encryption
See the following -
10 of Today's Really Cool Network & IT Research Projects
University at Buffalo and Northeastern University researchers are developing hardware and software to enable underwater telecommunications to catch up with over-the-air networks. This advancement could be a boon for search-and-rescue operations, tsunami detection, environmental monitoring and more. Sound waves used underwater are just no match for the radio waves used in over-the-air communications, but the researchers are putting smart software-defined radio technology to work in combination with underwater acoustic modems...
- Login to post comments
10 Reasons To Fear LinkedIn’s New Service
The business social media network wants to rout your email. The benefits to you are unclear... Read More »
- Login to post comments
Another Heartbleed-Style OpenSSL Vulnerability Discovered
Just a few months after Heartbleed was discovered and (thankfully) resolved, another OpenSSL bug is haunting web encryptions. The new bug SSL/TLS MITM was posted by the OpenSSL group in a formal advisory on Thursday...
- Login to post comments
Anti-RSA TrustyCon Draws Packed House Seeking Modern Security Know-How
Disgusted by the possibility that RSA took $10 million in NSA money to use a deliberately flawed encryption algorithm, a small contingent of folks originally slated to appear at the 2014 RSA Conference decamped and staged their own security-themed get-together: TrustyCon. Read More »
- Login to post comments
British Spies Said To Intercept Yahoo Webcam Images
A British intelligence agency collected video webcam images — many of them sexually explicit — from millions of Yahoo users, regardless of whether they were suspected of illegal activity, according to accounts of documents leaked by Edward J. Snowden. Read More »
- Login to post comments
Cory Doctorow 'There Is A War Coming: The Future Regulation Of General Purpose Computation'
Organised by The Centre for Law, Society and Popular Culture.
Cory Doctorow (craphound.com) is a science fiction author, activist, journalist and blogger — the co-editor of Boing Boing (boingboing.net) and the author of Tor Teens/HarperCollins UK novels like FOR THE WIN and the bestselling LITTLE BROTHER. Read More »
- Login to post comments
Data Protection Responses To PRISM "A Smokescreen"
An online privacy expert has denounced European responses to US Internet surveillance and called for legal immunity in Europe for those that report its effects. [...] Read More »
- Login to post comments
Direct Protocol May Favor Large Providers And Vendors
A medical group's call for allowing licensed physicians, without vendor interference, to designate any recipients or senders of messages using the Direct protocol puts a spotlight on nagging EHR interoperability issues. Read More »
- Login to post comments
Does Windows 8 Help The Government To Spy On Us?
The Microsoft fan club is up in arms. Those reports about Windows 8 allowing the government to spy on us? Nonsense, they fuss. It's simply not true that Windows 8 combines with Trusted Platform Module (TPM) to create a built-in back door for surveillance by the National Security Agency (NSA). Read More »
- Login to post comments
Exclusive: Years After Manning Leaks, State Department Cable System Lacks Basic Security
The State Department’s communications system is operating without basic technical security measures in place, despite warnings about its vulnerabilities, according to documents obtained by BuzzFeed and sources who have worked on the project. [...] Read More »
- Login to post comments
Feds Put Heat On Web Firms For Master Encryption Keys
Whether the FBI and NSA have the legal authority to obtain the master keys that companies use for Web encryption remains an open question, but it hasn't stopped the U.S. government from trying. Read More »
FIS Releases Major Upgrade to GT.M - the Leading Open Source "NoSQL" Platform in Healthcare
FIS has just released a major upgrade to GT.M. GT.M is the database of record and “NoSQL” application development & deployment platform at some of the largest real-time core-banking and electronic health record systems deployments around the world. With its source code available under a free / open source software (FOSS) license, GT.M has been downloaded over 135,000 times from its primary site, is bundled with selected applications, and can be installed on contemporary Debian/Ubuntu systems with sudo apt-get install fis-gtm.
- Login to post comments
Forced Exposure
The owner of Lavabit tells us that he's stopped using email and if we knew what he knew, we'd stop too. There is no way to do Groklaw without email. Therein lies the conundrum. What to do? Read More »
- Login to post comments
Here's Everything Microsoft Is Letting the Government See
For the first time, The Guardian is detailing how a tech company works with the National Security Agency to share user information under the NSA's PRISM program. Unfortunately, that tech company happens to be Microsoft, the one that makes the operating system used on 92 percent of computers in the world. Read More »
- Login to post comments
How Healthcare.gov Could Be Hacked
Security experts say the federal health insurance website is vulnerable to a common technique that hackers use to steal personal information. Read More »
- Login to post comments