Lastest episode - listen now! (Full transcript inside.)
Read moreSecurity bugs in the very code you've been told you must have to improve the security of your computer...
Read moreDevices seized, suspects interrogated and arrested, allegedly connected to devastating cyberattack on University Hospital in Düsseldorf.
Read moreRogue software packages. Rogue "sysadmins". Rogue keyloggers. Rogue authenticators. Rogue ROGUES!
Read moreSide-Channel Attack against CRYSTALS-Kyber
February 28 2023CRYSTALS-Kyber is one of the public-key algorithms currently recommended by NIST as part of its post-quantum cryptography standardization process.
Researchers have just published a side-channel attack—using...
Read moreEven in Apple's and Google's "walled gardens", there are plenty of 2FA apps that are either dangerously incompetent, or unrepentantly malicious. (Or perhaps both.)
Read moreSerious Security: GnuTLS follows OpenSSL, fixes timing attack bug
February 14 2023Conditional code considered cryptographically counterproductive.
Read moreMary Queen of Scots Letters Decrypted
February 9 2023This is a neat piece of historical research.
The team of computer scientist George Lasry, pianist Norbert Biermann and astrophysicist Satoshi Tomokiyo—all keen cryptographers—initially thought the batch...
Read more
OpenSSL fixes High Severity data-stealing bug – patch now!
February 8 20237 memory mismanagements and a timing attack. We explain all the jargon bug terminology in plain English...
Read moreHear renowned cybersecurity author Andy Greenberg's thoughtful commentary about the "war on crypto" as we talk to him about his new book...
Read more
Recent Comments