Please turn on your JavaScript for this page to function normally.
Police unable to decrypt iPhones, asks Apple to do it

Court documents from a drug trial in Kentucky have revealed that the U.S. federal Bureau of Alcohol, Tobacco, Firearms and Explosives nor any other U.S. local, state, or …

Cyber attacks on trust expose companies to millions in losses

Every large UK business is open to £247million in possible threat exposure due to a lack of control over cryptographic keys and certificates, the foundation of trust in …

Free tool to identify risks in secure shell environments

SSH Communications Security, the inventor of the Secure Shell and SFTP protocols, today announced the launch of SSH Risk Assessor (SRA), a free tool that provides users with a …

SafeNet releases first crypto hypervisor

At a time when confidence in perimeter security is waning, and organizations are increasingly facing business pressure to adopt cloud strategies and consolidate their data …

Encrypted e-mail service from Silent Circle

Silent Circle announced the availability of the company’s new Silent Mail e-mail encryption service. Silent Mail addresses longstanding problems with e-mail encryption: …

IT decision makers mark increase in security-related incidents

More than one-third of surveyed European enterprises (36%) have experienced an increase in the frequency of network and data security-related incidents in the last 18 months, …

BirdStep updates SafeMove mobile VPN solution

Birdstep Technology released SafeMove Mobile VPN 7.0 (MVPN), which introduces several features, including performance, manageability and user experience improvements. Windows …

iMessage encryption stumps US federal agents

A recent investigation conducted by US Drug Enforcement Administration agents has been temporarily derailed after they failed to decrypt messages the targets exchanged via …

New IronKey secure USB flash and hard drives

Imation expanded the IronKey secure USB product line with new hardware encrypted flash and external hard disk drives. The IronKey D80 flash drives and H80 hard drives enable …

Cisco devices saddled with weakened password encryption

Instead of improving it, an implementation issue has left a “limited” number of Cisco IOS and Cisco IOS XE releases with a weaker password hashing algorithm, …

Scan, monitor and analyze SSL-encrypted communications

SSL Locksmith exposes the contents of SSL-encrypted network communications, which eliminates a critical cyber security blind spot. Many network and security applications are …

Internal name SSL certificates could be exploited for MitM atacks

The Certificate Authority practice of issuing “Internal Name” certificates for private domains which are currently non-resolvable by the Domain Name System could …

Don't miss

Cybersecurity news