Iraqi insurgents hacked Predator drone feeds, U.S. official indicatesThis level of incompetence is truly embarrassing. Just because the crypto you are using slows things down doesn't mean you switch to…
Aloha,We need a person to help us write a short white paper on the use of our Soundpaper technology in security applications. You should have a good working knowledge of encryption, digital signatures, security applications in both commerce and military. Also we will want to see a sample of your…
I liked the movie "Contact", and I like the concept of pi.. but this hack on the Time.com 100 Most Influential People of 2009 is just hilarious.At the very least, please... let's not use HTTP GET for any non-idempotent…
Dr. Thomas R. Johnson's American Cryptology During the Cold War, Books I, II and III have been recently released on the National Security Archive page. While apparently quite a bit has been redacted by the NSA ("No Such Agency", to some),…
Just saw a link to an interesting story on researchers at UC San Diego developing an impressive proof-of-concept where they duplicate a physical key with just only a photograph. (Saw this on Bruce Schneier's blog)This brings to mind an…
Submissions have or will be closing for proposals on a new hash algorithm to be called SHA-3 . Bruce Schneier and some other very significant others have got their Skein Hash Function family posted online…
CNET reports that PGP and IBM are among a handful of corporations looking to raise money to help Bletchley Park from falling into disrepair. Bletchley Park is the home of what is arguably the world's first programmable computer,…
Great guide on using OpenVPN to secure your transmission when at public hotspots and cafes.This looks very interesting and I am looking forward to setting this up this weekend when I have more…
Link to article on the wealthy in Mexico implanting chips in themselves so that they can be located via satellite in case of kidnapping. Even some…