October 13, 2016
Academic researchers show how to place undetectable encryption backdoors in cryptographic keys and passively decrypt data, which could undermine confidence in certain algorithms.
September 23, 2016
A new FBI ransomware alert urges victims to report incidents to federal law enforcement, gives defense tips and urges victims to avoid paying a ransom, if possible.
June 02, 2016
In this Risk & Repeat podcast, SearchSecurity editors discuss Craig Wright's failed effort to prove he is bitcoin creator Satoshi Nakamoto and what that means for cryptocurrency.
May 03, 2016
Craig Wright's second attempt to prove he's the bitcoin creator, Satoshi Nakamoto, was debunked after fooling the mainstream press, but his motives are still a mystery.
Cryptography Get Started
Bring yourself up to speed with our introductory content
An HTTPS session with a reused nonce is vulnerable to the Forbidden attack. Expert Nick Lewis explains how the attack works, and how to properly secure HTTPS-authenticated sites. Continue Reading
The blockchain industry is hashing out how to determine a good blockchain use case, debating the usefulness of private blockchains and mapping out how regulators might benefit. Continue Reading
Blockchain in the Internet of Things has great potential, but this can't be realized without a big shift in business and economic models. Continue Reading
Evaluate Cryptography Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Worried about bad statistics? Marcus Ranum asks the former lead analyst of the 'Verizon Data Breach Investigations Report' about storytelling with data. Continue Reading
The open source model has its detractors in terms of its security, but Apple's unencrypted iOS 10 kernel raises new questions. Expert Michael Cobb explains the pros and cons. Continue Reading
In this excerpt from chapter three of Dissecting the Hack: The V3RB0TEN Network, authors Jayson E. Street, Kristin Sims and Brian Baskin discuss Bitcoin and digital currency. Continue Reading
Learn to apply best practices and optimize your operations.
Self-encrypting drives can provide added security for enterprises, but they aren't without vulnerabilities. Expert Michael Cobb explains what you need to know. Continue Reading
Implementing security for an IoT gateway is challenging. A software developer shares best practices for developing a dynamic and robust security model. Continue Reading
Recent malware issues with Lenovo's automatic update system have some worried about the risks associated with automatic updates. Experts say secure update processes are better than ever and result in less risk than waiting to patch vulnerabilities. Continue Reading
Problem Solve Cryptography Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
With data increasingly held hostage, companies are learning the downside of encryption and cryptocurrency. As some organizations admit to paying ransoms, will the problem get worse? Continue Reading
According to expert Gary McGraw, you're not helping yourself by believing the things -- all seven of them -- you've heard about secure software development. Continue Reading
Homomorphic encryption can be used to bypass encryption, but it's for the good of all. Application security expert Michael Cobb explains. Continue Reading