VTech is a Chinese company, and in November, VTech's servers were hacked and the personal data of almost 5 million customers was stolen.
We recently blogged about how the SHA-1 hash algorithm is now considered to be broken.
FBI director James B. Comey has for some time been a critic of encryption technologies, arguing that challenges for his agency are growing as groups they are monitoring "go dark"
George Danezis from University College London has an excellent blog post detailing the most serious implications of the bill, particularly its gagging orders against disclosure of state surveillance.
The United States is no longer regarded as a "safe harbour" for EU data - and that's big (and welcome) news for Europeans.
In 1994 the source code for RC4 was leaked on the Internet, and it quickly became popular because of its simplicity and speed.
Details of a damaging hack of British phone and broadband provider TalkTalk's customer database are emerging.
Our previous post explained that the "nothing to hide, nothing to fear" argument is based on a narrow view of privacy that assumes it is primarily about concealing our wrongs.
"I've got nothing to hide so I've got nothing to fear from [insert surveillance program here]" is a commonly heard retort to concerns about our diminishing ability to keep our personal information private.
SHA-1 is a hash algorithm that has been widely used in cryptography.