IBM just released an open source software package called HELib.
HE stands for *homomorphic encryption*, and HELib is an important cryptographic milestone.
Paul Ducklin explains why...
The federal magistrate found that forced decryption would violate the computer scientist's Fifth Amendment rights against self-incrimination. It's no triumph for the agents who fight child abuse, but it is a win for privacy and for curtailment of government power over our data.
Burglars broke into offices at video service Vudu late last month and stole hard drives containing customers' personal data, the company told customers in an email sent on Tuesday.
What's a reasonable price to pay to get your data safely returned to you from the guys who stole it?
How about 10,000 Rubles? No?
According to the cybercriminals behind this new ransomware targeting Russians, the answer is "да".
Conference season 2013 is on. While events like these can be great for networking and mindsharing, there can be computer security dangers lurking about. We've pulled together 8 IT security tips to help you stay ahead of the game.
Will chilling an Android phone to -15°C freeze the encryption keys into memory? And if so, can you use a modified version of Android to dig them out?
German researchers had a crack at it - Paul Ducklin takes a look at how things turned out.
A cipher is a method for encrypting messages to keep them safe from prying eyes. Here's our round-up of the top notable ciphertexts that have been cracked in the last five thousand years.
"There’s no disguising that this is a business that should have known better," says ICO director.
How many headlines do there have to be before companies take data security more seriously?
Human Resources and Skills Development Canada has admitted that the personal information of more than 500,000 student borrowers has gone missing, lost on an unencrypted removable hard disk.
Ouch! Haven't we learned to encrypt our customers' data yet?
When you read a message in your inbox, should you trust that the information hasn't been tampered with or that it even comes from who it claims?
Nude photos allegedly of the star began circulating soon after his laptop and camera were stolen. Clicking on such files is always a bad idea, given that malware loves to piggyback on celebrity news. Besides, as any true Belieber knows, Justin has an outie.
The internet is abuzz with whispers that Apple's iPhone 5, rumoured to be launched this week, will come with a fingerprint scanner to secure the device. If true, this could be a big step forward in iPhone's quest to become a digital wallet, but will convenience-crazy iPhone users embrace biometrics?
WiFi security around London is leaving a lot to be desired.
Learn more in our video, and how you can protect yourself better.
Bitfloor, the fourth-largest Bitcoin-to-US$ exchange, recently imploded following a security breach.
The cause of the breach was a temporary security lapse during a system upgrade.
Increasingly concerned about its reliance on Western mobile technologies and data networks, the Russian government this week announced that a government sponsored project has produced a secure tablet for use by state industries and government officials.
Over $9 million was stolen from cash machines in 280 cities around the world in less than 12 hours, using a mixture of a gang of low-level operatives and high-tech hacking.
Back up, encrypt, and beware, since your data and your gadgets are sitting ducks when they're in the repair shop, a recent bad-Apple store story reminds us.