encryption

Amazon Silk browser removes Google’s default encryption
Google’s good intentions of keeping searches made via its search engine protected through default encryption have been stymied by Amazon. A bug in the Amazon Silk …

Researchers discover 110 snooping Tor nodes
In a period spanning 72 days, two researchers from Northeastern University have discovered at least 110 “misbehaving” and potentially malicious hidden services …

Open source hardware cryptographic module offered for $800
For a few years now, the CrypTech project has been working on designing an open source hardware cryptographic engine that could be used to secure core Internet infrastructure. …

Review: iStorage diskAshur Pro
The iStorage diskAshur Pro is a hard drive for users with security on their mind. This USB 3.0 device comes in various storage capacities, ranging from 500GB to 2TB, and is …

Riffle: A new anonymity system to rival Tor
A group of researchers from MIT and the Swiss Federal Institute of Technology in Lausanne have come up with a new anonymity system that is both bandwidth and computation …

CMS Airship: Free secure content management
CMS Airship is a free content management system designed and maintained by a team of PHP security experts at Paragon Initiative Enterprises. The web interface for managing …

Secret Conversations: End-to-end encryption for Facebook Messenger
After integrating Open Whisper Systems’ Signal Protocol into WhatsApp earlier this year, Facebook has done the same to the Facebook Messenger app, and called the feature …

Analyze your data: Where is it and who has it?
It is becoming widely recognized that “unknown” data leakage of PCI data, and more broadly other Personally Identifiable Information, within enterprises is the highest value …

Companies are embracing an enterprise-wide encryption strategy
The biggest users of encryption are companies in financial services, healthcare and pharmaceutical, as well as technology and software industries, according to Thales. A new …

New Russian law to force service providers to decrypt encrypted comms
An extremely wide-ranging anti-terrorism law has been passed last week by the lower house of the Russian Federal Assembly (i.e. parliament), and it is widely expected to pass …

Review: GuardKey
Over the years, we’ve covered many encrypted USB dongles on Help Net Security. All of them provide high security for your data, encrypted and stored on the dongle …

Chrome vulnerability lets attackers steal movies from streaming services
A significant security vulnerability in Google technology that is supposed to protect videos streamed via Google Chrome has been discovered by researchers from the Ben-Gurion …
Featured news
Resources
Don't miss
- Federal Reserve System CISO on aligning cyber risk management with transparency, trust
- How cybercriminals are weaponizing AI and what CISOs should do about it
- How analyzing 700,000 security incidents helped our understanding of Living Off the Land tactics
- CitrixBleed 2 might be actively exploited (CVE-2025-5777)
- RIFT: New open-source tool from Microsoft helps analyze Rust malware