Please turn on your JavaScript for this page to function normally.
Protect data before sending it to the cloud

IBM inventors have developed a technique for protecting sensitive data prior to transmitting it to the cloud. The patented invention will overcome barriers to client adoption …

Free eBook: OpenSSL Cookbook

If your job has something to do with security, web development, or system administration, you can’t avoid having to deal with OpenSSL on at least some level. This book …

iPhone secure messaging with self-destruct mechanism via Wickr app

Wickr was one of the most interesting companies I was introduced to at this year’s RSA Conference in San Francisco. The company was one of the finalists of the …

Apple’s iCloud protocols cracked and analyzed

Smartphones carry a lot of sensitive data that in theory should be accessible only to their owners. In practice, a lot of it can be exfiltrated from the devices and from the …

Lavabit users allowed to access accounts and retrieve data

Lavabit’s Ladar Levison has announced that the users of his recently closed down email service will be able to briefly access their accounts so that they can retrieve …

CipherCloud delivers searchable strong encryption

CipherCloud has delivered techniques to improve the searchability, usability and security of cloud data protected with AES 256-bit encryption. The solution also enables …

WhatsApp encryption flaw revealed, POC code published

A Dutch researcher says that the encryption solution implemented by popular cross-platform IM service WhatsApp is flawed. He claims that the company has not thought it out as …

GnuPG 2.0.22 fixes security problem

GnuPG 2.0.22 is a security fix release and all users are advised to updated to this version. What’s new: Fixed possible infinite recursion in the compressed packet …

Shell Control Box now monitors web based applications

BalaBit IT Security announced a new version of its Shell Control Box (SCB) activity monitoring appliance. The latest version of SCB makes forensics investigations easier, …

Tor-using Mevade botnet is stealthy new version of old threat

The Mevade Trojan and botnet have gained unexpected notoriety when it turned out that the majority of the recent, sudden and massive uptick in Tor users was the result of it …

Organizations fear their privacy activities are insufficient

The perceived level of maturity attached to organizations’ privacy activities has decreased since 2011, as many organizations deem their existing privacy activities to …

Deploy endpoint encryption technologies with Wave Cloud 2014

Wave Systems launched Wave Cloud 2014, a cloud-based service for enterprise-wide management of endpoint encryption. It includes management of Windows BitLocker and Mac …

Don't miss

Cybersecurity news