encryption
New crypto support for mobile payment issuers
Thales announced software for Hardware Security Modules (HSMs) that enables mobile payment issuers to deliver their mobile payment applications to mobile handsets Over-The-Air …
P25 security mitigation guide
In a recent research paper [pdf], we analyzed the security features of the APCO Project 25 (P25) digital two-way radio system. P25 radios are widely deployed in the United …
What really breaks SSL?
After years of being ignored — which is an unusual situation for the protocol that secures the Web — SSL became the focus of the interests of the security …
Granular access to encrypted data in the cloud
Newline Software announced the release of OPTIC, Online Privacy Technology In the Cloud. The solution allows developers to securely query, write, and read encrypted data to …
Mac OS X Lion login password easily revealed
Mac OS X stores user login passwords in system memory even if the computer is locked or put into a sleep mode. The vulnerability is present in all modern versions of Mac OS X, …
A new approach to circumventing state-level Internet censorship
A group of researchers led by J. Alex Halderman, assistant professor of electrical engineering and computer science at the University of Michigan, have been working on a new …
Encrypted voice calling for the iPhone
Cellcrypt Mobile for iPhone provides voice call encryption for commercially available off-the-shelf cell phones using government-certified security through an easy-to-use …
Disk encryption is an IT security priority
As data protection mandates become stricter and high profile instances of data loss proliferate in the media, a new survey by DigitalPersona found that 67 percent of …
SSL Analyzer: Free scanning tool
Comodo announced the Beta release of its SSL Analyzer, a free web site scanning tool which provides an instant summary of web server security levels. After typing a domain …
Portable Microsoft endpoint for secure cloud computing
SPYRUS announced Secure Pocket Drive, the first and only licensed device that boots Microsoft’s mobile, flagship operating system, Windows Embedded Standard 7, from an …
Encrypted voice calling for Android
Cellcrypt launched Mobile for Android, a version of its encrypted voice calling application that runs on Android devices operating over Wi-Fi, GSM and CDMA wireless networks. …
Study examining the usage of hardware-based encrypting drives
The Trusted Computing Group (TCG) and Ponemon Institute released a full report on the perceptions about self-encrypting drives. The study interviewed 517 IT practitioners in …
Featured news
Resources
Don't miss
- What Cloudflare’s 2025 internet review says about attacks, outages, and traffic shifts
- Update your Apple devices to fix actively exploited vulnerabilities! (CVE-2025-14174, CVE-2025-43529)
- Kali Linux 2025.4: New tools and “quality-of-life” improvements
- How researchers are teaching AI agents to ask for permission the right way
- Prometheus: Open-source metrics and monitoring systems and services