encryption
Weak crypto allowed spoofing emails from Google, PayPal domains
Zach Harris, a Florida-based mathematician, discovered that Google and many other big Internet companies use weak cryptographic keys for certifying the emails sent from their …
Popular Android apps leaking passwords due to poor SSL
A group of researchers from two German universities claim that eight percent of the 13,500 popular, free-of-charge, legitimate Android Android apps they downloaded from Google …
Thales releases elliptic curve hardware security modules
Thales introduced of nShield Connect 6000+ and nShield Solo 6000+ hardware security modules (HSMs), delivering the fastest available support for elliptic curve cryptography …
Cloud security application uses electronic fingerprint
Intrinsic-ID launched Saturnus, an application that allows users to protect data with their mobile devices before sending it to the cloud. It is the first application that …
Cloud-based document security from SealPath
SealPath launched its cloud-based software solution for Professionals and Enterprise users. Using SealPath technology, documents containing sensitive business information are …
Everyday Cryptography: Fundamental Principles and Applications
Cryptography is a vital technology that underpins the security of information in computer networks. This book presents a comprehensive introduction to the role that …
BYOD access solution with biometrics
HID Global announced a solution for government agencies interested in securing iOS devices with access to sensitive data. The solution combines the ActivClient Mobile SDK for …
Whonix: Anonymous operating system
Whonix is an anonymous general purpose operating system based on Virtual Box, Ubuntu GNU/Linux and Tor. By Whonix design, IP and DNS leaks are impossible. Not even malware …
One-click security within Microsoft Outlook
CertiVox launched an automatic, end-to-end encryption capability designed specifically to enable government, businesses and individuals to benefit from one-click security …
HSTS approved as proposed standard
The Internet Engineering Steering Group (IESG) has approved the HTTP Strict Transport Security protocol (HSTS) as a proposed standard, which means that we can look forward to …
NIST selects winner of SHA-3 competition
The National Institute of Standards and Technology (NIST) announced the winner of its five-year competition to select a new cryptographic hash algorithm, one of the …
New wireless APs and 2-factor authentication products from Fortinet
Fortinet announced four new wireless access points along with three new two-factor authentication products. Fortinet is introducing four new additions to its wireless access …
Featured news
Resources
Don't miss
- Attackers are exploiting critical SAP S/4HANA vulnerability (CVE-2025-42957)
- Stealthy attack serves poisoned web pages only to AI agents
- September 2025 Patch Tuesday forecast: The CVE matrix
- Google fixes actively exploited Android vulnerabilities (CVE-2025-48543, CVE-2025-38352)
- CyberFlex: Flexible Pen testing as a Service with EASM