encryption
Western Digital self-encrypting hard drives are completely insecure
A team of researchers has decided to check whether the encryption offered by Western Digital’s My Passport external self-encrypting hard drives is effective and …
GnuPG 2.1.9 released
The GNU Privacy Guard (GnuPG) is a complete and free implementation of the OpenPGP standard which is commonly abbreviated as PGP. It allows to encrypt and sign data and …
Infographic: Devaluing data, fighting cybercrime
For any organization connected to the Internet, it is not a question of if but when their business will be under attack, according to a recent cybersecurity report from …
Symantec fires employees who issued rogue Google certificates
Symantec has fired several employees that have been involved in the issuing of rogue certificates for some Google domains.“We learned on Wednesday that a small number of …
Encryption: Whose keys are they, anyway?
Over the past year, encryption has been showing up in a number of unlikely places. It started when Google executive chairman Eric Schmidt proclaimed that encrypting everything …
Tor security improves as .onion becomes a special-use domain name
The .onion domain has been officially designated by the Internet Assigned Numbers Authority (IANA) as a special-use domain name. The move, initiated by the Internet …
63% in favor of encryption backdoors to respond to national security threats
Vormetric did a survey on how Americans view “backdoor” access by government entities to the encrypted data of private businesses. Ninety-one percent recognized …
Encryptr: Open source cloud based password manager
Encryptr is based on the Crypton JavaScript framework. The whole idea behind the Crypton concept is to enable developers to store data on the remote server in such way that …
End-to-end encryption is key for securing the Internet of Things
The Internet of Things (IoT) is one of the hottest buzzwords these days. It seems like almost everything is being connected, including cars, streetlights, oil rigs, wearables …
Major browser makers synchronize end of support for RC4
Mozilla, Google and Microsoft have come to an agreement: support for the increasingly vulnerable RC4 cryptographic cypher in the companies’ browsers will end in early …
How Linux Foundation sysadmins secure their workstations
Sysadmins around the world have been provided with another helpful guide on how to go about hardening their Linux workstations, as Konstantin Ryabitsev, Director of …
OpenSSH 7.0 deprecates weak, legacy and unsafe cryptography
OpenSSH encrypts all traffic (including passwords) to effectively eliminate eavesdropping, connection hijacking, and other attacks. Additionally, it provides secure tunneling …
Featured news
Resources
Don't miss
- CISA confirms exploitation of VMware ESXi flaw by ransomware attackers
- Why a decade-old EnCase driver still works as an EDR killer
- Smart glasses are back, privacy issues included
- Cybersecurity planning keeps moving toward whole-of-society models
- Major vulnerabilities found in Google Looker, putting self-hosted deployments at risk