Leading browser makers say “no” to porous encryption algorithmmore »
Users should upgrade to the new version as soon as possiblemore »
The Internet community officially banishes the notoriously unsafe Secure Sockets Layer protocol.more »
The Obama White House has issued a memorandum telling all US government agencies they must use HTTPS for all websites and web communication.more »
New crypto policy system will offer easier configuration and more uniform security.more »
New mail protocol will shut out the NSA and prevent snooping on metadata.more »
Communication in the Post-PRISM World PRISM Break: Part 1Aug 12, 2013
Linux users didn’t need the recent NSA eavesdropping scandal to convince them that securing communication was a good idea. For years, free software developers have been creating secure tools that offer similar functionalities to all of those popular but very leaky services with ridiculous names.more »
OpenSSL with Bash Using the OpenSSL toolkit with BashDec 04, 2012
Cryptography is an important part of IT security, and OpenSSL is a well-known cryptography toolkit for Linux. Experts depend on OpenSSL because it is free, it has huge capabilities, and it’s easy to use in Bash scripts.more »
Bug database has a bug of its own that could allow an intruder to create an unauthorized account.
Report focuses federal resources on achieving universal Internet access.
Leading browser makers say “no” to porous encryption algorithm
Report from the X-Force group says attackers are using TOR to hide their crimes
Future Firefox extensions will be compatible with Chrome.
Better read this if you bought your computer before 2011
Users should upgrade to the new version as soon as possible
Xen project announces a privilege escalation problem for Qemu host systems
Attackers can compromise an Android phone just by sending a text message
PC vendor will pre-install Ubuntu on portables in India.