cryptography

cryptography news search results

Developer news items we found relating to cryptography

35 results
Two-strategic-advisors-join-Findora

Two strategic advisors join Findora


Friday, August 16, 2019 by

Findora, the cryptographically transparent public blockchain for building decentralized financial applications, has two new strategic advisors; Balaji Srinivasan, former CTO of Coinbase, and Professor Dan Boneh, Head of Stanford Cryptography.  Prior to joining Coinbase, Srinivasan was General Partner at Andreessen Horowitz, and co-founder of Earn.com,&...


A-world-with-no-passwords-and-how-FIDO2-can-help-make-it-happen

A world with no passwords and how FIDO2 can help make it happen


Monday, May 13, 2019 by

93.2 percent of the overall web browser market has embraced FIDO2: Google Chrome, Microsoft Edge, Apple Safari, Mozilla Firefox, and Opera. The FIDO Alliance is driven by hundreds of global tech leaders across enterprise, payments, telecom, government, and healthcare that have come together in support of the organization’s mission to reduce the world’s re...


Making-IoT-devices-more-reliable-gets-easier-thanks-to-Silicon-Labs

Making IoT devices more reliable gets easier thanks to Silicon Labs


Monday, April 29, 2019 by

Silicon Labs has introduced the next generation of it's Wireless Gecko platform, Series 2, designed to make Internet of Things (IoT) products more powerful, efficient and reliable. Building on the leading RF and multiprotocol capabilities of the Wireless Gecko portfolio, Series 2 delivers the industry’s most versatile and scalable IoT connectivity platform. Th...


Loopring

Loopring's decentralized exchange protocol technical design released


Thursday, April 18, 2019 by

Loopring has announced the technical design of its protocol 3.0, following a period of comprehensive research and development. The release represents a significant milestone for the Loopring protocol, combining innovative blockchain technologies and zero-knowledge cryptography in order to dramatically increase throughput and bring fully-functional decentralized exc...


What-it-takes-to-be-a-blockchain-developer

What it takes to be a blockchain developer


Monday, April 8, 2019 by

The role of a blockchain developer is much coveted, and named as the top emerging career in the US job market last year. In fact, software engineers with specialized knowledge of blockchain technology are able to command salaries as high as $175,000 USD. With mainstream adoption on the horizon and higher education institutions working to prepare the next generations of ...


Prevoty-offers-new-Autonomous-Application-Protection-capabilities

Prevoty offers new Autonomous Application Protection capabilities


Friday, March 1, 2019 by

Imperva announced the expansion of its application security offerings with two new Autonomous Application Protection capabilities. The update extends customers’ visibility into how applications behave and how users interact with sensitive information. With this expanded view across their business assets, customers will have deeper insights to understand and mit...


Cloud-computing-development-jobs-are-suddenly-everywhere

Cloud computing development jobs are suddenly everywhere


Wednesday, February 20, 2019 by

According to a recent LinkedIn study, cloud computing is the most in-demand hard skill of 2019. In just the past year in fact, job postings that included the terms “cloud computing” or “cloud engineer” have spiked to 27%. It’s powering the rapid adoption of server virtualization, then storage virtualization, followed by network virtualizati...


Privacy-for-Android-boosted-with-decentralized-VPN

Privacy for Android boosted with decentralized VPN


Sunday, January 6, 2019 by

Mysterium Network, an open-source, not-for-profit foundation reinventing internet privacy, security, and freedom, has announced the release of the Mysterium VPN app for Android, which is now available on the Google Play store. The app, which was released today and is also available for Windows and macOS, will allow users to participate in the world’s first dece...


Sensor-network-data-integrity-gets-help-from-a-new-blockchain-solution

Sensor network data integrity gets help from a new blockchain solution


Wednesday, November 21, 2018 by

Sixgill, LLC unveiled its new breakthrough blockchain or distributed ledger-based solution for sensor network data integrity. Sixgill Integrity is a ledger-agnostic solution and is designed from the ground up to solve the fundamental need for an end-to-end, real-time sensor data authenticity system. With Integrity, organizations are assured that their emitted data, tran...


A-quantum-blockchain-can-stop-quantum-computing-from-hacking-it

A quantum blockchain can stop quantum computing from hacking it


Monday, August 13, 2018 by

We have yet to see the full promise of Blockchain play out but companies and scientists are already close to launching a technology that could theoretically break it: quantum computers. Such machines can compute data exponentially faster than traditional computers. Earlier this year, Google began testing Bristlecone, a quantum computer chip that its creators think wi...


Mobiconf-2018-will-return-to-Poland

Mobiconf 2018 will return to Poland


Tuesday, July 24, 2018 by

Mobiconf 2018 will soon be coming to Krakow, Poland inside the Multikino cinema theater. Taking place on the 4-5th October, the mobile developer conference will boast topic titles like “What Mom Never Told You about Multi-threading (mobile edition)” and “Application Security in Agile Mobile Development.” And featuring talks from Fernando Cejas, D...


New-partnership-emerges-to-simply-IoT-security

New partnership emerges to simply IoT security


Wednesday, May 16, 2018 by

In an attempt to simplify IoT security when developing, Mocana Corporation has announced that it is partnering with Verizon to integrate Mocana’s endpoint security software solution, Mocana TrustPoint, with Verizon’s ThingSpace. Mocana TrustPoint, the company’s flagship IoT endpoint security solution, provides compliant security that protects more than 100 million ...


A-Blockchain-messaging-platform-that

A Blockchain messaging platform that's unstoppable


Tuesday, April 3, 2018 by

Today’s instant messaging is about to get a violent shove forward by way of encryption, and Blockchain. Almost all messaging platforms rely on client to server communication, where a unique ID is given to a thread, and stored in a centralized database somewhere. But it’s always been volatile to censorship, network blocking, or any other form of controlled policing....


Developers-outlook-2018:-big-technologies,-big-changes

Developers outlook 2018: big technologies, big changes


Tuesday, March 6, 2018 by

In 2018 changes in the technology landscape are creating fantastic opportunities for innovation in design and engineering. For decades, computers featured a TV screen for output, a keyboard for text input, and a mouse to point and click. Just a few years ago, the iPhone transformed everything by putting the first well-designed computer with a touchscreen in our pockets....


Blockchain-helps-artists-protect-their-work

Blockchain helps artists protect their work


Tuesday, February 13, 2018 by

Po.et has announced the release of Frost, An open API and set of developer tools. Frost allows content publishers and developers to more easily register creative works on the blockchain. Using Frost, users can interact with the Po.et Network with a basic username and password login, instead of running a full Po.et node. This API will enable new integrations and decentra...


Why-developers-must-be-blockchain-agnostic-for-decentralized-apps

Why developers must be blockchain agnostic for decentralized apps


Monday, December 4, 2017 by

It’s difficult to overemphasize how important blockchain technology will be to the world of app development over the next decade. While it’s clearly still an emerging technology, the fundamental shift that it will bring about in the foundations on which applications are built will be profound. Many developers have foreseen this change and are investigating how it might ...


Most-cryptocurrency-mobile-apps-are-vulnerable

Most cryptocurrency mobile apps are vulnerable


Thursday, November 30, 2017 by

Over 1,300 crypto currencies exist today with over $300 Billion market capitalization. One of the most popular and oldest cryptocurrency - Bitcoin has almost reached $10,000 price after several months of fluctuation, but continuous and steady growth.A wide spectrum of mobile applications for cryptocurrencies were released during the last few years by various startups, i...


The-Gates-Foundation-chats-about-Mojaloop

The Gates Foundation chats about Mojaloop


Wednesday, November 1, 2017 by

The Bill & Melinda Gates Foundation has released new open-source software for creating payment platforms that will help unbanked people around the world access digital financial services. The software, called Mojaloop, establishes a blueprint for connecting today’s financial services sector and can be used to overcome the barriers to interoperability that banks and ...


New-biometric-authentication-could-be-a-password-killer

New biometric authentication could be a password killer


Wednesday, July 12, 2017 by

Pramati Technologies has announced the ThumbSignIn biometric authentication SaaS platform for mobile and web applications and additionally its certification by the FIDO Alliance. The platform enables enterprises and service providers to deploy strong authentication solutions that reduce reliance on passwords and protect against phishing, man-in-the-middle, and replay at...


VPNs-will-not-protect-your-privacy-but-this-might

VPNs will not protect your privacy but this might


Monday, April 10, 2017 by

Editors note: Guest submission by Shaun Murphy, CEO of sndrCongress repealed FCC privacy regulations, set by Obama’s administration, that required Internet Service Provider’s (ISP’s) to obtain affirmative consent from customers before storing and using personal data for any purpose. This revelation has raised privacy concerns among consumers, and has sparked a debate of...


What-the-mobile-AR-phenomenon-has-taught-us-about-security

What the mobile AR phenomenon has taught us about security


Thursday, October 13, 2016 by

The extraordinary success of Pokémon Go has been surprising, even in the rapidly changing paradigm of the mobile application space. The game, which allows users to hunt down and capture virtual monsters, uses Augmented Reality (AR) technology to display the creatures in real world locations such as parks, homes, and offices.Pokémon Go has already broken five Guinness Wo...


New-iOS-and-macOS-Updates:-What-VPN-Users-Need-to-Know

New iOS and macOS Updates: What VPN Users Need to Know


Wednesday, October 5, 2016 by

Apple rolled out its newest operating system updates – iOS 10 and macOS Sierra. The new updates brought about a lot of exciting new features and upgrades. Apple’s mobile and Mac software is now more integrated: for example, Siri assistant has arrived on the computer. Users are also excited about the Universal Clipboard that allows to choose photos from iPhone and direct...


Security-of-Things-2016-Conference-to-Focus-on-IoT-Security,-Privacy,-and-Authentication

Security of Things 2016 Conference to Focus on IoT Security, Privacy, and Authentication


Wednesday, August 24, 2016 by

Coming to Chicago this October, the Smart Card Alliance Security of Things 2016 conference is bringing security, privacy and authentication to the forefront of the Internet of Things (IoT) with speakers from both the IoT and security communities. Speakers will discuss the impact embedded security technology is expected to have on connected cars, wearables, smart ho...


MarkLogic-9-NoSQL-Database-Released-in-Preview

MarkLogic 9 NoSQL Database Released in Preview


Friday, May 13, 2016 by

MarkLogic has released MarkLogic 9 in preview, offering updates to the NoSQL database for integrating data from silos. MarkLogic is optimized for structured and unstructured data providing the ability allowing to store, manage, query and search across JSON, XML, RDF, geospatial data, text, and large binaries.New features in MarkLogic 9 include:Data Integration: MarkLogi...


Kony-Makes-Updates-to-Visualizer-Cross-Platform-Solution

Kony Makes Updates to Visualizer Cross Platform Solution


Thursday, March 17, 2016 by

Kony has released a number of updates to the cloud-based Kony Visualizer application design and development solution offered through Kony’s Mobility Platform. Enabling cross-platform mobile app development, the release of Visualizer 7.0 includes updates to simplify and accelerate the mobile app development process, enabling developers to build connected, omni-chann...


Array-Networks-Release-Offers-Elliptical-Curve-Cryptography-for-ADC-Physical-and-Virtual-Environments

Array Networks Release Offers Elliptical Curve Cryptography for ADC Physical and Virtual Environments


Friday, February 26, 2016 by

Array Networks has released APV version 8.6, a new software release for Array’s APV Series Application Delivery Controllers (ADCs). The release offers newly added support for elliptical curve cryptography (ECC) - the next generation of public-key cryptography - APV version 8.6 provides improved security while requiring less computational power, resulting in faster proce...


IBM-Releases-New-Blockchain-Services-on-the-IBM-Cloud

IBM Releases New Blockchain Services on the IBM Cloud


Friday, February 19, 2016 by

In addition to releasing more than 44,000 lines of code to the Linux Foundation's open source Hyperledger Project to help developers build secure distributed ledgers, IBM is increasing its technology and business consulting to facilitate blockchain distributed ledger technology.New blockchain services on the IBM CloudThe New IBM Cloud blockchain services are designed to...


New-Trustonic-Platform-Provides-Mobile-and-IoT-Developers-with-Device-Security

New Trustonic Platform Provides Mobile and IoT Developers with Device Security


Tuesday, February 9, 2016 by

Trustonic has released its "Trustonic Hybrid Protection" (THP) which offers built-in device security providing mobile and IoT developers with an adaptable security solution bringing together software and hardware secured solutions into one hybrid product. Trustonic combines advanced hardware enabled security solutions found in over 500 million devices with software...


Security-Brief---Protecting-Against-the-OWASP-Mobile-Top-10

Security Brief - Protecting Against the OWASP Mobile Top 10


Thursday, January 7, 2016 by

There are over 1.6 million Android apps in the Google Play store. Over 1.5 million apps are in the Apple App Store. For mobile app hackers, today’s mobile environment has never offered a more fertile landscape to phish for user information or implant mobile malware. And never in history has more information been available to exploit.To understand how mobile application ...


Silicon-Labs-Gecko-MCU-Platforms-Focusing-on-IoT-Security-and-Energy

Silicon Labs Gecko MCU Platforms Focusing on IoT Security and Energy


Tuesday, January 5, 2016 by

Silicon Labs has introduced two new EFM32 Gecko microcontroller (MCU) platforms that focus on security and energy management for IoT-connected devices. The new Jade Gecko and Pearl Gecko MCUs combine a hardware cryptography engine, low-energy modes, an on-chip dc-dc converter and scalable memory options. The EFM32 Jade and Pearl Gecko MCUs microcontrollers target e...


Catching-Mobile-Encryption-Flaws

Catching Mobile Encryption Flaws


Tuesday, December 15, 2015 by

More than 80-percent of mobile devices contain encryption flaws and applications written in PHP, ColdFusion and Classic ASP are most likely to have serious flaws according to a report by Veracode. These flaws in mobile apps present a grave risk for those who use them on untrusted wireless networks. The Source of the Encryption FlawsI believe that a common source of...


86-Percent-of-PHP-Based-Applications-Contain-at-Least-One-Cross-Site-Scripting-Vulnerability

86 Percent of PHP Based Applications Contain at Least One Cross-Site Scripting Vulnerability


Tuesday, December 8, 2015 by

Veracode is reporting that its analytics show 86 percent of PHP-based applications contain at least one Cross-Site Scripting (XSS) vulnerability and 56 percent have at least one SQL injection (SQLi) when initially assessed by Veracode. The analysis is part of a supplement to Veracode’s “2015 State of Software Security: Focus on Application Development”, which is a repor...


New-Mobile-Security-Report-Shows-Most-Apps-Have-Critical-Vulnerabilities

New Mobile Security Report Shows Most Apps Have Critical Vulnerabilities


Tuesday, November 10, 2015 by

Checkmarx and AppSec Labs have released a new mobile app security titled “The State of Mobile Application Security 2014-2015”. Among the findings of the report is that the typical app is exposed to an average of 9 different vulnerabilities. The report also indicates in situations where vulnerabilities are built into the code or application logic, the vulnerability of iO...


Renesas-Electronics-Offers-New-IoT-Platform

Renesas Electronics Offers New IoT Platform


Tuesday, June 23, 2015 by

Renesas Electronics, a supplier of semiconductor solutions, is throwing its hat into the IoT fray with its new Renesas Synergy Platform, a new offering designed to allow embedded systems engineers to start product development at the API level, giving them more time to design features. The platform should be generally available in Q4 2015.“Engineering teams used to spend...


SecureRF-Offers-Next-Generation-of-Asymmetric-Security-for-the-Internet-of-Things

SecureRF Offers Next Generation of Asymmetric Security for the Internet of Things


Tuesday, May 12, 2015 by

SecureRF offers a family of Algebraic Eraser public key cryptography cores that offer increased performance while requiring low power and a small footprint. The AE Core is a Diffie-Hellman like authentication protocol that utilizes SecureRF’s Algebraic Eraser algorithm, a linear-in-time method, to enable higher levels of security to low resource devices without altering...