Please turn on your JavaScript for this page to function normally.
Security system for trust of data in the cloud

Porticor introduced the latest release of its Virtual Private Data (VPD) system, which protects cloud data while stored and in use, delivering total security to cloud …

Weak crypto allowed spoofing emails from Google, PayPal domains

Zach Harris, a Florida-based mathematician, discovered that Google and many other big Internet companies use weak cryptographic keys for certifying the emails sent from their …

Popular Android apps leaking passwords due to poor SSL

A group of researchers from two German universities claim that eight percent of the 13,500 popular, free-of-charge, legitimate Android Android apps they downloaded from Google …

Thales releases elliptic curve hardware security modules

Thales introduced of nShield Connect 6000+ and nShield Solo 6000+ hardware security modules (HSMs), delivering the fastest available support for elliptic curve cryptography …

Cloud security application uses electronic fingerprint

Intrinsic-ID launched Saturnus, an application that allows users to protect data with their mobile devices before sending it to the cloud. It is the first application that …

Cloud-based document security from SealPath

SealPath launched its cloud-based software solution for Professionals and Enterprise users. Using SealPath technology, documents containing sensitive business information are …

Everyday Cryptography: Fundamental Principles and Applications

Cryptography is a vital technology that underpins the security of information in computer networks. This book presents a comprehensive introduction to the role that …

BYOD access solution with biometrics

HID Global announced a solution for government agencies interested in securing iOS devices with access to sensitive data. The solution combines the ActivClient Mobile SDK for …

Whonix: Anonymous operating system

Whonix is an anonymous general purpose operating system based on Virtual Box, Ubuntu GNU/Linux and Tor. By Whonix design, IP and DNS leaks are impossible. Not even malware …

One-click security within Microsoft Outlook

CertiVox launched an automatic, end-to-end encryption capability designed specifically to enable government, businesses and individuals to benefit from one-click security …

HSTS approved as proposed standard

The Internet Engineering Steering Group (IESG) has approved the HTTP Strict Transport Security protocol (HSTS) as a proposed standard, which means that we can look forward to …

NIST selects winner of SHA-3 competition

The National Institute of Standards and Technology (NIST) announced the winner of its five-year competition to select a new cryptographic hash algorithm, one of the …

Don't miss

Cybersecurity news