- Cryptography 2020 -

Crypto  Articles -  H  Crypto  List -  H  2021  2020  2019  2018  2017  2016


Date

Name

Category

Web

31.12.20

Bouncy Castle crypto authentication bypass vulnerability revealedCryptoBleepingcomputer

18.12.20

Cryptologists Crack Zodiac Killer’s 340 Cipher

Crypto

Threatpost

7.12.20

Six cryptographic trends we’ll see next year

Crypto

Net-security

25.10.20

Lightning Network discloses "concerning" crypto vulnerabilitiesCrypto

Bleepingcomputer

21.10.20

Researchers open the door to new distribution methods for secret cryptographic keys

Crypto

Net-security

9.9.20

Cryptobugs Found in Numerous Google Play Store Apps

Crypto

Threatpost
4.9.20You have two days left to purchase 2-year TLS/SSL certificatesCrypto

Bleepingcomputer

28.7.20

Encryption Under ‘Full-Frontal Nuclear Assault’ By U.S. Bills

BigBrothers  Crypto

Threatpost

23.7.20

D-Link blunder: Firmware encryption key exposed in unencrypted imageCrypto

Bleepingcomputer

22.7.20

Microsoft releases new encryption, data security enterprise tools

Crypto

Net-security

21.7.20

Microsoft to Retire TLS 1.0/1.1 in Office 365 Starting October 15Crypto

Securityweek

14.7.20

Mozilla Joins Apple, Google in Reducing TLS Certificate LifespansCrypto

Securityweek

12.7.20

Mozilla reduces TLS certificate lifespan to 1 year in SeptemberCrypto

Bleepingcomputer

12.7.20

Hundreds arrested after encrypted messaging network takeoverCrypto

Bleepingcomputer

27.5.20

Seriously, SHA3 where art thou?

Crypto

SANS
16.5.20

SHA3 Hashes (on Windows) - Where Art Thou?

Crypto

SANS
15.5.20

Modern crypto standards pave the way to stronger security

Crypto

Net-security
8.5.20

Zoom Beefs Up End-to-End Encryption to Thwart ‘Zoombombers’

Crypto

Threatpost

7.5.20

Zoom Acquires Keybase to Bring End-to-End Encryption to Video PlatformCrypto

Securityweek

6.5.20

Password psychology: People aren’t protecting themselves even though they know better

Crypto

Net-security

1.5.20

Shade Threat Actors Call It Quits, Release 750K Encryption KeysCrypto

Threatpost

23.4.20Zoom Announces Better Encryption, Other Security ImprovementsCryptoSecurityweek
10.4.20

PowerShell Sample Extracting Payload From SSL

Crypto

SANS
10.4.20

10 considerations in order to ensure business continuity for PKI

Crypto

Net-security

8.4.20

Encryption is finally being used primarily to protect personal data rather than just for compliance

Crypto

Net-security
6.4.20

TLS 1.3: Slow adoption of stronger web encryption is empowering the bad guys

Crypto

Net-security

4.4.20Keys Used to Encrypt Zoom Meetings Sent to China: ResearchersCryptoSecurityweek
31.3.20

Zettaset Launches Software-Defined Encryption for Kubernetes Environments

Crypto

Securityweek
26.3.20

Businesses can avoid fines if customer data is encrypted or redacted

Crypto

Net-security

20.3.20

Overcoming crypto assessment challenges to improve quantum readines

Crypto

Net-security

28.2.20

Tiny cryptographic ID chip can help combat hardware counterfeiting

Crypto

Net-security

21.2.20

Quick Analysis of an Encrypted Compound Document Format

Crypto

SANS

19.2.20

Jon Callas: Encryption is a technology that rearranges power

Crypto

Net-security

7.2.20

43% of cloud databases are currently unencrypted

Crypto

Net-security

31.1.20

Researchers develop new optical stealth encryption technology

Crypto

Net-security

29.1.20LoRaWAN Encryption Keys Easy to Crack, Jeopardizing Security of IoT NetworksCrypto  IoTThreatpost

18.1.20

Industry Reactions to Crypto Vulnerability Found by NSA: Feedback FridayCryptoSecurityweek

15.1.20

Encryption Battle Reignited as US Govt at Loggerheads With AppleBigBrothers  CryptoSecurityweek

2.1.20

Evolution of OpenSSL Security After HeartbleedCryptoSecurityweek