Protecting light communication with random objects

Researchers from the Complex Photonic Systems (COPS) group used two layers of random materials to encrypt and decrypt a message sent via light communication. With that, they hid the sender and receiver simultaneously, and ...

Weakness of 2G mobile phone networks revealed

The encryption scheme used for second generation (2G) mobile phone data can be hacked within seconds by exploiting weaknesses and using common hardware, A*STAR researches show. The ease of the attack shows an urgent need ...

The future of encryption

If you want to protect valuable information, wouldn't you keep it under lock and key?

FBI chief urges 'robust debate' on encryption

FBI Director James Comey called Monday for public debate on the use of encrypted communications, saying Americans may not realize how radical groups and criminals are using the technology.

US officials warn of encrypted communications by extremists

The growing use of encrypted communications and private messaging by supporters of the Islamic State group is complicating efforts to monitor terror suspects and extremists, U.S. law enforcement officials said Wednesday.

CIA worked to break Apple encryption: report

The Central Intelligence Agency has been working for years to break encryption on Apple devices, to spy on communications of iPhone and iPad users, a report said Tuesday.

After Paris attacks, US and UK discuss privacy vs. security

President Barack Obama argued Friday that a resurgent fear of terrorism across Europe and the United States should not lead countries to overreact and shed privacy protections, even as British Prime Minister David Cameron ...

page 1 from 4