encryption
Firesheep countermeasure tool BlackSheep
Firesheep is the Firefox extension that makes it easier to steal logins and take over social media and email accounts after users log in from a WiFi hotspot or even their own …
Popular online services graded on SSL implementation
It seems that Firesheep has succeeded where similar tools have failed in the past: the issue of full end-to-end encryption for all websites – especially the most popular …
End-to-end data security
RSA announced its RSA Data Protection Manager product which combines tokenization and application encryption, two popular application-based controls, with advanced token and …
Protect login credentials with key stroke encryption
SutiSoft released SutiKSE, a security solution that protects data being entered on the keyboard. The solution helps protect against keylogging software and malware threats …
RAID tower with hardware encryption
Addonics announced a family of Cipher Raid Towers with AES 256-bit full disk hardware encryption, a solution for applications that require reliable storage with redundancy and …
Microsoft contemplating SSL for Bing
HTTP session hijacking as a possibility and tools to execute it have been around for more than half a decade, but it took an easy-to-use Firefox add-on like Firesheep to point …
Hardware encrypted RAID tower
Ciphertex Data Security introduced the CX-RANGER/E, a portable encrypted RAID system with AES 256-bit hardware-based encryption and up to 5 Terabytes of storage capacity. It …
78% of organizations experienced downtime due to mismanaged encryption
Encryption key and digital certificate inventories are rising, according to a study by Venafi. Poorly managed encryption leads to system downtime, non-compliance and audit …
Featured news
Resources
Don't miss
- Mastering the cybersecurity tightrope of protection, detection, and response
- PRevent: Open-source tool to detect malicious code in pull requests
- Darcula allows tech-illiterate crooks to create, deploy DIY phishing kits targeting any brand
- Hackers pose as employers to steal crypto, login credentials
- Unknown and unsecured: The risks of poor asset visibility