70 Results for

cipher

Article

Transcending Moore's Law

Technology's advances can sometimes leave us breathless. Get used to it. We're always going to feel that way.

By July 17, 2015

Article

More than 1,200 popular Android apps still vulnerable to FREAK

Researchers from FireEye claim the security risks posed by the FREAK bug are far from over.

By March 18, 2015

Article

Microsoft Windows update addresses FREAK flaw, Stuxnet worm

The fix comes less than a week after Redmond acknowledged vulnerability to decade-old encryption flaw.

By March 10, 2015

Article

Microsoft Windows vulnerable to 'FREAK' encryption flaw too

Previously thought limited to Apple and Google browsers, the flaw leaves communications between affected users and websites open to interception.

By March 5, 2015

Article

The 404 1,251: Where we find the cipher in the sound (podcast)

Leaked from today's show: Facebook cryptography, steganography in social media, crowd-sourcing a witch hunt, and demonic portraits purposely hidden beneath waves of electronic music.

By April 17, 2013

Article

Be a code breaker: Enigma machines up for auction

Bid on a piece of WWII spy history with an unprecedented collection of cipher machines and accessories up for sale at Christie's auction house through Dec. 3.

By December 2, 2014

Article

Martian meteorite, alien, robo-bunny head go up for bid

Here's a rare chance to own everything from an Enigma machine to a life-size alien statue when Christie's Out of the Ordinary auction kicks off.

By August 5, 2014

Article

Down the rabbithole of Alfa-Arkiv

A new iOS game seems to be reviving the five-year-old Junko Junsui ARG that had apparently vanished from the web.

By July 24, 2014

Article

NSA's coded tweet deciphered -- read what it says

The National Security Agency sent out a mysterious coded tweet Monday, which has since been deciphered.

By May 6, 2014

Article

New algorithms speed secure communications for Chrome on Android

Security is a constant cat-and-mouse game, and Google is promoting new algorithms that combine stronger security with faster performance to keep attackers at bay.

By April 25, 2014