Security News

Red October crypto app adopts "two-man rule" used to launch	nukes
2013-11-26 06:47

http://arstechnica.com/security/2013/11/red-october-crypto-app-adopts-two-man-rule-used-to-launch-nukes/ By Dan Goodin Ars Technica Nov 25 2013

How a Crypto 'Backdoor' Pitted the Tech World Against the NSA
2013-09-25 06:33

http://www.wired.com/threatlevel/2013/09/nsa-backdoor/ By Kim Zetter Threat Level Wired.com 09.24.13

Suspect NIST crypto standard long thought to have a back door
2013-09-19 07:37

http://gcn.com/articles/2013/09/17/nist-cryptography-standard.aspx By Kevin McCaney GCN.com Sep 17, 2013

Crypto prof asked to remove NSA-related blog post
2013-09-10 06:40

http://arstechnica.com/security/2013/09/crypto-prof-asked-to-remove-nsa-related-blog-post/ By Nate Anderson Ars Technica Sept 9 2013

Attackers sign malware using crypto certificate stolen from Opera Software
2013-06-28 08:26

http://arstechnica.com/security/2013/06/attackers-sign-malware-using-crypto-certificate-stolen-from-opera-software/ By Dan Goodin Ars Technica June 26 2013

Prepare for 'post-crypto world', warns godfather of encryption
2013-03-04 06:42

http://www.theregister.co.uk/2013/03/01/post_cryptography_security_shamir/ By John Leyden The Register 1st March 2013

Virtual machine used to steal crypto keys from other VM on same server
2012-11-07 07:44

http://arstechnica.com/security/2012/11/crypto-keys-stolen-from-virtual-machine/ By Dan Goodin Ars Technica Nov 6 2012

SHA1 crypto algorithm underpinning Internet security could fall by 2018
2012-10-08 06:16

http://arstechnica.com/security/2012/10/sha1-crypto-algorithm-could-fall-by-2018/ By Dan Goodin Ars Technica Oct 6, 2012

Private crypto key in mission-critical hardware menaces electric grids
2012-08-23 09:17

http://arstechnica.com/security/2012/08/mission-critical-hardware-flaw/ By Dan Goodin Ars Technica Aug 22, 2012

Computer game secures crypto systems from rubber hose attacks
2012-07-23 16:03

http://arstechnica.com/security/2012/07/guitar-hero-crypto-blunts-rubber-hose-attacks/ By Dan Goodin Ars Technica July 20, 2012