Weakness of 2G mobile phone networks revealed

The encryption scheme used for second generation (2G) mobile phone data can be hacked within seconds by exploiting weaknesses and using common hardware, A*STAR researches show. The ease of the attack shows an urgent need ...

Researcher develops intelligent encryption libraries

Sometimes, when two people or software applications are communicating via the Internet, a third party is listening. Cryptographic protocols could prevent this situation, but software developers often find it difficult to ...

Encyption debate isn't going away

The fight over encryption isn't going away just because the FBI has figured out a way to glean the data off the iPhone used by a San Bernardino attacker.

Apple-FBI encryption showdown postponed, for now

The US government's decision to delay its effort to force Apple to help unlock an attacker's iPhone may only postpone the inevitable drawn-out battle over encryption and data protection.

US warns encryption hampering anti-terror fight

US law enforcement officials warned Wednesday that criminals and terror suspects would benefit from stronger data encryption, and called for service providers to retain access to such protected data.

page 2 from 7