Please turn on your JavaScript for this page to function normally.
Yahoo encrypts traffic between data centers, plans for encrypted Messenger

Newly appointed Yahoo CISO Alex Stamos has announced on Wednesday that the company has begun fully encrypting all the traffic moving between its data centers. The move was …

Additional NSA-backed code found in RSA crypto products

A group of professors and researchers from several universities in the US and the Netherlands have tested the exploitability of various implementations of the infamous …

10,000 GitHub users inadvertently reveal their AWS secret access keys

GitHub developers who are also Amazon Web Services users are advised to check the code they made public on their project pages and to delete secret access keys for their AWS …

Gmail users get full, always-on HTTPS

Google has made good on its word and has introduced default encryption for all Gmail users. “Starting today, Gmail will always use an encrypted HTTPS connection when you …

SSL innovations

In this podcast recorded at RSA Conference 2014, Wayne Thayer, the General Manager of Security Products at GoDaddy and a member of the CA Security Council, compares and …

New authenticated encryption algorithm is resistant to multiple misuse

Nippon Telegraph and Telephone Corporation, Mitsubishi Electric Corporation and the University of Fukui have jointly developed an authenticated encryption algorithm offering …

Moving to the SHA-2 hashing algorithm

In this podcast recorded at RSA Conference 2014, Jay Schiavo, Director of Products and Markets at Entrust and a member of the CA Security Council, discusses why web server …

Whatsapp flaw could reveal all your past conversations

A new Whatsapp flaw that allows any other applications on your Android device to exfiltrate and decrypt past Whatsapp conversations has been discovered and revealed by …

Facebook security and privacy pitfalls

In this interview, Andrei Serbanoiu, Online Threats Researcher at Bitdefender, discusses Facebook security and privacy pitfalls, the dangers of sharing on the social network, …

Protecting data against unwanted surveillance

Network security has been in the spotlight more than ever the past few months, and for good reason. We’ve seen many scary headlines that have put the pressure on …

HTTPS can’t be trusted to obscure private online activity

HTTPS was initially used to prove to Internet users that the website and web server with which they are communicating are indeed the ones they want to communicate with, but …

Cybercriminals increasingly drawn to Tor anonymity and hidden services

Initially created to help political dissidents bypass traffic restrictions and hide their online activity from authoritarian governments, the Tor anonymity network has long …

Don't miss

Cybersecurity news