encryption
Police unable to decrypt iPhones, asks Apple to do it
Court documents from a drug trial in Kentucky have revealed that the U.S. federal Bureau of Alcohol, Tobacco, Firearms and Explosives nor any other U.S. local, state, or …
Cyber attacks on trust expose companies to millions in losses
Every large UK business is open to £247million in possible threat exposure due to a lack of control over cryptographic keys and certificates, the foundation of trust in …
Free tool to identify risks in secure shell environments
SSH Communications Security, the inventor of the Secure Shell and SFTP protocols, today announced the launch of SSH Risk Assessor (SRA), a free tool that provides users with a …
SafeNet releases first crypto hypervisor
At a time when confidence in perimeter security is waning, and organizations are increasingly facing business pressure to adopt cloud strategies and consolidate their data …
Encrypted e-mail service from Silent Circle
Silent Circle announced the availability of the company’s new Silent Mail e-mail encryption service. Silent Mail addresses longstanding problems with e-mail encryption: …
IT decision makers mark increase in security-related incidents
More than one-third of surveyed European enterprises (36%) have experienced an increase in the frequency of network and data security-related incidents in the last 18 months, …
BirdStep updates SafeMove mobile VPN solution
Birdstep Technology released SafeMove Mobile VPN 7.0 (MVPN), which introduces several features, including performance, manageability and user experience improvements. Windows …
iMessage encryption stumps US federal agents
A recent investigation conducted by US Drug Enforcement Administration agents has been temporarily derailed after they failed to decrypt messages the targets exchanged via …
New IronKey secure USB flash and hard drives
Imation expanded the IronKey secure USB product line with new hardware encrypted flash and external hard disk drives. The IronKey D80 flash drives and H80 hard drives enable …
Cisco devices saddled with weakened password encryption
Instead of improving it, an implementation issue has left a “limited” number of Cisco IOS and Cisco IOS XE releases with a weaker password hashing algorithm, …
Scan, monitor and analyze SSL-encrypted communications
SSL Locksmith exposes the contents of SSL-encrypted network communications, which eliminates a critical cyber security blind spot. Many network and security applications are …
Internal name SSL certificates could be exploited for MitM atacks
The Certificate Authority practice of issuing “Internal Name” certificates for private domains which are currently non-resolvable by the Domain Name System could …
Featured news
Sponsored
Don't miss
- Void Banshee APT exploited “lingering Windows relic” in zero-day attacks
- SYS01 info-stealer pushed via Facebook ads, LinkedIn and YouTube posts
- ChatGPTriage: How can CISOs see and control employees’ AI use?
- Managing exam pressure: Tips for certification preparation
- Firmware update hides Bluetooth fingerprints