encryption
Free trial for cloud-based encryption and secure key management on AWS
SafeNet announced a thirty-day free trial of its ProtectV virtual encryption solutions and Virtual KeySecure via AWS Marketplace on Amazon Web Services (AWS). Financial …
Most non-IT employees don’t “get” company IT security policies
DataMotion released results of its second annual survey on corporate email and file transfer habits. Among the findings is a far-reaching communications disconnect between IT …
New technology searches encrypted data in its encrypted form
Fujitsu Laboratories announced the development of a technology that can perform concealed searches of encrypted data in its encrypted form. Searching data while it is …
Blackphone to put privacy and control first
Silent Circle and Geeksphone announced Blackphone, a smartphone placing privacy and control directly in the hands of its users. Blackphone, powered by a security-oriented …
Target hackers shopping around for data decryption services?
The target breach and the massive amount of user information compromised in its wake is understandably worrying customers. But what are the odds of it being actually used by …
Sefnit Trojan endangers users even after removal
Remember when in late August 2013 the Tor anonymity network was hit with a sudden and massive influx of active clients connecting to it? It was later discovered that the spike …
Yahoo Mail now has HTTPS on by default
With a short blog post, Yahoo’s SVP of Communication Products Jeff Bonforte has announced that the company has started encrypting all connections between their users and …
NSA employee will remain as co-chair on crypto standards group
NSA employee Kevin Igoe will continue to be one of the two co-chairs of the Crypto Forum Research Group (CFRG), which helps the Internet Engineering Task Force (IETF) review …
Deadly new ransomware soon to be released?
As disruptive as Cryptolocker is, there’s a possibility that an even deadlier type of ransomware will soon be targeting unsuspecting users. White-hat security research …
Multi-protocol SoftEther VPN becomes open source
In March 2013, a Japanese student by the name of Daiyuu Nobori set up VPN Gate, a free VPN service that he hoped would be used by Internet users who wish to avoid their …
OpenSSL site hack wasn’t the result of vulnerability exploitation
After a few days of speculations fuelled by a not clear enough explanation, the OpenSSL Foundation has confirmed that the late December defacement of its Openssl.org website …
Sophisticated and targeted attacks on the horizon
As 2013 draws to a close, Gavin Millard a security expert from Tripwire gazes into his crystal ball and predicts what 2014 has in store for us. Targeted mobile attacks will …
Featured news
Resources
Don't miss
- Update your Apple devices to fix actively exploited vulnerabilities! (CVE-2025-14174, CVE-2025-43529)
- Kali Linux 2025.4: New tools and “quality-of-life” improvements
- How researchers are teaching AI agents to ask for permission the right way
- Prometheus: Open-source metrics and monitoring systems and services
- What types of compliance should your password manager support?