- Internet Life
- By Lucian Parfeni
- January 23rd, 2013
Mega Explains Its Encryption Dismissing Some of the Fears and Criticism
Mega came under criticism over some of its encryption features
- Internet Life
- By Lucian Parfeni
- January 21st, 2013
Mega's Client-Side Encryption Key Is Actually Stored Online
Less secure than it could have been, but more convenient
- Security Blog
- By Eduard Kovacs
- December 28th, 2012
Hashcat Releases Tool for Cracking Encrypted Payload of the Gauss Malware
oclGaussCrack is much faster than any other tool seen so far
- Security Blog
- By Eduard Kovacs
- December 21st, 2012
Signs Indicate That IT Security Budgets Will Grow in 2013, Venafi Says
The company also says we'll likely see other data breaches caused by MD5
- Security Fixes and Improvements
- By Eduard Kovacs
- December 20th, 2012
ElcomSoft Tool Capable of Cracking BitLocker, TrueCrypt and PGP-Encrypted Disks
The Elcomsoft Forensic Disk Decryptor is available for around $300 (233 EUR)
- Advisories
- By Eduard Kovacs
- December 20th, 2012
NASA Unlikely to Meet December 21 Computer Encryption Deadline
That's according to a review made by the agency's inspector general
- Security Blog
- By Eduard Kovacs
- November 22nd, 2012
IRS Refutes South Carolina Governor’s Claims About SSN Encryption
Haley has stated that the agency doesn't require the encryption of sensitive information
- Windows software reviews
- By Ionut Ilascu
- November 15th, 2012
Secret Layer Hides Files in Plain Sight
Encryption algorithms make sure your data is safe and sound
- Security, Surveillance & Survival
- By Eduard Kovacs
- November 9th, 2012
IronKey S250 and D250 Hardware-Encrypted Flash Drives Launched by Imation
The products are available worldwide via Imation’s network of channel partners
- Security Blog
- By Eduard Kovacs
- November 9th, 2012
SEC Employees Take Unencrypted Work Computers to Black Hat Conference Reuters
A large amount of money was spent to ensure that no data was compromised
- Security Fixes and Improvements
- By Eduard Kovacs
- October 25th, 2012
US-CERT Warns About DKIM Keys After Expert Finds Google Emails Easy to Spoof
Companies such as Yahoo!, Amazon, PayPal, eBay and HSBC are also affected
- Web Blog
- By Catalin Cimpanu
- October 12th, 2012
Script of the Day: jCryption
JavaScript library for protecting HTML form data by encryption
- Security Blog
- By Lucian Parfeni
- October 4th, 2012
The Secure HSTS Ratified as a Proposed Standard by the IETF
HSTS enables websites to always require a HTTPS connection
- Security Blog
- By Eduard Kovacs
- September 19th, 2012
Google Go Programming Language Used to Develop Encriyoko Malware
The Trojan encrypts files with a Blowfish algorithm, making them difficult to recover
- Security Fixes and Improvements
- By Eduard Kovacs
- September 13th, 2012
Visa to Introduce Point-to-Point Encryption Service to Payment Terminals
The new technology will be made available at the beginning of 2013
- Security Blog
- By Eduard Kovacs
- August 14th, 2012
Kaspersky Turns to Outside Experts to Decrypt Gauss “Warhead”
There are a lot of questions that remain unanswered
- iWorld
- By Filip Truta
- August 13th, 2012
iOS Encryption Deemed Unbreakable
Forensic detectives having a hard time recovering information from Apple handsets