encryption
![connection](https://img.helpnetsecurity.com/wp-content/uploads/2018/11/09095805/connection-400x200.jpg)
Quantum computing: The new moonshot in the cyber space race
In 2016, China launched Micius, the world’s first quantum communications enabled satellite. For some, that launch eerily echoed the launch of the Soviet Union’s Sputnik …
![network](https://img.helpnetsecurity.com/wp-content/uploads/2017/11/09102423/network-400x200.jpg)
DNS security is no longer optional
Several high-profile DNS security incidents have made headlines recently, a reminder that this integral part of the internet must not be taken for granted. Unlike enterprise …
![vault](https://img.helpnetsecurity.com/wp-content/uploads/2016/04/09113326/vault-400x200.jpg)
The highly competitive global encryption management solutions market continues to grow
The increasing adoption of digitalization and globalization of enterprises have made IT resources prone to cyber attacks. This has increased the demand for encryption …
![Microsoft OneDrive](https://img.helpnetsecurity.com/wp-content/uploads/2019/06/09094022/microsoft-onedrive-400x200.jpg)
Microsoft OneDrive users get an even more secure Personal Vault
Microsoft has announced that, by the end of the year, all users of its OneDrive cloud storage service will get a Personal Vault, which will provide added protection for …
![iPhone](https://img.helpnetsecurity.com/wp-content/uploads/2019/06/09094159/iphone-400x200.jpg)
Two-thirds of iOS apps don’t use App Transport Security
Most iOS apps don’t take advantage of App Transport Security (ATS), a networking security feature offered by Apple that ensures encrypted connections between apps and …
![USB](https://img.helpnetsecurity.com/wp-content/uploads/2016/08/09110808/usb-400x200.jpg)
Employees are aware of USB drive security risks, but don’t follow best practices
Employees are aware of the risks associated with inadequate USB drive security – yet their employers aren’t mandating following best practices, according to a report by …
![Android Q](https://img.helpnetsecurity.com/wp-content/uploads/2019/05/09094332/androidq-security-400x200.jpg)
Android Q: Enhanced security for consumers and enterprises
The upcoming, newest version of Android – still only known as “Android Q” – will have many new and improved protections for user privacy. Google has …
![encryption](https://img.helpnetsecurity.com/wp-content/uploads/2019/05/09094355/encryption-400x200.jpg)
Cryptographic breakthrough allows using handshake-style encryption for time-delayed communications
When spies meet, they use secret handshakes to confirm their identities, ensuring they are who they say they are. Now, researchers at Stevens Institute of Technology, and …
![Qualcomm](https://img.helpnetsecurity.com/wp-content/uploads/2019/04/09094501/qualcomm-400x200.jpg)
Qualcomm chips leak crypto data from secure execution environment
A vulnerability in Qualcomm chips could be exploited by attackers to retrieve encryption keys and sensitive information from the chipsets’ secure execution environment, …
![Wi-Fi](https://img.helpnetsecurity.com/wp-content/uploads/2018/01/09102230/wifi-400x200.jpg)
WPA3 design flaws affect security of new Wi-Fi standard
Researchers have discovered a number of design flaws affecting the security of the recently introduced WPA3 data transmission protocol. Collectively dubbed Dragonblood …
![Microsoft Azure](https://img.helpnetsecurity.com/wp-content/uploads/2019/04/09094655/microsoft_azure-400x200.jpg)
Microsoft rolls out new security capabilities for Azure customers
Microsoft has announced new security features for customers of its Azure cloud computing service. They are a mix of features for storage and compute services: Advanced Threat …
![Door](https://img.helpnetsecurity.com/wp-content/uploads/2017/05/09104159/door-ajar-400x200.png)
Backdoors inevitably create vulnerabilities that can be exploited by malicious actors
73 percent of IT security professionals believe countries with government-mandated encryption backdoors are more susceptible to nation-state attacks. The Venafi survey on …
Featured news
Sponsored
Don't miss
- Void Banshee APT exploited “lingering Windows relic” in zero-day attacks
- SYS01 info-stealer pushed via Facebook ads, LinkedIn and YouTube posts
- ChatGPTriage: How can CISOs see and control employees’ AI use?
- Managing exam pressure: Tips for certification preparation
- Firmware update hides Bluetooth fingerprints