encryption - News, Features, and Slideshows
Developers of Tor software believe they've identified a weakness that was scheduled to be revealed at the Black Hat security conference next month that could be used to de-anonymize Tor users.
By Lucian Constantin | 23 July, 2014 01:06
Email encryption startup Virtru has launched a version of its service for businesses using Google Apps, a market segment that the company thinks is showing increased interest in secure communications.
By Jeremy Kirk | 22 July, 2014 21:34
Cybercriminals are spreading a new file-encrypting ransomware program that's more powerful and resilient than Cryptolocker, a threat recently shut down by the U.S. Department of Justice.
By Lucian Constantin | 22 July, 2014 01:14
Plans to favor some Internet packets over others threaten consumers' hard-won right to use encryption, a digital privacy advocate says.
By Stephen Lawson | 19 July, 2014 03:42
Botnet tracking outfit Abuse.ch has launched a project to list SSL (Secure Sockets Layer) certificates used by some malware programs to hide their communications.
By Lucian Constantin | 17 July, 2014 01:16
FreeOTFE may sound like a political bumper sticker, but it stands for "Free On The Fly Encryption." The "Free" part is self-explanatory; "On The Fly Encryption" refers to the encrypting/decrypting of data as it is written to or read from your hard disk.
By Ian Harac | 09 March, 2011 06:09
Despite the convenience, free public Wi-Fi networks like those found in hotels, Starbucks, and McDonald's are also a serious risk when it comes to your data and personal information.
By Tony Bradley | 11 November, 2010 07:42
Losing your laptop can be expensive in three ways. First, you'll spend hundreds or thousands of dollars to replace the hardware. Second, you'll suffer the time and aggravation of restoring your data, all the while hoping you have everything backed up properly. But most expensive? Surviving the backlash and legal consequences of losing customer data, financial records and private company information.
By James E. Gaskin | 14 May, 2009 04:34
Apple has improved its security in recent years, but is it enough?
By Bob Violino | 10 March, 2014 11:04
The government's insistence, in its dispute with Lavabit, that cloud service providers hand over their encryption keys when asked, has refocused attention on the issue of key ownership and management in the cloud.
By Jaikumar Vijayan | 15 November, 2013 11:41
An encryption initiative runs into the law of unintended consequences, since the legal department can't search encrypted emails for e-discovery purposes.
By Mathias Thurman | 14 January, 2013 11:04
Whitepapers about encryption
As organizations begin to expand their encryption usage, several realities become readily apparent: Encryption, The increasing adoption of cloud services, and leveraging hardware security modules (HSM) as well as standards will become foundational requirements for central, enterprise-wide key management. How are organisations contending with these realities as they seek to meet the need for more widespread encryption? This executive summary draws on an extensive survey to provide an update.
If you’re looking for your first ERP system or looking to upgrade from an existing system, the evaluation, selection and implementation process is a long-term strategic decision for your organization. To help you through this process, here are eight simple steps for a successful ERP system selection.
Most organisations want to improve web application performance for their users, but they can’t always justify the cost of implementing acceleration techniques.Fine out where to find a simple, low-risk, and low-cost acceleration solution that can significantly improve the end-user experience. Read more
- Microsoft faces anti-monopoly probe in China over Windows, Office
- Feds arrest Florida man who allegedly conned Apple out of $309K
- Privacy groups call for action to stop Facebook's off site user tracking plans
- French fight the death of OpenVMS
- Huawei's smartphones shipments rise on international sales
- Rhapsody reaches 2M subscribers, bets on new unRadio service
- Smart locker application wins first place at BattleHack Sydney
- Using Instagram on public Wi-Fi poses risk of an account hijack, researcher says
- Consumer group decries government's anti-piracy plans
- Data retention: Industry reiterates warning on costs
- Lithium-metal battery could boost gadget power
- Vodafone uses low-band to boost 4G coverage
- NICTA pushes seL4 microkernel beyond drones
- ACMA signs online child abuse notification scheme with police
- Testbed will help clouds and networks shake hands