encryption
![SandboxAQ Sandwich](https://img.helpnetsecurity.com/wp-content/uploads/2023/08/02121544/sandboxaq-sandwich-1400-400x200.jpg)
SandboxAQ launches open-source meta-library of cryptographic algorithms
SandboxAQ launched Sandwich, an open-source framework that simplifies modern cryptography management and enables developers to steer their organizations towards cryptographic …
![healthcare](https://img.helpnetsecurity.com/wp-content/uploads/2017/08/09103446/healthcare-400x200.jpeg)
Why data travel is healthcare’s next big cybersecurity challenge
Do you know where your patients’ data lives once it’s in the cloud? Unfortunately, for many healthcare organizations, the answer is no – or, at least, it’s not a definitive …
![connected car](https://img.helpnetsecurity.com/wp-content/uploads/2018/01/09102214/connected-car-400x200.jpg)
How secure is your vehicle with digital key technology?
Digital key technology allows mobile devices to streamline approval for everyday access points, making it a fitting solution for the automotive industry. While there are a few …
![Microsoft 365](https://img.helpnetsecurity.com/wp-content/uploads/2023/05/26063958/microsoft365-net-400x200.jpg)
Phishers use encrypted file attachments to steal Microsoft 365 account credentials
Phishers are using encrypted restricted-permission messages (.rpmsg) attached in phishing emails to steal Microsoft 365 account credentials. “[The campaigns] are low …
![ransomware](https://img.helpnetsecurity.com/wp-content/uploads/2022/06/17130642/ransomware-1600-400x200.jpg)
Refined methodologies of ransomware attacks
Adversaries were able to encrypt data in 76% of the ransomware attacks that were conducted against surveyed organizations, according to Sophos. The survey also shows that when …
![encryption](https://img.helpnetsecurity.com/wp-content/uploads/2019/05/09094355/encryption-400x200.jpg)
The WhatsApp of secure computation
A key term when discussing encryption these days is end-to-end (E2E) encryption. The idea with E2E encryption is that data is kept confidential between the encryptor and the …
![Google Chrome no lock icon](https://img.helpnetsecurity.com/wp-content/uploads/2023/05/03122709/google-chrome-no-lock-icon-400x200.jpg)
Google Chrome will lose the “lock” icon for HTTPS-secured sites
In September 2023, Google Chrome will stop showing the lock icon when a site loads over HTTPS, partly due to the now ubiquitous use of the protocol. The misunderstood Lock …
![tools](https://img.helpnetsecurity.com/wp-content/uploads/2018/05/09101144/tools-400x200.jpg)
Security beyond software: The open source hardware security evolution
Mention IT security, and most people immediately think of software-based protections against software-based threats: ransomware, viruses, and other forms of malware. But …
![WhatsApp](https://img.helpnetsecurity.com/wp-content/uploads/2017/01/09105336/whatsapp-400x200.png)
WhatsApp announces features to prevent account takeover
WhatsApp will be rolling out three new security features in the coming months, to provide users with increased privacy and control over their messages and to help prevent …
![face](https://img.helpnetsecurity.com/wp-content/uploads/2017/12/09102343/face-400x200.jpg)
The hidden picture of malware attack trends
Despite the decline in network-detected malware in Q4 2022, endpoint ransomware spiked by 627%, while malware associated with phishing campaigns persisted as a threat, …
![lock](https://img.helpnetsecurity.com/wp-content/uploads/2021/01/19122705/lock-silver-400x200.jpg)
New algorithm may change the future of secure communication
Researchers have made a significant breakthrough in secure communication by developing an algorithm that conceals sensitive information so effectively that it is impossible to …
![document signing](https://img.helpnetsecurity.com/wp-content/uploads/2023/03/06191437/document_signing-400x200.jpg)
What CISOs need to understand about document signing
In this Help Net Security video, David King, Director of Innovation at GlobalSign, discusses document signing. Digital signatures utilize advanced cryptographic technology to …
Featured news
Sponsored
Don't miss
- ChatGPTriage: How can CISOs see and control employees’ AI use?
- Managing exam pressure: Tips for certification preparation
- Firmware update hides Bluetooth fingerprints
- Critical Exim vulnerability facilitates malware delivery (CVE-2024-39929)
- Risk related to non-human identities: Believe the hype, reject the FUD