Samsung announces '10nm-class' LPDDR5
Aims at smartphones, AI.
Commissioned by AMD, naturally.
Partners with suppliers for 1GW of energy.
Facebook reported weakening its encryption.
Adds per-client cryptography capabilities.
Decrypt data, inject content, the works.
Denies asking for back doors, asks for back doors.
End end-to-end encryption, says Rudd.
Devs advised to move to SHA-256 now.
Aims to find flaws in crypto libs.
Part of its cryptography advocacy.
Calls for encryption ban, history retention.
Free decryption for some victims.
Security services should have a peek.
Proposes DIME for end-to-end encryption.
Any phones near your computer right now?
Over 153 million accounts compromised.
NSA and GCHQ breaking commercial crypto.
California-based security consultant Christopher Tarnovsky wowed audiences at the Black Hat 2010 conference with a presentation on how he broke the Trusted Platform Module.
A team of security researchers have succeeded in brute-forcing their way into the RSA algorithm with a 768-bit keyspace - a feat previously estimated to take 1,500 years.
An IBM researcher has cracked the problem of processing private data with a technique for working with encrypted data without ever having access to the unencrypted versions.
A pair of security researchers are to give a presentation at PacSec this week demonstrating a method of cracking WPA wireless encryption in under fifteen minutes.
A team at Princeton University has released the source for a toolkit designed to perform a 'cold boot' attack on BitLocker and FileVault volumes - allowing access to encrypted files.
The AES encryption implementation in Seagate's Momentus FD.2 range of laptop drives has been granted the US Government's most stringent security certification.
The team behind the Debian Linux project have discovered a flaw in their implementation of the OpenSSL cryptography package that has been in place since 2006.
The theory and practice of cryptography is seen by society as a mysterious art. Hollywood and suspense writers have turned it into intrigue and national security. We're here to take some of that away and replace it with a little know-how and some practical application.
The security engine, integrated onto the C7 and C7-M chips, gets some added software functionality. Security fans rejoice.