The United States is no longer regarded as a "safe harbour" for EU data - and that's big (and welcome) news for Europeans.
In 1994 the source code for RC4 was leaked on the Internet, and it quickly became popular because of its simplicity and speed.
Details of a damaging hack of British phone and broadband provider TalkTalk's customer database are emerging.
Our previous post explained that the "nothing to hide, nothing to fear" argument is based on a narrow view of privacy that assumes it is primarily about concealing our wrongs.
"I've got nothing to hide so I've got nothing to fear from [insert surveillance program here]" is a commonly heard retort to concerns about our diminishing ability to keep our personal information private.
SHA-1 is a hash algorithm that has been widely used in cryptography.
An important lesson about software testing - specifically the importance of testing software "in the wild".
Over the last week we've learnt that VW perpetrated a massive fraud on the US Environmental Protection Agency, and on other government agencies world-wide.
CompleteFTP customers will be pleased to know that CompleteFTP is very suitable for deployment in the cloud - we use it ourselves on Amazon AWS.
An earlier group of posts in this series covered the SSL/TLS protocol in detail. They neglected, however, to mention one of the most common uses of SSL/TLS - to implement a secure form of file transfer known as FTPS.