Mega Explains Its Encryption Dismissing Some of the Fears and Criticism

Mega Explains Its Encryption Dismissing Some of the Fears and Criticism

Mega came under criticism over some of its encryption features

Mega's Client-Side Encryption Key Is Actually Stored Online

Mega's Client-Side Encryption Key Is Actually Stored Online

Less secure than it could have been, but more convenient

Hashcat Releases Tool for Cracking Encrypted Payload of the Gauss Malware

Hashcat Releases Tool for Cracking Encrypted Payload of the Gauss Malware

oclGaussCrack is much faster than any other tool seen so far

Signs Indicate That IT Security Budgets Will Grow in 2013, Venafi Says

Signs Indicate That IT Security Budgets Will Grow in 2013, Venafi Says

The company also says we'll likely see other data breaches caused by MD5

ElcomSoft Tool Capable of Cracking BitLocker, TrueCrypt and PGP-Encrypted Disks

ElcomSoft Tool Capable of Cracking BitLocker, TrueCrypt and PGP-Encrypted Disks

The Elcomsoft Forensic Disk Decryptor is available for around $300 (233 EUR)

NASA Unlikely to Meet December 21 Computer Encryption Deadline

NASA Unlikely to Meet December 21 Computer Encryption Deadline

That's according to a review made by the agency's inspector general

IRS Refutes South Carolina Governor’s Claims About SSN Encryption

IRS Refutes South Carolina Governor’s Claims About SSN Encryption

Haley has stated that the agency doesn't require the encryption of sensitive information

Secret Layer Hides Files in Plain Sight

Secret Layer Hides Files in Plain Sight

Encryption algorithms make sure your data is safe and sound

IronKey S250 and D250 Hardware-Encrypted Flash Drives Launched by Imation

IronKey S250 and D250 Hardware-Encrypted Flash Drives Launched by Imation

The products are available worldwide via Imation’s network of channel partners

SEC Employees Take Unencrypted Work Computers to Black Hat Conference <em>Reuters</em>

SEC Employees Take Unencrypted Work Computers to Black Hat Conference Reuters

A large amount of money was spent to ensure that no data was compromised

US-CERT Warns About DKIM Keys After Expert Finds Google Emails Easy to Spoof

US-CERT Warns About DKIM Keys After Expert Finds Google Emails Easy to Spoof

Companies such as Yahoo!, Amazon, PayPal, eBay and HSBC are also affected

  • Web Blog
  • By Catalin Cimpanu
  • October 12th, 2012
Script of the Day: jCryption

Script of the Day: jCryption

JavaScript library for protecting HTML form data by encryption

The Secure HSTS Ratified as a Proposed Standard by the IETF

The Secure HSTS Ratified as a Proposed Standard by the IETF

HSTS enables websites to always require a HTTPS connection

Google Go Programming Language Used to Develop Encriyoko Malware

Google Go Programming Language Used to Develop Encriyoko Malware

The Trojan encrypts files with a Blowfish algorithm, making them difficult to recover

Visa to Introduce Point-to-Point Encryption Service to Payment Terminals

Visa to Introduce Point-to-Point Encryption Service to Payment Terminals

The new technology will be made available at the beginning of 2013

Kaspersky Turns to Outside Experts to Decrypt Gauss “Warhead”

Kaspersky Turns to Outside Experts to Decrypt Gauss “Warhead”

There are a lot of questions that remain unanswered

  • iWorld
  • By Filip Truta
  • August 13th, 2012
iOS Encryption Deemed Unbreakable

iOS Encryption Deemed Unbreakable

Forensic detectives having a hard time recovering information from Apple handsets

 
Want more? Browse: