encryption
GSM cracking is all about knowledge, not money
Since the cracking of GSM encryption back in December 2009 by encryption expert Karsten Nohl, the cost of setting up an operation that includes sniffing out the calls made by …
OpenBSD headman believes contractor tried to insert backdoors
Following last week’s accusation by a former government contractor that the FBI has implemented backdoors into the encryption software used by OpenBSD, Theo de Raadt, …
Database of routers’ embedded private SSL keys published
The recent publishing of a database containing over 2,000 private SSL keys hard-coded into various routers – with their corresponding public certificates and …
Google doesn’t want to share its encryption keys
Two years ago, the wish to have control over communication systems and the lack of technical resources of Indian intelligence agencies has led to a particular request targeted …
Voice encryption app for the iPhone
Kryptos is a secure VoIP application for the iPhone. It utilizes 256-bit AES military grade encryption to encrypt voice communications between users, while using 1024-bit RSA …
Toshiba announces new self-encrypting drive
Toshiba announced a 7,200 RPM 2.5-inch Self-Encrypting Drive (SED) that provides government-grade AES-256 hardware encryption incorporated in the disk drive’s controller …
Trend Micro acquires Mobile Armor
Trend Micro purchased data protection specialist Mobile Armor. Financial terms are not disclosed. The transaction, which is subject to certain closing conditions, including …
Cloud-based crack of SHA-1 passwords is a taste of things to come
Reports that a German hacker has successfully cracked a secure hashing algorithm (SHA-1) password using a pay-as-you-use cloud computing based parallel processing environment …
Vast majority of organizations continue to adopt encryption
For the first time regulatory compliance has surpassed data breach mitigation as the top reason why organizations deploy encryption technologies, according to Ponemon …
Dell releases endpoint encryption solution
Dell today announced Data Protection | Encryption, a flexible, manageable and auditable endpoint encryption solution. The solution is designed to help companies protect …
Hotmail gets full-session HTTPS
Firesheep‘s developers can be satisfied. Not only has Microsoft started contemplating SSL for Bing but – as of yesterday – has provided its Hotmail users …
Mismanaged data encryption causes financial loss
Venafi invited the 150-plus survey participants from the world’s largest companies to give their views on the problem of downtime caused by increasing encryption …
Featured news
Resources
Don't miss
- Mastering the cybersecurity tightrope of protection, detection, and response
- PRevent: Open-source tool to detect malicious code in pull requests
- Darcula allows tech-illiterate crooks to create, deploy DIY phishing kits targeting any brand
- Hackers pose as employers to steal crypto, login credentials
- Unknown and unsecured: The risks of poor asset visibility