Please turn on your JavaScript for this page to function normally.
CipherCloud delivers searchable strong encryption

CipherCloud has delivered techniques to improve the searchability, usability and security of cloud data protected with AES 256-bit encryption. The solution also enables …

WhatsApp encryption flaw revealed, POC code published

A Dutch researcher says that the encryption solution implemented by popular cross-platform IM service WhatsApp is flawed. He claims that the company has not thought it out as …

GnuPG 2.0.22 fixes security problem

GnuPG 2.0.22 is a security fix release and all users are advised to updated to this version. What’s new: Fixed possible infinite recursion in the compressed packet …

Shell Control Box now monitors web based applications

BalaBit IT Security announced a new version of its Shell Control Box (SCB) activity monitoring appliance. The latest version of SCB makes forensics investigations easier, …

Tor-using Mevade botnet is stealthy new version of old threat

The Mevade Trojan and botnet have gained unexpected notoriety when it turned out that the majority of the recent, sudden and massive uptick in Tor users was the result of it …

Organizations fear their privacy activities are insufficient

The perceived level of maturity attached to organizations’ privacy activities has decreased since 2011, as many organizations deem their existing privacy activities to …

Deploy endpoint encryption technologies with Wave Cloud 2014

Wave Systems launched Wave Cloud 2014, a cloud-based service for enterprise-wide management of endpoint encryption. It includes management of Windows BitLocker and Mac …

Major increase in Filecoder malware

The ESET HQ malware research lab is reporting an unusual spike in the actvity of Filecoder malware – Trojans that encrypt user files and try to extort a ransom from the …

RSA advises customers to stop using NSA-influenced encryption algorithm

In the wake of the disclosure that the NSA has influenced NIST to adopt an encryption standard that includes one random bit generator with a weakness known only to the …

Clever email campaign delivers deadly ransomware to orgs

A new type of ransomware that obviously concentrates on targeting organizations instead of home users has been spotted by Emsisoft researchers. Dubbed CryptoLocker, the …

30 Percent of transactions conducted from Tor are fraudulent

iovation announced that 30.2 percent of transactions conducted from Tor (the onion router) in August were fraudulent. This compared with an overall fraud rate of 1 percent for …

What CISOs must learn from Bitcoin and a research team at Georgia Tech

It has been an eventful time in the mobile world with two recent breaking stories revealing vulnerabilities in the security infrastructure for Android and iOS respectively. …

Don't miss

Cybersecurity news