Please turn on your JavaScript for this page to function normally.
magnify
Signal Protocol’s crypto core has no major flaws, researchers find

A group of computer science and cryptography professors and doctoral students has effected a security analysis of the secure messaging Signal Protocol – specifically, of …

IP Vanish VPN
IPVanish VPN unveils new app, security improvements

US-based IPVanish VPN, whose VPN network spans 40,000+ IPs on 500+ servers in 60+ countries, has recently pushed out a major new edition of its app. The new version (v3.0) has …

Market
Encryption software market to reach $8.94 billion by 2021

The ecryption software market size is estimated to grow from $3.05 billion in 2016 to $8.94 billion by 2021, at an estimated CAGR of 24.0%, according to MarketsandMarkets. …

MBRFilter: Cisco open sources tool to protect the Master Boot Record

Cisco’s Talos research team has open sourced MBRFilter, a tool that aims to prevent a system’s Master Boot Record (MBR) getting overwritten by malware. The latest …

GPG Sync
GPG Sync: Internal GPG keys syncing tool for orgs

First Look Code has released GPG Sync, an open source tool for keeping a list of GPG keys used by members of an organization always updated, and always available to all of …

VeraCrypt
VeraCrypt security audit reveals many flaws, some already patched

VeraCrypt, the free, open source disk encryption software based on TrueCrypt, has been audited by experts from cybersecurity company Quarkslab. The researchers found 8 …

cloud
Alarming cloud encryption misconceptions revealed

Businesses have a high level of concern about the exposure of sensitive and regulated data in the cloud to security threats. Yet despite this, the majority of data owners …

Signal disappearing messages
Signal users can now make their messages disappear

Open Whisper Systems’ Signal, the messaging app favoured by Edward Snowden and many other users who want and need to keep their communication safe and private, is now …

Metropolitan Police
ISIS suspect charged with researching encryption, encrypting website

A man from Cardiff, Wales, has been charged with six terrorism-related charges, including one that involves actions that are not usually considered illegal: researching …

vault
Cloud and IoT adoption requires organizations to future-proof PKI implementations

New research by the Ponemon Institute shows an increased reliance on PKIs in today’s enterprise environment, driven by the growing use of cloud-based services and …

Facebook Messenger
Facebook Messenger end-to-end encryption rolled out for all users

Facebook Messenger’s Secret Conversations feature, which allows end-to-end encryption of messages exchanged by two users that have enabled the option, has finally been …

Many tech senior decision-makers don’t understand encryption

Nearly a quarter of tech senior decision-makers in the UK don’t fully understand encryption, according to PKWARE. This number increases to 40% in the retail sector and …

Don't miss

Cybersecurity news