encryption
How secure is quantum cryptography?
Quantum communication systems offer the promise of virtually unbreakable encryption. Unlike classical encryption, which is used to send secure data over networks today and …
Plugging the trust gap
Every business and government is dependent upon cryptographic keys and certificates to provide trust for critical communications. These trust technologies underpin the modern …
Google set to upgrade its SSL certs
As a fine example of proactive security, Google has announced that it will be upgrading its SSL certificates to 2048-bit keys by the end of 2013. “We will begin …
Microsoft decrypts Skype comms to detect malicious links
The issue addresses last week by The H and their associates at heise Security of whether or not Microsoft checks links contained in encrypted Skype chat sessions and their …
Find TrueCrypt and BitLocker encrypted containers and images
Passware announced that Passware Kit Forensic 12.5 can now recognize hard disk images and containers, such as TrueCrypt, BitLocker, PGP, during a computer scan. For a computer …
New 2-factor authentication for the finance industry
OneID released OneID Confirm, a customizable two-factor authentication solution. It is based on the same architecture as the OneID Suite, a set of integrated digital identity …
Police unable to decrypt iPhones, asks Apple to do it
Court documents from a drug trial in Kentucky have revealed that the U.S. federal Bureau of Alcohol, Tobacco, Firearms and Explosives nor any other U.S. local, state, or …
Cyber attacks on trust expose companies to millions in losses
Every large UK business is open to £247million in possible threat exposure due to a lack of control over cryptographic keys and certificates, the foundation of trust in …
Free tool to identify risks in secure shell environments
SSH Communications Security, the inventor of the Secure Shell and SFTP protocols, today announced the launch of SSH Risk Assessor (SRA), a free tool that provides users with a …
SafeNet releases first crypto hypervisor
At a time when confidence in perimeter security is waning, and organizations are increasingly facing business pressure to adopt cloud strategies and consolidate their data …
Encrypted e-mail service from Silent Circle
Silent Circle announced the availability of the company’s new Silent Mail e-mail encryption service. Silent Mail addresses longstanding problems with e-mail encryption: …
IT decision makers mark increase in security-related incidents
More than one-third of surveyed European enterprises (36%) have experienced an increase in the frequency of network and data security-related incidents in the last 18 months, …
Featured news
Resources
Don't miss
- Man vs. machine: Striking the perfect balance in threat intelligence
- Misconfig Mapper: Open-source tool to uncover security misconfigurations
- Why AI deployment requires a new level of governance
- Mastering the cybersecurity tightrope of protection, detection, and response
- PRevent: Open-source tool to detect malicious code in pull requests