Please turn on your JavaScript for this page to function normally.
Microsoft hardens encryption for Outlook, OneDrive

Microsoft is making good on the promises they made last December, when they announced that they will – among other things – strengthen the encryption of customer …

IEEE launches Anti-Malware Support Service

IEEE announced the launch of IEEE Anti-Malware Support Service (AMSS). A new service from IEEE Standards Association’s (IEEE-SA) Industry Connections Security Group …

Wireless security risks and defenses

In this interview, Kent Lawson, CEO of Private WiFi, talks about the key threats exposed by wireless access, offers protection advice and illustrates the trends that will …

Improperly anonymized taxi logs reveal drivers’ identity, movements

Software developer Vijay Pandurangan has demonstrated that sometimes data anonymizing efforts made by governments and businesses are worryingly inadequate, as he managed to …

Google forks OpenSSL: BoringSSL will be used in company products

Google has announced another OpenSSL fork. Dubbed BoringSSL, it will, in time, replace the OpenSSL library in various Google’s projects. “We have used a number of …

Cisco releases source code for experimental block cipher

A team of Cisco software engineers has created a new encryption scheme, and has released it to the public along with the caveat that this new block cypher is not ready for …

TrueCrypt developer says forking the software is impossible

Even though a number of people have expressed interest in continuing the development of TrueCrypt, the future of these projects is questionable as one of the TrueCrypt …

Java program to reverse Android ransomware damage

University of Sussex student Simon Bell has reverse-engineered the Android Simplocker (Simplelocker) ransomware, and has created a Java program that can be converted into an …

Use your own encryption keys for Amazon S3 storage

Amazon Web Services has some good news for users of S3, its popular online file storage web service: they can now use their own encryption keys to protect their data at rest. …

Life after TrueCrypt

While speculation continues around the fate of popular disk encryption software TrueCrypt, Sophos conducted a survey of over 100 IT professionals regarding their use of …

Google End-to-End: The encryption silver bullet?

The world seems to be turning its attention to the notion of data encryption, and Google is the latest to jump on the bandwagon. On June 3rd, Google announced that it would be …

Crypto-ransomware brings in quite a profit

Crypto-ransomware is quickly becoming cybercrooks’ favorite tool to extort money from computer users. After the amazing success of CryptoLocker, copycats have begun …

Don't miss

Cybersecurity news