encryption

The new age of quantum computing
Quantum encryption is the holy grail of truly secure communications. If and when quantum computing becomes a widespread reality, many public-key algorithms will become …

New users flock to ProtonMail in wake of Trump’s victory
Following Donald Trump’s victory in the latest US presidential election, many people begun to worry about the surveillance capabilities that will now effectively be left …

Telecrypt ransomware uses Telegram for command and control
Telecrypt, a newly spotted piece of crypto ransomware that uses Telegram’s communication protocol to deliver the decryption key to the crooks, is targeting Russian-speaking …

Signal Protocol’s crypto core has no major flaws, researchers find
A group of computer science and cryptography professors and doctoral students has effected a security analysis of the secure messaging Signal Protocol – specifically, of …

IPVanish VPN unveils new app, security improvements
US-based IPVanish VPN, whose VPN network spans 40,000+ IPs on 500+ servers in 60+ countries, has recently pushed out a major new edition of its app. The new version (v3.0) has …

Encryption software market to reach $8.94 billion by 2021
The ecryption software market size is estimated to grow from $3.05 billion in 2016 to $8.94 billion by 2021, at an estimated CAGR of 24.0%, according to MarketsandMarkets. …

MBRFilter: Cisco open sources tool to protect the Master Boot Record
Cisco’s Talos research team has open sourced MBRFilter, a tool that aims to prevent a system’s Master Boot Record (MBR) getting overwritten by malware. The latest …

GPG Sync: Internal GPG keys syncing tool for orgs
First Look Code has released GPG Sync, an open source tool for keeping a list of GPG keys used by members of an organization always updated, and always available to all of …

VeraCrypt security audit reveals many flaws, some already patched
VeraCrypt, the free, open source disk encryption software based on TrueCrypt, has been audited by experts from cybersecurity company Quarkslab. The researchers found 8 …

Alarming cloud encryption misconceptions revealed
Businesses have a high level of concern about the exposure of sensitive and regulated data in the cloud to security threats. Yet despite this, the majority of data owners …

Signal users can now make their messages disappear
Open Whisper Systems’ Signal, the messaging app favoured by Edward Snowden and many other users who want and need to keep their communication safe and private, is now …

ISIS suspect charged with researching encryption, encrypting website
A man from Cardiff, Wales, has been charged with six terrorism-related charges, including one that involves actions that are not usually considered illegal: researching …
Featured news
Resources
Don't miss
- Federal Reserve System CISO on aligning cyber risk management with transparency, trust
- How cybercriminals are weaponizing AI and what CISOs should do about it
- How analyzing 700,000 security incidents helped our understanding of Living Off the Land tactics
- CitrixBleed 2 might be actively exploited (CVE-2025-5777)
- RIFT: New open-source tool from Microsoft helps analyze Rust malware