encryption
GnuTLS library flaw opens way for MitM attacks
A critical cryptographic bug similar to the one recently discovered in iOS and OS X has been revealed to exist in the GnuTLS code library, widely used in open source software …
Cryptocat now available for iPhone
Cryptocat, the popular open source application that enables users to chat online easily and securely, is now available for iPhone users (on Apple’s App Store), as well. …
Risk Analytics as a Service by Brinqa
Brinqa announced the industry’s first Risk Analytics as a Service offering. “Risk Analytics as a Service is aimed at companies that are struggling to find a …
Consumers’ bad data security habits should worry employers
Consumers are not securing the data on their personal laptops or desktops correctly, if at all, according to the results of a Harris Poll survey commissioned by WinMagic. A …
Military-grade encryption tunnel scrambles voice, text and emails
GOTrust Technology Inc. announced that National Institute of Standards Technology (NIST) has awarded the company Federal Information Processing Standards (FIPS) 140-2 level 3 …
New free online software security training courses
The Software Assurance Forum for Excellence in Code (SAFECode), a non-profit organization working to increase trust in technology products and services through the advancement …
CryptoCube: Enterprise crypto and authentication in one rackmount
At the RSA Conference 2014 Futurex announced the release of CryptoCube, a purpose-built, all-in-one rackmount enclosure for the secure encryption, decryption, authentication, …
Encryption management platform for protection in hybrid clouds
AFORE Solutions announced the addition of CloudLink SecureVM and CloudLink SecureFILE modules to the CloudLink encryption platform. The additions build on the existing …
Apple fixes critical crypto bug in iOS, OS X fix to be released “soon”
On Friday, Apple announced the release a software update for its iOS mobile operating system that addresses a critical encryption flaw. A similar update has also been released …
60% of enterprises relying on sysadmins to self-police SSH keys
Enterprises tolerate security vulnerabilities by allowing open door, root-level access, according to a new Ponemon Institute report. 46% of the 1,854 respondents reported …
Encryption use continues to grow
Use of encryption continues to grow in response to consumer concerns, privacy compliance regulations and on-going cyber attacks and yet there are still major challenges in …
“Honey Encryption” overwhelms attackers with fake results
Former RSA chief scientist Ari Juels is working on an innovative approach at encryption that could make cyber crooks’ like a lot more difficult. This new encryption …
Featured news
Sponsored
Don't miss
- Void Banshee APT exploited “lingering Windows relic” in zero-day attacks
- SYS01 info-stealer pushed via Facebook ads, LinkedIn and YouTube posts
- ChatGPTriage: How can CISOs see and control employees’ AI use?
- Managing exam pressure: Tips for certification preparation
- Firmware update hides Bluetooth fingerprints