Facebook Messenger Finally Adds End-to-End Encryption

It seems that Facebook is finally coming to its senses and catching up to basically all of the other chat apps by adding end-to-end encryption to it Messenger. The “secret conversations” feature makes chats visible only to the sender and reader (finally!). This means that anyone other than a sender or a reader, including Facebook …

New Anonymity Network Created

Anonymity networks are very important because they protect people living under repressive regimes from surveillance of their Internet use. As one of the most popular free anonymity networks, Tor, was recently discovered to have a security vulnerability, researchers and computer scientists tried to come up with more secure anonymity networks. And they have succeeded: a …

Fixing Security Gaps in Internet Encryption Protocol TLS

The Internet encryption protocol TLS (Transport Layer Security) is being modified. Involved in attacks, researchers and IT experts have now contributed to revealing serious security gaps in the protocol. The researchers have succeeded in stealing a key that two parties had negotiated via TLS version 1.2. This kind of a key is required when communication …

Improving Internet-Attack Detections

The number of internet attacks is growing rapidly, which puts a very heavy strain on traditional methods of intrusion detection. Also, these classic methods are not prepared for the growing number of connected devices or Internet of Things. The good news is, a researcher from University of Twente’s CTIT institute has developed another method of …

Your PC’s Cooling Fans Can Reveal Passwords and Encryption Keys

Not to make you paranoid or anything, but here’s a security update: researchers have shown that the sounds made by a PC’s cooling fan can be analyzed and interpreted to extract pretty much anything – from passwords to encryption keys. How is this possible, you ask? With a fan-exploiting malware called “Fansmitter”. Basically, your computer …

Internet of Things: Security

Internet of things (IoT) is our future. It’s basically a network of many physical devices, such as gadgets, home appliances, vehicles, buildings, etc, wirelessly connected to the IoT. It’s expected that, by the year 2020, about 20.8 billion devices will be connected to the IoT. While it’s true the IoT will make our lives easier, …

Virtually Unbreakable Cryptographic Algorithms

Researchers from Ruhr-Universitaet-Bochum (RUB) in Germany, have developed new cryptographic algorithms that, according to them, are virtually unbreakable. Typically, cryptographic methods are created like this: somebody comes up with a new algorithm and another person tries to break it; if that person doesn’t succeed in breaking it, the algorithm is secure. However, the new algorithm …

Cellular Message Encryption Algorithm

In cryptography, the Cellular Message Encryption Algorithm (CMEA) is a block cipher that was used for increasing the security of mobile phones in USA. CMEA is among four cryptographic primitives pointed out in a Telecommunications Industry Association (TIA) standard, and the control channel is encrypted using this, rather than the voice data. In 1997, a …

Google: The Algorithm that Works on its Back

You might think that after a solid decade of search-market dominance, Google could show some relaxation. After all, it commands a 65 percent market share and is still the only company whose name is synonymous with the verb search. However, just as Google is not ready to rest on its founders, its competitors are not …

Design a site like this with WordPress.com
Get started