Blog

News and articles

The Role of Cryptography Then and Now (6 min read)

02 Oct, 2019 by Dr Michael Scott

Cryptography has been a science since the 1940s. But how does it fit into today’s modern world and, most importantly, how can it steer effective cyber security? October is the Cyber Security…

Press Release: MIRACL announces partnership with Bulbet

17 Sep, 2019 by MIRACL Technologies Ltd

Ultra Secure Authentication for Gamers: MIRACL Gaming Solutions announces partnership with Bulgarian Gaming Site, Bulbet. Bulbet, the Bulgarian gaming site, has announced MIRACL Trust® as th…

Announcing MIRACL Core: A commercially, relevant cryptographic library

04 Sep, 2019 by MIRACL Technologies Ltd

To co-inside with attendance at the 2nd International Conference in Blockchain, Identity and Cryptography in Edinburgh, MIRACL Trust® has today launched its new, commercially relevant crypto…

NEW MIRACL Core – commercially relevant cryptographic library

03 Sep, 2019 by Dr Michael Scott

To co-inside with my attendance tomorrow at the 2nd International Conference in Blockchain, Identity and Cryptography in Edinburgh, MIRACL will announce details of its new cryptographic libr…

Press Release: Don't Gamble With Passwords

29 Aug, 2019 by MIRACL Technologies Ltd

With MIRACL, It’s One Pin And You’re In Revolutionising passwords. Introducing the world’s first 100% software multi-factor authentication. This August, tech market disruptor MIRACL Gaming S…

Why Delaying PSD2 is Good

23 Aug, 2019 by MIRACL Technologies Ltd

(2 Minute Read) No-one thought complying to PSD2 was going to be easy. This revised Payment Services Directive is going to revolutionise the payment services industry but this is going to ta…

Designated Verifier Signatures

19 Aug, 2019 by Dr Michael Scott

Here, Dr Michael Scott considers digital signatures and the verification they provide in today’s digital world. (4 Minute Read) Digital signature is an attempt to provide a digital analogue …

No more dongles

09 Oct, 2018 by James Chapman

One of the biggest issues in security today is that of secure identification and the misuse of stolen credentials to gain fraudulent access. This is highlighted in recent Verizon Data Breach…

How can Two-Factor Authentication Protect your Brand?

13 Feb, 2018 by MIRACL Blogger

What do Yahoo!, Equifax, and eBay all have in common aside from data breaches on an epic scale? They all rely on a user’s trust across digital networks to move their businesses forward. If y…

How can you Easily Protect Citizen and Consumer Data?

01 Feb, 2018 by MIRACL Blogger

Your end user has a relationship with your business application for only one reason. To do business with you. Anything that interferes with the security of that relationship not only disrupt…

How Regulated Industries can Easily Comply with Security Requirements

18 Dec, 2017 by MIRACL Blogger

Europe’s financial institutions are sleepwalking into a regulatory nightmare with security systems that are not fit for purpose to meet the requirements of the European Union’s revised Direc…

The Simple Commandments You Should Learn to Avoid Leaking Secrets

06 Dec, 2017 by Dr Michael Scott

Often a competent and experienced software engineer is tasked to implement a cryptographic algorithm. Unfortunately they may be unaware of what we call side-channels attacks. For example nor…