Skip to content
delivering award-winning technology journalism since 1991
follow me on mastodon
Toggle search form
HTTPS abusers hide malware in encrypted tunnels
Project Wycheproof shines light onto dark art of open source crypto
CryPy Python ransomware: “just let it run” says security expert
Encryption is a touchy subject for the Home Office
FBI vs. Apple: Fight for your right to bear encrypted devices
RSA 2016: Ex-NSA officer admits other countries could open encryption backdoors
Does the FBI
want a legal backdoor from Apple, rather than a technical one?
Privacy Shield hammers another nail in the coffin of data protection
Hackers could access security backdoors
We serve cookies. If you think that's ok, just click "Accept all". You can also choose what kind of cookies you want by clicking "Settings".
Choose what kind of cookies to accept. Your choice will be saved for one year.
These cookies are not optional. They are needed for the website to function.
In order for us to improve the website's functionality and structure, based on how the website is used.
In order for our website to perform as well as possible during your visit. If you refuse these cookies, some functionality will disappear from the website.
By sharing your interests and behavior as you visit our site, you increase the chance of seeing personalized content and offers.