Please turn on your JavaScript for this page to function normally.
Trend Micro acquires Mobile Armor

Trend Micro purchased data protection specialist Mobile Armor. Financial terms are not disclosed. The transaction, which is subject to certain closing conditions, including …

Cloud-based crack of SHA-1 passwords is a taste of things to come

Reports that a German hacker has successfully cracked a secure hashing algorithm (SHA-1) password using a pay-as-you-use cloud computing based parallel processing environment …

Vast majority of organizations continue to adopt encryption

For the first time regulatory compliance has surpassed data breach mitigation as the top reason why organizations deploy encryption technologies, according to Ponemon …

Dell releases endpoint encryption solution

Dell today announced Data Protection | Encryption, a flexible, manageable and auditable endpoint encryption solution. The solution is designed to help companies protect …

Hotmail gets full-session HTTPS

Firesheep‘s developers can be satisfied. Not only has Microsoft started contemplating SSL for Bing but – as of yesterday – has provided its Hotmail users …

Mismanaged data encryption causes financial loss

Venafi invited the 150-plus survey participants from the world’s largest companies to give their views on the problem of downtime caused by increasing encryption …

Firesheep countermeasure tool BlackSheep

Firesheep is the Firefox extension that makes it easier to steal logins and take over social media and email accounts after users log in from a WiFi hotspot or even their own …

Popular online services graded on SSL implementation

It seems that Firesheep has succeeded where similar tools have failed in the past: the issue of full end-to-end encryption for all websites – especially the most popular …

End-to-end data security

RSA announced its RSA Data Protection Manager product which combines tokenization and application encryption, two popular application-based controls, with advanced token and …

Protect login credentials with key stroke encryption

SutiSoft released SutiKSE, a security solution that protects data being entered on the keyboard. The solution helps protect against keylogging software and malware threats …

RAID tower with hardware encryption

Addonics announced a family of Cipher Raid Towers with AES 256-bit full disk hardware encryption, a solution for applications that require reliable storage with redundancy and …

Microsoft contemplating SSL for Bing

HTTP session hijacking as a possibility and tools to execute it have been around for more than half a decade, but it took an easy-to-use Firefox add-on like Firesheep to point …

Don't miss

Cybersecurity news