Encryption

Encryption news, trends, analysis and practical advice

Vinton Cerf Heidelberg Laureate Forum
Digital Key, security, encryption

quantum computing KryptAll

Quantum computing has the cybersecurity world white-knuckled

As quantum computers inch closer to reality, experts are sweating over their potential to render many of today's cybersecurity technologies useless.

20160225 stock mwc ericsson booth security locks

FairWare ransomware infects servers through exposed Redis instances

Days after reports that a new ransomware attack was deleting files from web servers, security researchers determined that some of the affected servers were hacked via insecure deployments of the Redis database.

security code big data cyberespionage DDoS

Attackers use rogue proxies to hijack HTTPS traffic

A new attack analyzed by malware researchers from Microsoft uses Word documents with malicious code that configures browsers to use a web proxy controlled by attackers.

New features in Windows 10 laptop

Respect: Windows 10's security impresses hackers

Windows is a popular attack target for criminals and researchers alike, but Microsoft has done a good job of making it harder to target security flaws in the OS

Digital Key, security, encryption

Rival gang leaks decryption keys for Chimera ransomware

The creators of the Petya and Mischa ransomware programs leaked around 3,500 RSA private keys allegedly corresponding to systems infected with another ransomware program called Chimera.

Digital Key, security, encryption

Free decryption tools released for PowerWare and Bart ransomware

Security researchers released tools this week that could help users recover files encrypted by two relatively new ransomware threats: Bart and PowerWare.

mit anonymity Riffle privacy

Use Tor? Riffle promises to protect your privacy even better

Privacy-minded people have long relied on Tor for anonymity online, but a new system from MIT promises better protection and faster performance.

Digital Key, security, encryption

New Locky ransomware version can operate in offline mode

The creators of the widespread Locky ransomware have added a fall-back mechanism in the latest version of their program for situations where the malware can't reach their command-and-control servers.

encryption decryption key code

Salesforce expands encryption options with 'bring your own key'

Salesforce on Tuesday stepped up its efforts to woo security-conscious businesses by adding "bring your own key" encryption to its Salesforce Shield set of cloud services.

google quantum qubit

Google hopes to thwart quantum computers from cracking internet encryption

The encryption methods used to secure today’s internet won’t be impenetrable forever. More powerful “quantum computers” in the future could very well crack them.

Digital Key, security, encryption

Android full disk encryption can be brute-forced on Qualcomm-based devices

Attackers can exploit vulnerabilities in Android devices with Qualcomm chipsets to extract the encrypted keys that protect users' data and run brute-force attacks against them.

security keys locks

Satana ransomware encrypts user files and master boot record

Attackers are developing an aggressive new ransomware program that encrypts both user files and the computer's master boot record (MBR), leaving affected machines unable to boot into the OS.

Digital Key, security, encryption

Bart ransomware shows it can be effective without sophisticated encryption

A new ransomware program called Bart is making the rounds and locks user files in password-protected zip archives.

Digital Key, security, encryption

The number of corporate users hit by crypto ransomware is skyrocketing

The prevalence of ransomware programs, both those that encrypt data and those that don't, has exploded over the past two years, with companies being increasingly targeted.

padlock and chain, security

JavaScript email attachments can carry potent ransomware

Attackers are infecting computers with a new ransomware program called RAA that's written entirely in JavaScript and locks users' files using strong encryption.

Digital Key, security, encryption

Machine learning could help companies react faster to ransomware

Behavior analytics vendor Exabeam applies machine learning to detect ransomware infections and help companies quickly isolate affected computers before the malware spreads.

https certificate secure

Go from SHA-1 to SHA-2 in 8 steps

The clock is ticking for organizations to complete their SHA-1 migration. Here's what admins must do to ensure they aren't locked out.

Easy Everyday Encryption

Senate proposal to require encryption workarounds may be dead

A proposal in the U.S. Senate to require smartphone OS developers and other tech vendors to break their own encryption at the request of law enforcement may be dead on arrival.

Load More