encryption
Is BEAST still a threat?
Yesterday I changed the SSL Labs rating criteria to stop penalizing sites that do not implement server-side mitigations for the BEAST attack. That means that we now consider …
With crypto being insecure, whom do you trust?
Last week’s revelation that the NSA has for years now concentrated on subverting the encryption that protects commerce and banking transactions, sensitive data, e-mails, …
New discovery will allow large-scale quantum cryptography networks
Researchers from Toshiba have discovered a method to build quantum cryptography communication networks with a far greater scale than ever before. It will allow quantum …
NCP engineering enhances Android VPN clients
New features have been added to NCP engineering’s four Android-compatible IPsec VPN clients, available here. Their software features the addition of Full Network …
Persistent adversaries can identify Tor users
Using the Tor network will not you grant perfect anonymity – in fact, a group of researchers from the US Naval Research Laboratory and Georgetown University say that …
Tor usage more than doubles
Roger Dingledine, one of the original developers of Tor and current director of the Tor Project, has noted on the tor-talk mailing list that the number of Tor clients running …
SSLI SDK for security solution providers
With an increasing level of Web traffic rapidly moving to the encrypted HTTPS protocol, Bloxx is now offering its Secure Sockets Layer Intercept (SSLI) Software Development …
Open source encrypted email service reaches crowdfounding goal
Mailpile, the open-source web-mail client with user-friendly encryption whose developers have been asking for funding on Indiegogo, has surpassed its $100,000 goal three weeks …
WatchGuard partners with NCP engineering for IPsec VPN access
WatchGuard announced a partnership with NCP engineering to simplify IPsec VPN access for Microsoft Windows and Apple OS X users. NCP’s remote access VPN technology is …
CyanogenMod announces secure phone locating, remote wiping service
The CyanogenMod team has announced a new service that allows users to locate their lost phones or securely wipe their device (including the contents of the SD card) in case it …
Simple Steps to Data Encryption
After last week's Practical Anonymity, here is another book by Peter Loshin that you might need in this new world of ours. It's a practical, hands-on guide about how to use …
Secure enterprise file sharing from SolarWinds
SolarWinds announced new secure file sharing capabilities to its managed file transfer solution, SolarWinds Serv-U Managed File Transfer (MFT) Server. Serv-U MFT Server …
Don't miss
- Account takeover detection: There’s no single tell
- Man vs. machine: Striking the perfect balance in threat intelligence
- Misconfig Mapper: Open-source tool to uncover security misconfigurations
- Why AI deployment requires a new level of governance
- Mastering the cybersecurity tightrope of protection, detection, and response