Intel teases 'Odyssey' graphics events
Hype building for 2020 dGPU launch.
Promises a 'direct pipeline' for modders.
Will ignore hardware encryption unless forced.
You, your friend, and a spy,
Crucial, Samsung drives named.
The bad idea that never goes away.
Facebook reported weakening its encryption.
Adds per-client cryptography capabilities.
Decrypt data, inject content, the works.
Denies asking for back doors, asks for back doors.
End end-to-end encryption, says Rudd.
Devs advised to move to SHA-256 now.
Aims to find flaws in crypto libs.
Part of its cryptography advocacy.
Calls for encryption ban, history retention.
Free decryption for some victims.
Security services should have a peek.
Proposes DIME for end-to-end encryption.
Any phones near your computer right now?
Over 153 million accounts compromised.
NSA and GCHQ breaking commercial crypto.
California-based security consultant Christopher Tarnovsky wowed audiences at the Black Hat 2010 conference with a presentation on how he broke the Trusted Platform Module.
A team of security researchers have succeeded in brute-forcing their way into the RSA algorithm with a 768-bit keyspace - a feat previously estimated to take 1,500 years.
An IBM researcher has cracked the problem of processing private data with a technique for working with encrypted data without ever having access to the unencrypted versions.
A pair of security researchers are to give a presentation at PacSec this week demonstrating a method of cracking WPA wireless encryption in under fifteen minutes.
A team at Princeton University has released the source for a toolkit designed to perform a 'cold boot' attack on BitLocker and FileVault volumes - allowing access to encrypted files.