The new z14 mainframe from IBM includes a revamped coprocessor that enables pervasive encryption of both at-rest and in-transit data.
New variants of CryptoMix malware are quickly making the rounds, holding files ransom and demanding victims fork over the bitcoin.
Google's announcement of the first-ever collision attack means the Secure Hash Algorithm 1 (SHA-1) is officially no longer secure.
Starting with the release of version 7.2 at the end of this year, the core of PHP will use Libsodium by default for routine cryptographical operations.
Google's new Security Key protects users more effectively than simple two-factor authentication (2FA) without the added cost of smart hardware.
The race is on to devise an effective method of quantum-safe encryption to cope with the security implications of this emerging technology.
Blockchain and Cryptography: The New Gold Standard Over the past 200 years, the role of gold in international trade has been undeniable as a means to standardize prices across currencies and secure payments across borders. Before 1875, global...
Quantum computing promises to overhaul the information security industry. How can security teams compete with machines capable of decoding any encryption?
SEC Consult found that sharing of nonunique crypto keys is up 40 percent over the last nine months, putting 4.5 million devices at risk.
Cybercriminals developed HEIST, or "HTTP Encrypted Information can be Stolen Through TCP-Windows," to steal data using a cryptographic scheme.