encryption
Equipment already in space can be adapted for extremely secure data encryption
In a new study, researchers from the Max Planck Institute in Erlangen, demonstrate ground-based measurements of quantum states sent by a laser aboard a satellite 38,000 …
End-to-end email encryption with no central point of attack
A seamless, easy-to-use, and secure end-to-end encrypted business collaboration tool with no central point of attack is a holy grail for every business, and Boston-based …
iStorage introduces ultra-secure hard drives
iStorage launched of their new range of USB 3.1 HDDs and SSDs, consisting of the diskAshur, diskAshur SSD, diskAshur PRO, diskAshur PRO SSD and the diskAshur DT – all of …
What’s really stopping users from adopting secure communication tools?
“Users’ goal to communicate with others overrides everything else, including security,” a group of researchers has concluded after interviewing sixty individuals …
Weak DevOps cryptographic policies increase financial services cyber risk
Cryptographic security risks are amplified in DevOps settings, where compromises in development or test environments can spread to production systems and applications. This is …
First post-quantum cryptography on a contactless security chip
Due to their computing power, quantum computers have the disruptive potential to break various currently used encryption algorithms. Infineon Technologies has successfully …
Breaking TLS: Good or bad for security?
As the use of TLS by malware and phishing increases, some security practitioners are seeking solutions to break TLS so they can monitor all traffic in and out of their …
Number of HTTPS phishing sites triples
When, in January 2017, Mozilla and Google made Firefox and Chrome flag HTTP login pages as insecure, the intent was to make phishing pages easier to recognize, as well as push …
17 million Zomato accounts for sale following breach
Popular restaurant search and discovery service Zomato has suffered a breach, and the attackers made off with 17 million user records. What data was compromised? These records …
Advantages of quantum processing shown in head-to-head race
A prototype quantum processor repeatedly beat a traditional, classical processor in a race to solve a puzzle, figuring out a secret combination up to 100 times faster by using …
Finally, enterprise-wide encryption strategies increase!
New research by the Ponemon Institute captures how organizations around the world are dealing with compliance, increased threats, and the implementation of encryption to …
23% of security pros are blind to encrypted traffic threats
According to a Venafi survey conducted at RSA Conference 2017, 23 percent of respondents have no idea how much of their encrypted traffic is decrypted and inspected. …
Featured news
Resources
Don't miss
- ClickFix campaign delivers Mac malware via fake Apple page
- Poisoned “Office 365” search results lead to stolen paychecks
- What vibe hunting gets right about AI threat hunting, and where it breaks down
- Health insurance lead sites sell personal data within seconds of form submission
- Claude helps researcher dig up decade-old Apache ActiveMQ RCE vulnerability (CVE-2026-34197)