An encryption algorithm designed to protect calls on GSM phones has been broken by three cryptographers using only a dual-core, Intel -based Dell Latitude PC running Linux. In a paper released Tuesday ...
USB flash drives, iPods and other portable storage devices are pervasive in the workplace and a real threat. They can introduce viruses or malicious code to the network and be used to store sensitive ...
Al-Qaeda-linked online forum Al-Ekhlaas claims to be offering strengthened encryption software called Mujahideen Secrets 2 to its members. The surprise? It’s coming from U.S.-based Web sites. An ...
Quantum computers are the future, and a near-term future at that. They will be exponentially more powerful than the computers we have today and will allow us to make huge potential leaps forward in ...