The Hacker News Logo
Click to Subscribe

The Hacker News — Latest Cyber Security News: cryptography keys

Researchers Demonstrated How NSA Broke Trillions of Encrypted Connections

Researchers Demonstrated How NSA Broke Trillions of Encrypted Connections

October 12, 2016Swati Khandelwal
In the year 2014, we came to know about the NSA's ability to break Trillions of encrypted connections by exploiting common implement...
How-to — Stealing Decryption Key from Air-Gapped Computer in Another Room

How-to — Stealing Decryption Key from Air-Gapped Computer in Another Room

February 16, 2016Swati Khandelwal
Air-gapped computers that are believed to be the most secure computers on the planet have become a regular target for researchers in re...
Millions of IoT Devices Using Same Hard-Coded CRYPTO Keys

Millions of IoT Devices Using Same Hard-Coded CRYPTO Keys

November 27, 2015Swati Khandelwal
Millions of embedded devices, including home routers, modems, IP cameras, VoIP phones, are shareing the same hard-coded SSH (Secure She...
TrueCrypt Security Audit Concludes No NSA Backdoor

TrueCrypt Security Audit Concludes No NSA Backdoor

April 03, 2015Swati Khandelwal
The Security audit of TrueCrypt disk-encryption software has been completed, with no evidence of any critical design vulnerabilities or...
Popular Encryption Software TrueCrypt Shuts Down Mysteriously

Popular Encryption Software TrueCrypt Shuts Down Mysteriously

May 29, 2014Mohit Kumar
TrueCrypt , the popular and reputed open source file and disk encryption Software for Windows, OSX and Linux, has abruptly closed down W...
Cross-VM Side-channel attacks against cryptography keys

Cross-VM Side-channel attacks against cryptography keys

November 05, 2012Mohit Kumar
A group of researchers has developed a side-channel attack targeting virtual machines that could pose a threat to cloud computing environme...
Exclusive Deals

Stay Informed — Newsletter Sign Up

Sign up for THN newsletter and get our latest stories delivered straight to your inbox.