Mathematical basis for public-key cryptography was kept secret in its early years to avoid revealing how closely U.K. government was working with U.S. National Security Agency.
Small percentage of public keys in sample found online were not randomly generated as they should be, paper says.
Cryptography Research dodges computer attacks by having employees do Web surfing and e-mail on one network and sensitive work on another that's not connected to the Internet.
A gadget for text messaging without cell service sees a spike in interest from the pro-privacy crypto and Bitcoin communities -- even though that wasn't its creators' intention.
In what was thought an impossibility, researchers break the longest code ever over a 148-day period using 21 computers.
A new ransomware doing the rounds is one of the most vicious seen, directly targeting specific files and destroying them if you don't pay up.
National Institute of Standards and Technology says it will continue to create the "strongest possible" standards, following reports of surveillance-related meddling by the National Security Agency.
Embattled email guru Ladar Levison updates the DefCon crowd on encrypted email project DarkMail and asks for help from the hacker faithful to get what may be his final email project done.
While the tech giant explains the cause of the vulnerability that left Bitcoin digital wallets susceptible, Symantec researchers warn that hundreds of thousands of apps are at risk of similar attacks.
Electronic Privacy Information Center organizes request by leading technologists to halt National Security Agency's domestic surveillance. They're trying a novel argument from a 2011 lawsuit.