Tags » Encryption

Pico CTF 2014 - The Valley of Fear

The hard drive may be corrupted, but you were able to recover a small chunk of text. Scribbled on the back of the hard drive is a set of mysterious numbers. 64 more words

UN: Government efforts to undermine encryption threaten basic human rights

The United States is once again at odds with the United Nations over the country’s efforts to undermine encryption tools, curtail anonymity, and engage in wanton spying. 498 more words


Social Networks Vulnerable to New Malware Called Linux/Moose

A new research paper on Linux/Moose shows that the malware is a significant threat to social networks by hijacking routers and causing havoc in more ways than one. 507 more words


Crypto Lab – Secret-Key Encryption (Part 1)

Here is the main page of the project:
Here is the detail description of the project:

The learning objective of this lab is for students to get familiar with the concepts in the secret-key encryption.

1,235 more words
Computer Security

HIPAA FAQ Series: Are Covered Entities and Business Associates Required to Encrypt PHI?

The Health Insurance Portability and Accountability Act (HIPAA) mandates that both Covered Entities and Business Associates protect the security of Protected Health Information (PHI) in a variety of ways.  432 more words

Health IT

Legal sector encryption failure gifts large payout to cyber criminals

A recent account published in the Telegraph newspaper, reported the alarming story of a London couple who inadvertently became the victims of a cruel cyber attack.  259 more words