Encryption

Encryption news, trends, analysis and practical advice

Encryption
bittorrent bleep2

gmail hacked

No, Gmail was not cracked! Don't believe bogus blogs

Do you trust every word you read on the Web? Worrying reports out of Russia apparently claim that Gmail was hacked and your login details were stolen. Or, at least, that's the breathless interpretation of countless bloggers and...

ransomware

CryptoWall ransomware held over 600,000 computers hostage, encrypted 5B files

CryptoWall infected over 600,000 computer systems in the past six months and held 5 billion files hostage, earning its creators more than $1 million.

Retailers warned to act now to protect against Backoff malware

The Payment Card Industry Security Standards Council issued a bulletin urging retailers to immediately review their security controls to ensure point-of-sale systems are protected against 'Backoff,' a malware tool that was used in the...

We DO trust users -- that's why we have failsafes

This company decides to give its board members iPads so they can receive and review reports and requests prior to each monthly meeting, says a pilot fish who's part of the project. "The information emailed to each board member...

Facebook moves to protect user data with PrivateCore buy

Facebook Thursday moved to beef up its servers by agreeing to buy cybersecurity startup PrivateCore.

Oracle issues a virtual strongbox for enterprise encryption keys

Managing the keys of all your valuable resources, be they in the real world or the virtual, can be a hassle. Managing all the encryption keys for an entire enterprise is a harder challenge still.

Google lowers search ranking of websites that don't use encryption

None

OpenSSL, critical Web encryption tool, gets nine software fixes

Nine software fixes were released Wednesday for OpenSSL, a critical encryption component for exchanging data on the web, although none of the problems are as severe as the 'Heartbleed' issue found in April.

Attackers can easily create dangerous file-encrypting malware, new threat suggests

A new program that encrypts files to extort money from users highlights that attackers don't need advanced programming skills to create dangerous and effective ransomware threats, especially when strong encryption technology is freely...

iPhone gets first free app for encrypting voice calls

An open-source project has released the first free application for the iPhone that scrambles voice calls, which would thwart government surveillance or eavesdropping by hackers.

The security flaws in Tails Linux are not its only problem

If you want to use Tor, then Tails is your best friend. Tails is a version of Linux that sends data through the Tor network. All Internet traffic to/from Tails goes through Tor, making it resistant to end user mistakes. Tails...

Tor Project working to fix weakness that can unmask users

Developers of Tor software believe they've identified a weakness that was scheduled to be revealed at the Black Hat security conference next month that could be used to de-anonymize Tor users.

Virtru launches business email encryption service for Google Apps

Email encryption startup Virtru has launched a version of its service for businesses using Google Apps, a market segment that the company thinks is showing increased interest in secure communications.

Stealthy ransomware 'Critroni' uses Tor, could replace Cryptolocker

Cybercriminals are spreading a new file-encrypting ransomware program that's more powerful and resilient than Cryptolocker, a threat recently shut down by the U.S. Department of Justice.

Net neutrality becomes a key battleground in encryption fight

Plans to favor some Internet packets over others threaten consumers' hard-won right to use encryption, a digital privacy advocate says.

Overreliance on the NSA led to weak crypto standard, NIST advisers find

The National Institute of Standards and Technology needs to hire more cryptographers and improve its collaboration with the industry and academia, reducing its reliance on the U.S. National Security Agency for decisions around...

Protecting email at a hacker conference

The upcoming hacker conferences, HOPE, Black Hat and DEFCON make this a good time to think about email security. Rather than end to end security, which requires both the sender and recipient to use the same security software, my...

If you care about online privacy, then the NSA cares about targeting you

If you care about online privacy, then the NSA cares about you…about spying on you. At least that is the gist of a story that privacy experts believe originated from a second NSA leaker. You may not have the required "balls of...

Load More