encryption

See the following -

10 of Today's Really Cool Network & IT Research Projects

Bob Brown | Network World | February 1, 2016

University at Buffalo and Northeastern University researchers are developing hardware and software to enable underwater telecommunications to catch up with over-the-air networks. This advancement could be a boon for search-and-rescue operations, tsunami detection, environmental monitoring and more. Sound waves used underwater are just no match for the radio waves used in over-the-air communications, but the researchers are putting smart software-defined radio technology to work in combination with underwater acoustic modems...

Read More »

10 Reasons To Fear LinkedIn’s New Service

Bishop Fox | Salon | October 26, 2013

The business social media network wants to rout your email. The benefits to you are unclear... Read More »

Another Heartbleed-Style OpenSSL Vulnerability Discovered

Polly Mosendz | Nextgov.com | June 6, 2014

Just a few months after Heartbleed was discovered and (thankfully) resolved, another OpenSSL bug is haunting web encryptions. The new bug SSL/TLS MITM was posted by the OpenSSL group in a formal advisory on Thursday...

Read More »

Anti-RSA TrustyCon Draws Packed House Seeking Modern Security Know-How

Serdar Yegulalp | InfoWorld | February 28, 2014

Disgusted by the possibility that RSA took $10 million in NSA money to use a deliberately flawed encryption algorithm, a small contingent of folks originally slated to appear at the 2014 RSA Conference decamped and staged their own security-themed get-together: TrustyCon. Read More »

British Spies Said To Intercept Yahoo Webcam Images

Nicole Perlroth and Vindu Goel | New York Times | February 27, 2014

A British intelligence agency collected video webcam images — many of them sexually explicit — from millions of Yahoo users, regardless of whether they were suspected of illegal activity, according to accounts of documents leaked by Edward J. Snowden. Read More »

Cory Doctorow 'There Is A War Coming: The Future Regulation Of General Purpose Computation'

Staff Writer | YouTube | April 23, 2012

Organised by The Centre for Law, Society and Popular Culture.
Cory Doctorow (craphound.com) is a science fiction author, activist, journalist and blogger — the co-editor of Boing Boing (boingboing.net) and the author of Tor Teens/HarperCollins UK novels like FOR THE WIN and the bestselling LITTLE BROTHER. Read More »

Data Protection Responses To PRISM "A Smokescreen"

Simon Phipps | Computerworld | June 17, 2013

An online privacy expert has denounced European responses to US Internet surveillance and called for legal immunity in Europe for those that report its effects. [...] Read More »

Direct Protocol May Favor Large Providers And Vendors

Scott Mace | HealthLeaders Media | December 10, 2013

A medical group's call for allowing licensed physicians, without vendor interference, to designate any recipients or senders of messages using the Direct protocol puts a spotlight on nagging EHR interoperability issues. Read More »

Does Windows 8 Help The Government To Spy On Us?

Steven J. Vaughan-Nichols | Computerworld | September 9, 2013

The Microsoft fan club is up in arms. Those reports about Windows 8 allowing the government to spy on us? Nonsense, they fuss. It's simply not true that Windows 8 combines with Trusted Platform Module (TPM) to create a built-in back door for surveillance by the National Security Agency (NSA). Read More »

Exclusive: Years After Manning Leaks, State Department Cable System Lacks Basic Security

Justine Sharrock | BuzzFeed | October 2, 2013

The State Department’s communications system is operating without basic technical security measures in place, despite warnings about its vulnerabilities, according to documents obtained by BuzzFeed and sources who have worked on the project. [...] Read More »

Feds Put Heat On Web Firms For Master Encryption Keys

Declan McCullagh | CNET | July 24, 2013

Whether the FBI and NSA have the legal authority to obtain the master keys that companies use for Web encryption remains an open question, but it hasn't stopped the U.S. government from trying. Read More »

FIS Releases Major Upgrade to GT.M - the Leading Open Source "NoSQL" Platform in Healthcare

Press Release | FIS Global | March 29, 2016

FIS has just released a major upgrade to GT.M. GT.M is the database of record and “NoSQL” application development & deployment platform at some of the largest real-time core-banking and electronic health record systems deployments around the world. With its source code available under a free / open source software (FOSS) license, GT.M has been downloaded over 135,000 times from its primary site, is bundled with selected applications, and can be installed on contemporary Debian/Ubuntu systems with sudo apt-get install fis-gtm.

Forced Exposure

Pamela Jones | Groklaw | August 20, 2013

The owner of Lavabit tells us that he's stopped using email and if we knew what he knew, we'd stop too. There is no way to do Groklaw without email. Therein lies the conundrum. What to do? Read More »

Here's Everything Microsoft Is Letting the Government See

Philip Bump and Rebecca Greenfield | The Atlantic Wire | July 11, 2013

For the first time, The Guardian is detailing how a tech company works with the National Security Agency to share user information under the NSA's PRISM program. Unfortunately, that tech company happens to be Microsoft, the one that makes the operating system used on 92 percent of computers in the world. Read More »

How Healthcare.gov Could Be Hacked

Dana Liebelson | Mother Jones | October 24, 2013

Security experts say the federal health insurance website is vulnerable to a common technique that hackers use to steal personal information. Read More »