NIST Says Don’t Use our Crypto Algorithm
Standing accused of NSA interference in its processes, and backdoors in its algorithms, NIST now says our crypto standards and processes are sound — but don’t use the elliptic curve algorithm.
More results...
Standing accused of NSA interference in its processes, and backdoors in its algorithms, NIST now says our crypto standards and processes are sound — but don’t use the elliptic curve algorithm.
Fittingly, Twitter tweeted its Thursday announcement: “We’ve confidentially submitted an S-1 to the SEC for a planned IPO. This Tweet does not constitute an offer of any securities for sale.” Now, back to work, it added.
A panel of industry experts and members of the Trusted Computing Group (TCG) convened at the Trusted Computing Conference in Orlando this week to discuss the value behind common, hardware-based standards and why it has thus far been a tough sell for th…
One of the world’s largest corporations has been hit with a widespread data breach: Vodafone Germany said that personal information on more than two million mobile phone customers has been stolen, possibly by a company insider.
BlackBerry prides itself on its reputation as providing a secure mobile option – but it too occasionally finds flaws. The company’s Security Incident Response Team (BBSIRT) has released four security advisories having to do with Adobe Flash Player, Web…
Despite speculation that Operation PRISM and concerns over NSA surveillance are spurring users to take up online privacy safeguards in droves, the sudden spike in usage for the Tor browser that began in August can be attributable to pretty much one thi…
The latest analysis from a major Russian security firm indicates that the Russian cybercrime market has contracted by 6% – down from $2,055 million in 2011 to $1,936 million in 2012.
The US National Security Agency (NSA) will advise that all IT products purchased by government agencies to protect information on national security systems make use of hardware-based trusted platform module (TPM) chips or security devices.
A vast majority – 81% – of Windows machines are running an outdated version of Java, leaving their users wide open to known exploits.
A nasty Android trojan, dubbed Obad.a, is being spread using botnets controlled by other criminal groups and created using a different malware – an “alien” distribution scheme that has peaked researcher interest.