Please turn on your JavaScript for this page to function normally.
Everyday Cryptography: Fundamental Principles and Applications

Cryptography is a vital technology that underpins the security of information in computer networks. This book presents a comprehensive introduction to the role that …

BYOD access solution with biometrics

HID Global announced a solution for government agencies interested in securing iOS devices with access to sensitive data. The solution combines the ActivClient Mobile SDK for …

Whonix: Anonymous operating system

Whonix is an anonymous general purpose operating system based on Virtual Box, Ubuntu GNU/Linux and Tor. By Whonix design, IP and DNS leaks are impossible. Not even malware …

One-click security within Microsoft Outlook

CertiVox launched an automatic, end-to-end encryption capability designed specifically to enable government, businesses and individuals to benefit from one-click security …

HSTS approved as proposed standard

The Internet Engineering Steering Group (IESG) has approved the HTTP Strict Transport Security protocol (HSTS) as a proposed standard, which means that we can look forward to …

NIST selects winner of SHA-3 competition

The National Institute of Standards and Technology (NIST) announced the winner of its five-year competition to select a new cryptographic hash algorithm, one of the …

New wireless APs and 2-factor authentication products from Fortinet

Fortinet announced four new wireless access points along with three new two-factor authentication products. Fortinet is introducing four new additions to its wireless access …

Pen-testing Cookie Cadger continues where Firesheep left off

When the Firesheep extension was revealed to the world in late 2010, its developer said that his main goal was to get sites to switch to full end-to-end encryption, i.e. SSL. …

Google Go programming language used for creating destructive Trojan

When Google introduced its Go programming language in 2009, they surely didn’t hope for it to be used for writing malware but, as these things go, it was a only a matter …

Botnet operators hide C&Cs in the Tor network

Over the years, botnet owners have tried out different tactics for keeping their C&C servers online, in contact with the zombie computers, and hidden from researchers and …

BEAST developers come up with new SSL/TLS attack

From the security researchers who created and demonstrated the BEAST (Browser Exploit Against SSL/TLS) tool for breaking SSL/TLS encryption comes another attack that exploits …

Solving the portable data security headache

Protecting intellectual property and sensitive information is a major security concern for any business today – especially against the backdrop of workers needing to …

Don't miss

Cybersecurity news