Please turn on your JavaScript for this page to function normally.
POODLE vulnerability: The end of life of SSL 3.0

There is a critical security vulnerability in SSL 3.0 which allows attackers to calculate the plaintext of encrypted connections, and it will likely spell the end of the use …

First secure external HDD with cloud management

Imation announced a high-security, high-performance external USB 3.0 SuperSpeed hard drive capable of being managed in the cloud. Using a single centralized, cloud-based …

Low confidence in breach prevention

Despite increasing numbers of data breaches and the theft and loss of more than 2 billion data records worldwide since 2013, organizations continue to believe perimeter …

Hong Kong protesters hit with malware, turn to “off-the-grid” chat app

The pro-democracy protests started by Hong Kong students’ and backed by the Occupy Central protesters (Central is the name of Hong Kong’s financial district) are …

CloudFlare offers free SSL encryption

Web performance and security company CloudFlare today launched Universal SSL, making Secure Socket Layer (SSL) encryption available to anyone at no cost. “Yesterday …

CipherShed: A replacement for TrueCrypt

Ever since TrueCrypt developers terminated the development of the popular encryption utility and announced that it was not safe to use, users who need such a tool have been …

Free tool simplifies SHA-2 migration for system administrators

DigiCert released a free tool which helps system administrators analyze their use of SHA-1 hashing algorithms across all domains and subdomains and map out a path for SHA-2 …

Bulletproof SSL and TLS
Bulletproof SSL and TLS

Deploying SSL or TLS in a secure way is a great challenge for system administrators. This book aims to simplify that challenge by offering extensive knowledge and good advice …

Researchers unlock TorrentLocker encryption

A team of Finnish researchers has discovered that the files encrypted by the recently unearthed TorrentLocker ransomware can be decrypted without paying the ransom – if …

Phishers resort to AES crypto to obfuscate phishing sites

Phishers have started employing AES encryption to disguise the real nature of phishing sites from automatic phishing detection tools. This is the latest obfuscating trick in …

Google will start gradually sunsetting SHA-1

Google has announced that it will begin the process of gradually sunsetting SHA-1 (as used in certificate signatures for HTTPS) with Chrome 39, which is due to be released in …

Tool restores SynoLocker-encrypted files

Security company F-Secure has created a tool that could help SynoLocker victims get their files back, but it only works if they have received – bought – the …

Don't miss

Cybersecurity news