encryption
Encrypted attacks growing steadily, cybercriminals are increasingly targeting non-standard ports
In 2018, SonicWall recorded the decline of cryptojacking, but more ransomware, highly targeted phishing, web application attacks and encrypted attacks. The company’s …
Cybercriminals are increasingly using encryption to conceal and launch attacks
In this Help Net Security podcast, Deepen Desai, VP Security Research & Operations at Zscaler, talks about the latest Zscaler Cloud Security Insight Report, which focuses …
The quantum sea change: Navigating the impacts for cryptography
Professionals in cybersecurity and cryptography (and even non-IT executives) are hearing about the coming threat from quantum computing. It’s reaching the mainstream business …
Mozilla releases Firefox Send, a free encrypted file transfer service
Mozilla has released the finalized version of Firefox Send, its free encrypted file transfer service that allows users to share files from any browser. With Send, users can …
The threat of quantum computers and the solutions that can protect us today
In this Help Net Security podcast recorded at RSA Conference 2019, Avesta Hojjati, Head of R&D at DigiCert, talks about the threat of quantum computers and the solutions …
Enterprises are blind to over half of malware sent to their employees
As the use of SSL grows to the point where it’s the standard protocol, cybercriminals are increasingly using encryption to conceal and launch attacks. This has become possible …
Accidental data breaches are often compounded by a failure to encrypt
83 percent of security professionals believe that employees have accidentally exposed customer or business sensitive data at their organization. Accidental data breaches are …
Adiantum: A new encryption scheme for low-end Android devices
Google has created an alternative disk and file encryption mode for low-end Android devices that don’t have enough computation power to use the Advanced Encryption …
The problem with vulnerable IoT companion apps
There’s no shortage of exploitable security holes in widely used Internet of Things devices, so it shouldn’t come as a surprise that the communication between many …
What steps consumers need to take to protect themselves online
Yesterday was Data Privacy Day, so McAfee warned consumers that cybercriminals are continuing to access personal information through weak passwords, phishing emails, connected …
Facebook plans to integrate WhatsApp, Messenger and Instagram
The New York Times offers the option but is not on by default, and Instagram offers none. “This move could be potentially be good or bad for security/privacy. But given …
Encryption is key to protecting information as it travels outside the network
A new Vera report reveals stark numbers behind the mounting toll of data breaches triggered by cybercrime and accidents. One of the most recognized and mandated security …
Featured news
Resources
Don't miss
- 40 open-source tools redefining how security teams secure the stack
- Password habits are changing, and the data shows how far we’ve come
- Product showcase: Tuta – secure, encrypted, private email
- Henkel CISO on the messy truth of monitoring factories built across decades
- The hidden dynamics shaping who produces influential cybersecurity research