Advertised sites are not endorsed by us. They may be
unsafe, untrustworthy, or illegal in your jurisdiction.
Press release
Submit a press release here.
How to hack
A menacing hand'€™s shadow on a computer keyboard in front of printed computer data. Dramatic light, high contrast.
Hacker hands
password typist
virtual private network (VPN)
Hacked’s Wiki
Trending Topics
Stephen Hawking
Posts Tagged ‘cryptography’
Most Recent
Read More
August 18, 2015

Cryptographers Develop Encryption Method Resistant to Future Quantum Attacks

Cryptographers are working on new encryption methods able to protect today’s Internet communications from future quantum computers that can be able to break today’s cryptography techniques. The researchers have developed upgrades to the Internet’s core encryption protocol that will prevent quantum computer users from intercepting Internet communications.

Read More
July 29, 2015

EFF: War For Cryptography and Privacy is Raging

The Electronic Frontier Foundation says that although the government is in many cases aware of the value of cryptography, they are opposing it. The UK government is an example they make frequent use of since the country is looking at banning cryptography that does not give the government a back door.

Used properly, strong encryption can avoid data leaks from happening. If files are encrypted, then anytime they get out of their proper sphere, they are useless. Governments should be using more cryptography, not discouraging its use. The EFF has determined that governments opposing strong cryptography will ultimately have a negative impact on their economies and overall [...]

Read More
July 6, 2015

Cryptographic Software Flaws Extremely Common – Study

Inexperienced developers and complex software libraries create an environment of widespread business application failures. In the realm of Cryptography the scale of the problem is significant. Many subtle factors surround proper implementation of robust cryptographic systems beyond writing strong code.

In 2014, Gartner reported $12 billion spent securing network perimeters. In contrast, only $.6 billion was spent securing applications. There is opportunity at the application layer to reduce risk but liabilities will remain until solutions are implemented. For hackers those liabilities are opportunities.

The threat space continues to grow in [...]

Read More
July 1, 2015

David Cameron On A Mission to Destroy ‘Strong Cryptography’

British Prime Minister David Cameron believes that strong cryptography is a major barrier to peace, order, and justice, as reports

Lawful citizens, really, have no need of strong (read: backdoor-free) cryptography, goes the logic behind his position. He believes that the government should be guaranteed a way into any device being communicated with and insists that this does not inherently break the very purpose of cryptography.

Also read: Barack Obama and David Cameron’s Stance on Encryption is Morally Irresponsible

In an exchange with British representative Henry Bellingham, Cameron said:

Britain is not a state [...]

How to Hack
How Cybercriminals Target Victims: Report Cites Top Information Resources
Knowledge Base
Press Releases
eSentire Partners with Carbon Black to Provide Endpoint Detection Capabilities to the Midmarket
SecurityScorecard Announces Data Science Partnership with Columbia University