. Social media -- especially Facebook -- has failed miserably at protecting user privacy and block

Diversity and inclusion, data privacy and security ops will be on everyone’s mind at RSA

This week, 50,000 security professionals will descend upon San Francisco for the 27th Annual RSA Security Conference, arguably the largest global security event of the year. And for the security comm

Polish bank begins using a blockchain-based document management system

A blockchain company called Coinfirm has announced a partnership with PKO BP, a major Polish bank, to provide blockchain-based document verification using a tool called Trudatum. The project is a an a

TechVets launches to offer UK military veterans a route into cyber and startups

There’s a problem in the UK tech industry and it’s staring us in the face. The tech industry is growing at twice the rate of the wider economy and now contributes around £97bn a year, up 30pc in

1Password bolts on a ‘pwned password’ check

Password management service 1Password has a neat new feature that lets users check whether a password they’re thinking of using has already been breached. At which point it will suggest they pic

Cloudflare is protecting the internet using groovy lava lamps

Cloudflare has a unique way of protecting a huge portion of the world’s internet. They call it their Wall of Entropy; a wall lined with lava lamps that are being filmed with a camera. That data

Twitter adds support for app-based two-factor authentication

Twitter is rolling out an update to its platform security that will allow users to employ third-part authentication apps to receive a two-factor login authentication for their Twitter account. Twitter

The White House wants to ban cell phones, citing security risk

The Donald can't seem to keep his hands off the phone while in the White House, but the same rules may not apply to his staff in the near future. The White House is mulling a personal cell phone ban f

Researchers create a light-based key distribution system for quantum encryption

Researchers at Duke University, OSU and Oak Ridge National Laboratory have solved one of the biggest problems with new forms of quantum encryption: quantum key distribution. QKD is the process of dist

Tortuga Logic raises $2 million to build chip-level security systems

Tortuga Logic has raised $2 million in seed funding from Eclipse Ventures to help in their effort to maintain chip-level system security. Based in Palo Alto, the company plans to use the cash to build

The future of Blockchain infrastructure, with Gavin Wood and Jutta Steiner at Disrupt Berlin

Since its invention a few years ago, the Blockchain has become the infrastructure layer that the Internet was crying out for. The promise of a decentralised world was made in the 90s. Some 27+ or so y

Apple says claim that it reduced accuracy of Face ID to meet demand is ‘completely false’

A Bloomberg report today made claims that Apple had reduced its requirements from suppliers on the accuracy level of Face ID. Apple has issued a statement stating that the report is “completely

WPA2 shown to be vulnerable to key reinstallation attacks

A key reinstallation attack vulnerability in the WPA2 wi-fi protocol has been made public today. Security researcher Mathy Vanhoef has identified what he dubs a "serious weakness" in the wireless pr

N.Y. regulators issued Equifax with a subpoena, per report

Equifax was issued a subpoena from New York state’s financial service regulators in regards to the massive data breach the company announced last month, Reuters reported today. The regulators wa

A Google security chief considers the NSA a state-sponsored threat

Today at TechCrunch Disrupt SF 2017 Google’s Manager of Information Security Heather Adkins sat down for a fireside chat. Among the varying topics discussed, she spoke about what’s like to

New Bluetooth vulnerability can hack a phone in 10 seconds

Security company Armis has found a collection of eight exploits, collectively called BlueBorne, that can allow an attacker access to your phone without touching it. The attack can allow access to comp

A perfect storm of corporate idiocy

At this point in the game there should be a single page on every corporate website, preferably accessible from its front page, that includes the name and all contact details for the Chief Security Off

It’s time to build our own Equifax with blackjack and crypto

The private data of 143 million Equifax “customers” is now available for download. Have no doubt: This means you will be hacked. This means your SIM card can be spoofed. This means someone

Apple says its developer service was affected by a bug not a security breach

Apple has explained that an issue that briefly affected developer accounts today was caused by a bug and not a security breach as some had speculated. Earlier today (Wednesday), handfuls of reports ca

Enigma will refund ICO investors who lost $500,000 to scammers

Enigma, the investment platform that is preparing for an ICO next month, confirmed today that it will refund members of its community who lost money after a scammer compromised its social accounts. Ar
Load More