Encryption news, trends, analysis and practical advice

Security (3)
virtual encryption 175562932

The Blackphone 2 front and back

Silent Circle aims at the enterprise market with Blackphone 2

The Blackphone 2 is designed to meet the management and security needs of enterprises, while not alienating workers who will end up using it for their personal affairs as well.

Digital Key

Cookie handling in browsers can break HTTPS security

Man-in-the-middle attackers can inject cookies over HTTP connections in order to extract information from encrypted HTTPS traffic.

Sectra Communications Tiger/R

Samsung teams with Sectra to secure mobile phones for governments

Sectra is working with Samsung to integrate its hardware encryption system with the phone maker's Knox mobile security platform to create devices secure enough to carry government secrets.

Mobile security

Congress urged to communicate using encrypted apps

Members of Congress and their staffs are being urged to use encrypted smartphone apps such as WhatsApp and Signal rather than traditional cellular networks.


Obama advisers: Encryption backdoors would hurt cybersecurity, net infrastructure vendors

Making encryption backdoors available to law enforcement would be bad for cybersecurity in general and hurt vendors that make encryption gear, a presidential advisory group says.


Encryption project issues first free SSL/TLS certificate

A project that aims to increase the use of encryption by giving away free SSL/TLS certificates has issued its first one, marking the start of its beta program.

Woman holding bloken chain above her head

Beyond bitcoin: 7 ways to capitalize on blockchains

Bitcoin’s widely trusted ledger offers intriguing possibilities for business use beyond cryptocurrency.

Mobile security illustration

Use SAP's mobile platform? Patch now to avoid these 'high risk' vulnerabilities

Three high risk vulnerabilities in SAP Mobile could give attackers access to encrypted information stored in mobile devices, security firm Onapsis reported.


DOJ wants encryption that still allows law enforcement access

Encryption systems can be designed that still give law enforcement agencies access customer data with court-ordered warrants while still offering solid security, according to U.S. Department of Justice officials.

encryption locks security

Google offers users of its Compute Engine their own encryption keys

Google will let enterprise customers of one of its Cloud Platform services lock up their data with their own encryption keys, in case they're concerned about the company snooping on their corporate information.

oracle virtualbox encryption

Oracle unwraps VM VirtualBox 5.0 with focus on security

After entering beta roughly three months ago, Oracle's VM VirtualBox 5.0 virtualization software is generally available, offering faster performance and better security.

Secretary of Defense Ashton Carter

Defense secretary to renew call for cooperation with tech industry

U.S. Defense Secretary Ashton Carter will renew his appeal to businesses to work more closely with the military on Thursday when he speaks to an audience of top executives at the Sun Valley conference in Idaho.


FBI, DOJ want companies to back off end-to-end encryption

U.S. tech companies should retain access to the encrypted information of their customers, instead of providing end-to-end encryption, in order to give police the tools they need to investigate crimes and terrorist activity, two senior...

FBI chief Comey warns that terrorists hide behind encrypted communications

James Comey said that these communications may not be intercepted despite court orders.


Software developers aren't implementing encryption correctly

Despite a big push to use encryption to fight security breaches, lack of expertise among developers and overly complex libraries have led to widespread implementation failures.

network security diagram 42 25789247

Cisco warns of default SSH keys shipped in three products

Cisco Systems released a patch for three products that shipped with default encryption keys, posing a risk that an attacker with the keys could decrypt data traffic.


How encryption keys could be stolen by your lunch

A device, hidden in pita bread, can collect signals that can betray encryption keys.


Free SSL/TLS certificate project moves closer to launch

Let's Encrypt, a project aimed at increasing the use of encryption across websites by issuing free digital certificates, is planning to issue the first ones next month.

Load More