Encryption

Encryption news, trends, analysis and practical advice

nordvpn
Digital Key encryption

Digital Key encryption

LastPass is scrambling to fix another serious vulnerability

Developers of the popular LastPass password manager are working to fix a serious vulnerability that could allow malicious websites to steal user passwords or to infect computers with malware.

encryption

Saks self-leaked customer data unencrypted, violating multiple rules

With so many retailers being impacted by cyber attacks, it’s easy to conclude that thieves are necessary for data breaches. Not necessarily. Saks last week made clear that it can breach itself quite efficiently.

Digital Key encryption

To punish Symantec, Google may distrust a third of the web's SSL certificates

Google plans to remove the extended validation (EV) status of any such certificates issued by Symantec and force the company to replace all of its customers' certificates.

FBI

FBI director floats international framework on encrypted data access

The FBI director James Comey is suggesting an international approach to solving the encryption debate. He proposes that the U.S. might work with other countries on a “framework” for creating legal access to encrypted tech devices.

secusuite for samsung knox 1

BlackBerry preps a more secure Samsung Galaxy S7

Secusmart, the BlackBerry subsidiary that secures the German Chancellor Angela Merkel's smartphone, will roll out a version of its SecuSuite security software compatible with Samsung Electronics' Knox platform later this year.

Digital Key encryption

US-CERT: Some HTTPS inspection tools could weaken security

Companies that use security products to inspect HTTPS traffic might inadvertently make their users' encrypted connections less secure and expose them to man-in-the-middle attacks, the U.S. Computer Emergency Readiness Team warns.

Adware security

Malicious uploads allowed hijacking of WhatsApp and Telegram accounts

A vulnerability patched in the web-based versions of encrypted communications services WhatsApp and Telegram would have allowed attackers to take over accounts by sending users malicious files masquerading as images or videos.

petya ransomware logo

Hackers use dangerous Petya ransomware in targeted attacks

A group of attackers has found a way to hijack the Petya ransomware and use it in targeted attacks against companies without the program creators' knowledge.

Digital Key encryption

It's time to turn on HTTPS: The benefits are well worth the effort

The number of websites supporting HTTPS has skyrocketed over the past year; there are many benefits for turning on encryption on your website today.

email encryption

Zix wins 5-vendor email encryption shootout

In this review, we looked at five email encryption products, four of which employ encryption gateways and one that’s end-to-end.

Digital Key encryption

Free decryption tools now available for Dharma ransomware

Researchers have created decryption tools for the Dharma ransomware after someone recently leaked the encryption keys for it.

170227 mwc 160433

This tiny chip could revolutionize smartphone and IOT security

Engineers at South Korea's SK Telecom have developed a tiny chip that could help secure communications on a myriad of portable electronics and IOT devices.

e2e

Google shifts on email encryption tool, leaving its fate unclear

Google is asking developers to take over its effort to make end-to-end email encryption more user friendly, raising questions over whether it will ever become an official feature in the company’s products.

fast computer server speed

SK Telecom pushes for interoperable quantum crypto systems

SK Telecom and Nokia have developed a prototype quantum cryptography system that combines the South Korean company's quantum key server with an encryption device from Nokia.

cog systems d4 secure htc a9 ip address

By virtualizing the Android OS, Cog Systems says it adds more security to smartphones

It sounds like a smartphone user's worst fear: Software that starts up before the phone's operating system, intercepting and encrypting every byte sent to or from the flash memory or the network interface. This is not some new kind of...

Digital Key encryption

The SHA1 hash function is now completely unsafe

Security researchers have achieved the first real-world collision attack against the SHA-1 hash function, producing two different PDF files with the same SHA-1 signature.

Digital Key encryption

New macOS ransomware spotted in the wild

A new file-encrypting ransomware program for macOS is being distributed through bit torrent websites, and users who fall victim to it won't be able to recover their files -- even if they pay.

data protection lock chain public domain

Accenture wants to help businesses secure their blockchains

Accenture wants to help businesses use blockchain technologies more securely by locking away the encryption keys they use to sign transactions.

Load More