encryption
3TB hardware encrypted drive with PIN code access
iStorage released their Desktop Secure Hard Drive which comes with a robust, shock-proof design and 256-bit AES hardware encryption, which encrypts data on the fly as fast as …
DARPA invests $4.9M towards secure cloud computing
The Defense Advanced Research Projects Agency (DARPA) has awarded $4.9M to Galois, Inc., as research integrator for the PROCEED program (Programming Computation on Encrypted …
Managed government-level secure USB from Kingston
Kingston announced the DataTraveler 4000-M Managed (DT4000-M) USB Flash drive, a fully managed version of the company’s DataTraveler 4000 product. Specifically developed …
SecureDoc 5.2: Full-disk encryption supports Lenovo Hardware Password Manager
WinMagic launches SecureDoc 5.2, the only full-disk encryption (FDE) solution to support Lenovo Hardware Password Manager (HPM) on ThinkPad laptops and ThinkCentre desktops. …
WhisperCore: Device and data protection for Android
WhisperCore is a secure Android platform dedicated to providing the security and management features necessary for transforming a consumer phone into an enterprise-class …
FBI asks public to break a code, help solve a murder
An interesting request for help has been made public yesterday by the FBI: “Cryptanalists, help solve an open murder case”. The murder happened back in 1999. …
The need for data encryption in the cloud
Recent Microsoft research shows that almost two-fifths of companies will start paying for cloud services within three years. Cloud-using firms need to revisit their encryption …
A closer look at MacKeeper
MacKeeper (v1.0.3.) is a comprehensive bundle of various system utilities that will help you keep your Mac secure from malware; find it if it gets stolen; backup, restore, …
Google extends SSL to developer facing APIs
Firesheep‘s authors can be the satisfied with the gradual migration towards SSL that most of the biggest social networks, search engines, online shops and others have …
The crucial role of crypto technologies
Crypto technologies play a crucial role in data protection and compliance activities across a wide range of industry sectors, in both private and public organizations, …
The growth of cryptography
It’s not every day that Euclid appears in public with “Alice and Bob,” but in a lecture spanning a few thousand years, Ronald Rivest, a member of MIT’s …
Toshiba e-Studio855SE series with advanced security features
Toshiba introduced their new e-STUDIO855SE Series (models 555SE, 655SE, 755SE, 855SE) which provides Hard Disk Drive (HDD) Encryption and Data Overwrite out of the box. …
Featured news
Resources
Don't miss
- Portmaster: Open-source application firewall
- Google fixes Android vulnerabilities “under targeted exploitation” (CVE-2025-48633, CVE-2025-48572)
- How a noisy ransomware intrusion exposed a long-term espionage foothold
- Creative cybersecurity strategies for resource-constrained institutions
- Product showcase: UserLock IAM for Active Directory