encryption

Open source hardware cryptographic module offered for $800
For a few years now, the CrypTech project has been working on designing an open source hardware cryptographic engine that could be used to secure core Internet infrastructure. …

Review: iStorage diskAshur Pro
The iStorage diskAshur Pro is a hard drive for users with security on their mind. This USB 3.0 device comes in various storage capacities, ranging from 500GB to 2TB, and is …

Riffle: A new anonymity system to rival Tor
A group of researchers from MIT and the Swiss Federal Institute of Technology in Lausanne have come up with a new anonymity system that is both bandwidth and computation …

CMS Airship: Free secure content management
CMS Airship is a free content management system designed and maintained by a team of PHP security experts at Paragon Initiative Enterprises. The web interface for managing …

Secret Conversations: End-to-end encryption for Facebook Messenger
After integrating Open Whisper Systems’ Signal Protocol into WhatsApp earlier this year, Facebook has done the same to the Facebook Messenger app, and called the feature …

Analyze your data: Where is it and who has it?
It is becoming widely recognized that “unknown” data leakage of PCI data, and more broadly other Personally Identifiable Information, within enterprises is the highest value …

Companies are embracing an enterprise-wide encryption strategy
The biggest users of encryption are companies in financial services, healthcare and pharmaceutical, as well as technology and software industries, according to Thales. A new …

New Russian law to force service providers to decrypt encrypted comms
An extremely wide-ranging anti-terrorism law has been passed last week by the lower house of the Russian Federal Assembly (i.e. parliament), and it is widely expected to pass …

Review: GuardKey
Over the years, we’ve covered many encrypted USB dongles on Help Net Security. All of them provide high security for your data, encrypted and stored on the dongle …

Chrome vulnerability lets attackers steal movies from streaming services
A significant security vulnerability in Google technology that is supposed to protect videos streamed via Google Chrome has been discovered by researchers from the Ben-Gurion …

ApocalypseVM ransomware decrypter released
AV company Emsisoft has added yet another ransomware decrypter tool to its stable: a decrypter for ApocalypseVM. The tool works on the latest versions of the ransomware in …

Tor Browser 6.0 released
The Tor Browser lets you use Tor on Windows, OS X, or Linux without needing to install any software. It can run off a USB flash drive, comes with a pre-configured web browser …