encryption
Researcher offers free voice and text encryption app to Egyptians
The explosive situation in Egypt has mobilized many repression-hating individuals in the world to try to do something to support the country’s citizens in their efforts …
SSL certificates for Intel Core vPro processors
Entrust has added SSL certificates for Intel Core vPro processors to its large portfolio of digital certificate offerings. This new capability, core to an identity-based …
Data Breach and Encryption Handbook
Cybersecurity risks pose some of the most serious economic and national security challenges of the 21st century. A new book, Data Breach and Encryption Handbook, published by …
Changing the status quo for security
When a problem is recognized that impacts virtually everyone and a group of experts provides a solution, what can possibly prevent the solution from being used? If the problem …
A step towards wider SSL implementation
Two great stumbling blocks on the path leading to a Web-wide implementation of the SSL/TLS protocols have always been cost and speed. So far, the great majority of websites …
WatchGuard XCS gains spam blocking and encryption capabilities
WatchGuard released a free update to its XCS (extensible content security) line of email and web content security appliances that includes new features to make stopping spam …
OpenSSH 5.7 released
OpenSSH is a 100% complete SSH protocol version 1.3, 1.5 and 2.0 implementation and includes sftp client and server support. It encrypts all traffic (including passwords) to …
Victorinox unveils new secure devices
Victorinox launched three new products – the Victorinox Slim, Victorinox Slim Duo and the Victorinox Secure SSD. Products are waterproof, shock resistant and available …
Deploy, maintain and manage data security protection
WinMagic released SecureDoc 5, the full-disk encryption solution that allows organizations to integrate data protection with existing security policies to protect sensitive …
GSM cracking is all about knowledge, not money
Since the cracking of GSM encryption back in December 2009 by encryption expert Karsten Nohl, the cost of setting up an operation that includes sniffing out the calls made by …
OpenBSD headman believes contractor tried to insert backdoors
Following last week’s accusation by a former government contractor that the FBI has implemented backdoors into the encryption software used by OpenBSD, Theo de Raadt, …
Database of routers’ embedded private SSL keys published
The recent publishing of a database containing over 2,000 private SSL keys hard-coded into various routers – with their corresponding public certificates and …
Featured news
Resources
Don't miss
- CitrixBleed 2 might be actively exploited (CVE-2025-5777)
- RIFT: New open-source tool from Microsoft helps analyze Rust malware
- Are we securing AI like the rest of the cloud?
- How exposure-enriched SOC data can cut cyberattacks in half by 2028
- Europe’s AI strategy: Smart caution or missed opportunity?