Please turn on your JavaScript for this page to function normally.
mobile payment encryption attack
Encryption securing money transfers on mobile phones can be broken

A group of researchers has proved that it is possible to break the encryption used by many mobile payment apps by simply measuring and analysing the electromagnetic radiation …

Apple Store
iOS zero-day breaks Apple’s iMessage encryption

A team of Johns Hopkins University researchers headed by computer science professor Matthew Green have discovered a zero-day flaw in Apple’s iOS encryption, which could …

https
Google starts tracking, encourages worldwide HTTPS usage

Google has added a new section to its Transparency Report, which will allow users to keep an eye on Google’s use of HTTPS, and HTTPS use of the top 100 non-Google sites …

Lock
The next step in the battle for consumer privacy?

A recent survey of 2,000 US individuals by Hide My Ass VPN showed some unnerving data: 63 percent of them have experienced online security issues, but only a little more than …

fingerprint
New ways to fingerprint Tor Browser users discovered

Users who want to remain anonymous online often opt for using the Tor Browser, which hides their real IP address, but there are techniques that (more or less) malicious actors …

BorgBackup
BorgBackup: Deduplication with compression and authenticated encryption

BorgBackup is a deduplicating backup program that supports compression and authenticated encryption. The main goal of BorgBackup is to provide an efficient and secure way to …

WinMagic provides encryption of virtual machines running on IaaS platforms

At RSA Conference 2016 WinMagic introduced security software that encrypts virtual machines running on Infrastructure as a Service (IaaS) platforms. Addressing the growing …

encrypt - product slika
NetRandom generates, delivers true random numbers for crypto operations

At RSA Conference, Whitewood Encryption Systems has launched netRandom, a suite of products that transforms the way high-quality true random numbers are accessed across the …

backdoor
Most infosec pros consider government-mandated encryption backdoors a bad idea

Apple and the FBI have been engaged in a legal battle over the federal government’s right to require built-in smartphone encryption software that could aid law enforcement …

success
Crypto pioneers Diffie and Hellman win Nobel Prize of Computing

ACM, the Association for Computing Machinery has announced at RSA Conference that it has awarded crypto pioneers Whitfield Diffie and Martin E. Hellman the 2015 ACM A.M. …

break
DROWN attack breaks TLS encryption, one-third of all HTTPS servers vulnerable

There’s a new attack that breaks the communication encryption provided by SSL and TLS and can therefore lead to theft of extremely sensitive data exchanged between users …

encryption data
Employee and HR data is the most commonly encrypted data

The use of encryption continues to grow in response to cyber-attacks, privacy compliance regulations and consumer concerns, and the majority of organizations plan to transfer …

Don't miss

Cybersecurity news