Kim Dotcom is starting a VC fund for privacy-focused startups
Mega creator Kim Dotcom, who has been a staunch advocate of privacy, announced that he's looking for fund managers and general partners for a new privacy-focused VC fund. Kim Dotcom is starting a VC...
View ArticleResearchers find way to encrypt software with “mathematical jigsaw puzzles”
A UCLA computer professor and his team of researchers have figured out a new method of encryption, utilizing complex mathematical functions. Researchers find way to encrypt software with “mathematical...
View ArticleFirst Lavabit, now Silent Circle: Another U.S. secure email service closes to...
Silent Circle, co-founded by email security guru Phil Zimmermann, has pulled out of the secure email business. It was a pre-emptive measure inspired by Lavabit's self-shuttering, and a worrying sign...
View ArticleThis can’t be good for Dropbox for Business
Uh-oh. White hat hackers reverse engineer Dropbox client-side encryption ... but it may not be as bad as it sounds This can’t be good for Dropbox for Business originally published by Gigaom, ©...
View ArticleThe NSA has cracked the secure internet: 3 things to know about the latest...
New leaks reveal how the government is using a massive secret program to break into personal, business and financial communications long considered secure. Here's the most important takeaways. The NSA...
View ArticleA question of trust: Why the NSA revelations have the security industry in...
The Snowden scoops have caused a great deal of excitement in the security community, of both the good and bad kinds. But mostly bad -- when your job is to help people rest easy, but you can't rest easy...
View ArticleSilent Circle will “move on” from NSA-associated encryption standards, but is...
The secure communications firm will bring in default replacements for widely-used encryption standards that came out of the U.S. National Institute of Standards and Technology (NIST). However, at least...
View ArticleDataguise, a big data security startup, raises $13M
Startup Dataguise has closed a $13 million series B investment round “led by Toba Capital with additional capital coming from the investment arm of a leading electronic conglomerate,” according to a...
View ArticleHow to find the right data-protection solution in the cloud era
Outages and data loss reinforce the critical importance of thorough disaster recovery and business continuity.Today's cloud-based solutions, however, are limited — something data protection vendors...
View ArticleNSA targets Tor: leaks show how US weakens the privacy tools it pays to build
The United States paid to build the Tor network, which provides a secure way to communicate for everyone, including the military and dissidents. Why, then, is it also trying to compromise it? NSA...
View ArticleNo, Edward Snowden is not stupid – he says he no longer has a copy of the NSA...
Edward Snowden has given a rare interview to The New York Times, saying he never retained a copy of his leaked NSA material after passing it on to journalists in Hong Kong. This is crucial, as some...
View ArticleSnowden’s legacy: The open web could soon be encrypted by default
You may be familiar with the "https" prefix that tells you your connection is secure. Well, get ready to see a lot more of it -- standards-makers have decided that HTTP version 2 will only work with...
View ArticleNot Smart: LG TVs reportedly spy on attached hard drives and send data back...
LG’s Smart TVs may be reporting a tad too much information back to the company’s servers, according to a detailed and convincing post by British blogger “DoctorBeet”. Apparently in the name of targeted...
View ArticleiPhones out in German parliament as parties opt for encrypted communications
Politicians from Germany’s two biggest parties are currently negotiating what their grand coalition will look like, and they’ve reportedly decided on at least one thing: they need encrypted phones....
View ArticleSay hello to Safeplug, Pogoplug’s $49 Tor-in-a-box for anonymous surfing
The box takes a minute to set up and promises anonymity for all surfing done through the connected router. It may not prove quite that simple to use in reality, but it's certainly an intriguing and...
View ArticleGoogle catches French finance ministry pretending to be Google
The incident, which was probably a case of the French finance ministry going overboard in its efforts to monitor employee activities, provides a timely reminder of how certificates are the weak point...
View ArticleProcessors can (in theory at least) give up encryption keys through the...
Strong encryption may still work, despite the best efforts of the NSA, but a new research paper suggests that clever audio analysis can recover users’ private encryption keys. The exploit takes...
View ArticleNSA’s quantum ambitions revealed in Snowden documents
The NSA is trying to build a quantum computer in order to break today’s digital encryption and create new types of encryption, the Washington Post has used documents leaked by Edward Snowden to reveal....
View ArticleIf RSA was hoping NSA furor would fade away, it was mistaken
A half dozen security experts pull out of annual RSA gabfest slated to take place in San Francisco next month. Would-be speakers are protesting RSA's reported cooperation with NSA. If RSA was hoping...
View ArticleBritish pushed for weak encryption at birth of digital mobile telephony — report
Norway’s Aftenposten has published an interesting account of the decisions taken by those who were formulating GSM – the world’s most widely deployed mobile telephony standard – in Europe in the early...
View Article