encryption
yaSSL offers new open source security tools
yaSSL has made IT-level security tools available for the open source community, ensuring that mature, advanced security tools like Kerberos, wpa_supplicant, and OpenSSH are …
Mozilla asks CAs in its root program to revoke all MitM certificates
Following the big brouhaha raised by Trustwave’s acknowledgement that it has revoked a “MitM” subordinate root certificate it issued to a business for its …
Secure data with cloud-based encryption
Porticor introduced its Virtual Private Data (Porticor VPD) system, a solution combining data encryption with patented key management to protect critical data in public, …
Mozilla wants CAs to stop issuing and revoke MITM certificates
A heated debate has unfolded after Trustwave made public their decision to revoke a subordinate root certificate it issued to a company that allowed it to intercept their …
Twitter turns on HTTPS by default
Twitter has finally taken the plunge and made HTTPS on by default for all users. The option to always use HTTPS was made available to users back in March 2011, but they had to …
Apple iWork passwords cracked
ElcomSoft can now recover passwords protecting Apple iWork documents. This makes Distributed Password Recovery the first tool to recover passwords for Numbers, Pages and …
Chrome to stop using online checks to spot revoked certificates
Future versions of Google’s Chrome browser will no longer use online revocation checks to verify whether the HTTPS site the user wants to visit possesses a valid …
Satellite telephony encryption cracked
Satellite telephony was thought to be secure against eavesdropping. Researchers at the Horst G?¶rtz Institute for IT-Security (HGI) at the Ruhr University Bochum (RUB) have …
Trustwave revokes “MitM” certificate, vows never to issue one again
Certificate authority Trustwave has revoked a subordinate root certificate it issued to a company that allowed it to intercept their employees’ private email …
Security architecture for trusted execution environments
Elliptic Technologies introduced the tVault Security Architecture – a technology that enables end-to-end security in connected devices. tVault provides robust security …
The fusion of hardware encryption, PIN access and USB 3.0
Apricorn expanded their Aegis Secure Drives to the desktop environment with a new desktop edition, the Aegis Padlock. Sporting a spacious capacity of up to 3 TB with a Super …
Apache Shiro: Java security framework
Apache Shiro is a Java security framework that performs authentication, authorization, cryptography, and session management. With Shiro’s API, you can secure any …