encryption
Concerned with the vulnerability of authentication tokens?
Since RSA has finally admitted publicly that the March breach into its systems has resulted in the compromise of their SecurID two-factor authentication tokens, organizations …
Flashback: Encrypted backups for Android
Flashback provides encrypted backups to the cloud, giving you reliable access to your data along with the peace of mind that it’s secure. Flashback allows you to backup …
Encrypt files on Mac with BestCrypt
Jetico announced that their popular BestCrypt Container Encryption software now offers full compatibility with Mac computers. The software delivers data protection. Selected …
iPhone hardware encryption investigated
Users of Apple iPhone devices accumulate huge amounts of highly sensitive information stored in their smartphones. Historical geolocation data, viewed Google maps and routes, …
OpenSSL weakness can expose sensitive information
A weakness has been reported in OpenSSL, which can be exploited by malicious people to disclose potentially sensitive information, according to Secunia. The weakness is caused …
Mobile Encryption for iOS and Android
Sophos announced a number of new enterprise product lines that together offer protection anywhere and on any device. Sophos Mobile Control provides lightweight device …
PC Lock protects from identity theft, privacy invasion
Laplink released PC Lock, data encryption software with cloud management. Its Web Management Console lets users modify preferences, change settings, reset passwords, lock the …
41% carry unprotected sensitive information on mobile devices
41 percent of what should be a security savvy audience are carrying sensitive information on mobile devices unprotected, according to Origin Storage. In fact, 19 percent …
Self-encrypting drives most effective against data breaches
With more than 82 percent of respondents reporting one or more data breaches, a new Ponemon Institute study on self-encrypting drives found that 70 percent believed that …
Securing the cloud and securing data in the cloud are not the same
This article will take a look at five of the most impactful vulnerabilities of storing data in the cloud, and offer details on why the most important thing for CSOs and …
Page-integrated encryption for protecting credit cards on the web
Voltage Security announced a new encryption breakthrough for protecting personal data entered by consumers on web pages called PIE for Page-Integrated Encryption. The company …
A closer look at DropDMG
DropDMG (v3.0.6) is a piece of software that helps you create and work with Mac disk images – Apple’s preferred format for distributing Mac software and the only …
Featured news
Resources
Don't miss
- What 35 years of privacy law say about the state of data protection
- 40 open-source tools redefining how security teams secure the stack
- Password habits are changing, and the data shows how far we’ve come
- Product showcase: Tuta – secure, encrypted, private email
- Henkel CISO on the messy truth of monitoring factories built across decades