The latest version of the PHP programming language provides support for improved password hashing and high-speed cryptography.
Security researchers exposed a vulnerability in a random number generator with hardcoded keys that could lead to a crypto attack.
Blockchain technology depends on mutual trust between human participants, each of whom represents a potential weakness in the chain.
Cryptocurrencies such as bitcoin are becoming more popular, but that means cybercriminals are embracing the potential of cryptocurrency as well.
Data encryption is one of the most basic — and, given the right tools, most effective — ways to protect sensitive information from cybercriminals.
The new z14 mainframe from IBM includes a revamped coprocessor that enables pervasive encryption of both at-rest and in-transit data.
New variants of CryptoMix malware are quickly making the rounds, holding files ransom and demanding victims fork over the bitcoin.
Google's announcement of the first-ever collision attack means the Secure Hash Algorithm 1 (SHA-1) is officially no longer secure.
Starting with the release of version 7.2 at the end of this year, the core of PHP will use Libsodium by default for routine cryptographical operations.
Google's new Security Key protects users more effectively than simple two-factor authentication (2FA) without the added cost of smart hardware.