An encryption algorithm designed to protect calls on GSM phones has been broken by three cryptographers using only a dual-core, Intel -based Dell Latitude PC running Linux. In a paper released Tuesday ...
USB flash drives, iPods and other portable storage devices are pervasive in the workplace and a real threat. They can introduce viruses or malicious code to the network and be used to store sensitive ...
Al-Qaeda-linked online forum Al-Ekhlaas claims to be offering strengthened encryption software called Mujahideen Secrets 2 to its members. The surprise? It’s coming from U.S.-based Web sites. An ...