Introducing the Gizmag Store

Encryption

The human body has inspired a new form of digital security (Image: Shutterstock)

Researchers at Lancaster University, UK have taken a hint from the way the human lungs and heart constantly communicate with each other, to devise an innovative, highly flexible encryption algorithm that they claim can't be broken using the traditional methods of cyberattack.  Read More

The distance at which the fob will work is adjustable, meaning it can be set to unlock the...

For some office workers the task of locking and unlocking their computer is a regular part of the job, while for others it's frequency is dictated by the extent of their caffeine addiction. Looking to automate this process is the team behind the GateKeeper Chain, a key fob with a built-in proximity sensor which automatically locks your PC when you walk away and then unlocks it when you return to your desk.  Read More

With data privacy becoming a bigger concern, Blackphone presents itself as a secure option...

While news of smartphone hacks, data sniffing, and government intrusion has regrettably become commonplace, it’s also had the consequence of raising public awareness of privacy risks which used to be solely the domain of security geeks. In this climate of readiness, Blackphone is launching a smartphone it says will be both secure and user-friendly, developed as a partnership between founders of the encryption firm Silent Circle and phone manufacturer Geeksphone.  Read More

Undetectable hardware Trojans could subvert cryptographic security (Image: Shutterstock)

Researchers have shown that it is possible to compromise the functioning of a cryptographic chip without changing its physical layout. Based on altering the distribution of dopants in a few components on the chip during fabrication, this method represents a big challenge for cyber-security as it is nearly impossible to detect with any currently practical detection scheme.  Read More

DefCon and Black Hat highlight the fact that companies often seem more concerned about the...

The cyber security convention DefCon and its corporate counterpart, Black Hat, that are held annually in Las Vegas present a unique tableau where the traditional (and traditionally overstated) conflict between underground hacking culture and corporate and government security professionals is suspended with the goal of openness and education. If you enjoy and own technology and gadgets of any kind, the conferences highlight a looming security crossroads that affects every layperson. Gizmag takes a look at some of the more important hacks from this year.  Read More

Fraunhofer is developing machines with built-in copy protection (Photo: Volker Steger)

Mention counterfeit goods and most people will probably think of knock-off watches or pirated DVDs, but counterfeiting is a much wider problem. Everything from aircraft components to groceries are faked on a regular basis, with a third of industries affected at an estimated worldwide cost of US$650 billion dollars. German machine tools are a favorite target and to help combat this the Fraunhofer Research Institution for Applied and Integrated Security (AISEC) in Garching, Germany, is developing new technologies and techniques to make counterfeiting of these items more difficult.  Read More

SecureBox brings iTwin's hardware security to Dropbox accounts

By using cloud-based file synchronization services like Dropbox, we can free our digital lives from the confines of a computer, and access documents, photos, and music on several devices. However, this flexibility can leave some users feeling less than certain that their data is safe. With this in mind, iTwin has updated its eponymous file sharing hardware utility with a new feature named SecureBox. SecureBox is a free update available to all existing iTwin users which brings hardware protection to Dropbox accounts.  Read More

PGP creator Phil Zimmermann has teamed up with fellow Silicon Valley pioneer Jon Callas an...

Being able to communicate without fear of prying eyes and ears intercepting could literally mean the difference between life and death for journalists uncovering corruption in high places, campaigners and activists trying to make the world a better place, or undercover agents engaged in covert operations. The creative force behind well-known email encryption software PGP (Pretty Good Privacy) had just such folks in mind when developing his latest digital security product. Phil Zimmermann has created a new suite of high-end encrypted communication products that combine with a custom-made secure network to ensure that the sender and recipient(s) are the only people able to access email, voice, video and text comms routed through the Silent Circle system.  Read More

A statue of Alan Turing at the Bletchley Park Museum (Photo: Richard Gillin)

This Saturday June 23 marks the hundredth anniversary of Alan Turing's birth. Though the scientist and mathematician passed away over half a century ago, he is still remembered today for his contributions to cryptography and for his pioneering work in computer science.  Read More

Crypteks USB storage is physically locked inside its aluminum housing, encrypted with a us...

Crypteks is bringing out our inner Robert Langdon with the new physically lockable USB flash drive. Featuring a sleek all-metal solid-aluminum alloy construction, the Crypteks USB storage is physically locked inside its housing encrypted with a user-created password that is input by twisting five rings displaying all 26 letters of the alphabet. And if that's still not secure enough, it also offers 256-bit AES Hardware Encryption.  Read More

Looking for something? Search our 26,501 articles