Google's announcement of the first-ever collision attack means the Secure Hash Algorithm 1 (SHA-1) is officially no longer secure.
Starting with the release of version 7.2 at the end of this year, the core of PHP will use Libsodium by default for routine cryptographical operations.
Google's new Security Key protects users more effectively than simple two-factor authentication (2FA) without the added cost of smart hardware.
The race is on to devise an effective method of quantum-safe encryption to cope with the security implications of this emerging technology.
Blockchain and Cryptography: The New Gold Standard Over the past 200 years, the role of gold in international trade has been undeniable as a means to standardize prices across currencies and secure payments across borders. Before 1875, global...
Quantum computing promises to overhaul the information security industry. How can security teams compete with machines capable of decoding any encryption?
SEC Consult found that sharing of nonunique crypto keys is up 40 percent over the last nine months, putting 4.5 million devices at risk.
Cybercriminals developed HEIST, or "HTTP Encrypted Information can be Stolen Through TCP-Windows," to steal data using a cryptographic scheme.
The new version of the Petya ransomware features the proper implementation of Salsa20 as well as a more complex preprocessing algorithm.
IBM's introduction of quantum computing services on the cloud could change cybersecurity, cryptography and testing methods as we know it.