encryption
BitTorrent releases free P2P private voice and text app
After an initial pre-alpha release in July 2014, BitTorrent’s peer-to-peer private voice and text app Bleep is finally available for curious Windows, Mac, iOS and …
Tor Cloud project reaches the end of the line
The Tor Project has discontinued the Tor Cloud project due to a lack of dedicated software developers and maintainers.The Tor Cloud project was started in late 2011, with the …
Flawed crypto endangers millions of smart grid devices
The cryptography used in the Open Smart Grid Protocol (OSGP), one of the most widely used smart meter and smart grid device networking standards, can be easily cracked, …
Mozilla pushes for full HTTPS use
Mozilla has announced they are planning to deprecate non-secure HTTP.“After a robust discussion on our community mailing list, Mozilla is committing to focus new …
Tor Browser 4.5. is out, with new security and privacy upgrades
The Tor Project has released version 4.5 of its popular Tor Browser, and this new version comes with a number of security and privacy improvements.Users can now use a Security …
There’s now a decryption tool for TeslaCrypt ransomware
“Here’s some very good news for victims of the TeslaCrypt ransomware: Cisco researchers have created a tool for them to decrypt the files themselves and avoid …
SecureDoc Cloud removes security concerns related to cloud file sharing
WinMagic introduced at RSA Conference 2015 security software that encrypts and manages how files are shared via cloud file sharing services such as Dropbox or Box. SecureDoc …
Use of encryption continues to rise
The use of encryption continues to grow in response to consumer concerns, privacy compliance regulations and on-going cyber-attacks and yet there are still major challenges in …
BlackVault CYNR: Code and document signing appliance
Engage Black introduced the BlackVault CYNR security appliance at RSA Conference 2015. The BlackVault CYNR integrates a Layer 3+ Hardware Security Module (HSM) with …
Upatre malware gets full SSL comms encryption
“The extremely popular Upatre Trojan downloader has undergone considerable changes that will make it and its communication more difficult to spot and block. The changes …
TorLocker victims can decrypt most files without paying ransom
Crypto-ransomware rarely means good news for targets, but when it comes to TorLocker malware (detected as Trojan-Ransom.Win32.Scraper by Kaspersky Lab), the victims can …
New Tor version fixes issues that can crash hidden services and clients
Two new versions of the Tor anonymity software have been released on Tuesday, with fixes for two security issues that can be exploited to crash hidden services and clients …
Featured news
Resources
Don't miss
- Quantum threats are already active and the defense response remains fragmented
- Top must-visit companies at RSAC 2026
- Oracle issues emergency fix for pre-auth RCE in Identity Manager (CVE-2026-21992)
- Your AI agents are moving sensitive data. Do you know where?
- Plumber: Open-source scanner of GitLab CI/CD pipelines for compliance gaps