Please turn on your JavaScript for this page to function normally.
Moving to the SHA-2 hashing algorithm

In this podcast recorded at RSA Conference 2014, Jay Schiavo, Director of Products and Markets at Entrust and a member of the CA Security Council, discusses why web server …

Whatsapp flaw could reveal all your past conversations

A new Whatsapp flaw that allows any other applications on your Android device to exfiltrate and decrypt past Whatsapp conversations has been discovered and revealed by …

Facebook security and privacy pitfalls

In this interview, Andrei Serbanoiu, Online Threats Researcher at Bitdefender, discusses Facebook security and privacy pitfalls, the dangers of sharing on the social network, …

Protecting data against unwanted surveillance

Network security has been in the spotlight more than ever the past few months, and for good reason. We’ve seen many scary headlines that have put the pressure on …

HTTPS can’t be trusted to obscure private online activity

HTTPS was initially used to prove to Internet users that the website and web server with which they are communicating are indeed the ones they want to communicate with, but …

Cybercriminals increasingly drawn to Tor anonymity and hidden services

Initially created to help political dissidents bypass traffic restrictions and hide their online activity from authoritarian governments, the Tor anonymity network has long …

GnuTLS library flaw opens way for MitM attacks

A critical cryptographic bug similar to the one recently discovered in iOS and OS X has been revealed to exist in the GnuTLS code library, widely used in open source software …

Cryptocat now available for iPhone

Cryptocat, the popular open source application that enables users to chat online easily and securely, is now available for iPhone users (on Apple’s App Store), as well. …

Risk Analytics as a Service by Brinqa

Brinqa announced the industry’s first Risk Analytics as a Service offering. “Risk Analytics as a Service is aimed at companies that are struggling to find a …

Consumers’ bad data security habits should worry employers

Consumers are not securing the data on their personal laptops or desktops correctly, if at all, according to the results of a Harris Poll survey commissioned by WinMagic. A …

Military-grade encryption tunnel scrambles voice, text and emails

GOTrust Technology Inc. announced that National Institute of Standards Technology (NIST) has awarded the company Federal Information Processing Standards (FIPS) 140-2 level 3 …

New free online software security training courses

The Software Assurance Forum for Excellence in Code (SAFECode), a non-profit organization working to increase trust in technology products and services through the advancement …

Don't miss

Cybersecurity news