WIRED Security Latest

Silicon Valley & Technology - Voice of America

InfoWorld Security

The Register - Security

IEEE Spectrum Computing Channel

Cyberlaw - Stanford Center for Internet and Society

Help Net Security - News

Nov 24, 2014

Study on cryptographic protocols — ENISA

Cryptographic algorithms, when used in networks, are used within a cryptographic protocol. Even if the cryptographic primitives and schemes (discussed in the “Algorithms, key size and parameters” report of 2014, see link below) are deemed secure, their use within a protocol can result in a vulnerability which exposes the supposedly secured data. The report focuses on the current status in cryptographic protocols and encourages further research. A quick overview is presented on protocols which are used in relatively restricted application areas such as wireless, mobile communications or banking (Bluetooth, WPA/WEP, UMTS/LTE, ZigBee, EMV) and specific environments focusing on Cloud computing. The main emphasis of the report is on guidelines to researchers and organisations in the field. The key problem with protocols today is that many result from cryptographic design many years (even decades) ago. Thus cryptographic protocols suffer more from legacy issues than the underlying cryptographiccomponents. The goal should be to work towards a better cryptographic protocol infrastructure which does not exhibit such problems. Thus we provide in this report guidelines to organisations which are developing new protocols.
 Nov 21, 2014
Read more . .
Study on cryptographic protocols — ENISA: Study on cryptographic protocols — ENISA

IEEE Annals of the History of Computing

Here's a phish you might not spot - 60 Sec Security

Hackaday Blog

Biggest Information Security and Cybersecurity Misconceptions

Computer History Museum Videos

Slashdot: Your Rights Online

Public Key Cryptography: Diffie-Hellman Key Exchange

ComputerWeekly.com - When IT Meets Politics

Nextgov.com News Articles

Electronic Privacy Information Center

SecurityWeek

European Public Policy Blog