encryption - News, Features, and Slideshows
- Tor Project working to fix weakness that can unmask users
- Stealthy ransomware 'Critroni' uses Tor, could replace Cryptolocker
Developers of Tor software believe they've identified a weakness that was scheduled to be revealed at the Black Hat security conference next month that could be used to de-anonymize Tor users.
By Lucian Constantin | 23 July, 2014 01:06
Email encryption startup Virtru has launched a version of its service for businesses using Google Apps, a market segment that the company thinks is showing increased interest in secure communications.
By Jeremy Kirk | 22 July, 2014 21:34
Cybercriminals are spreading a new file-encrypting ransomware program that's more powerful and resilient than Cryptolocker, a threat recently shut down by the U.S. Department of Justice.
By Lucian Constantin | 22 July, 2014 01:14
Plans to favor some Internet packets over others threaten consumers' hard-won right to use encryption, a digital privacy advocate says.
By Stephen Lawson | 19 July, 2014 03:42
Botnet tracking outfit Abuse.ch has launched a project to list SSL (Secure Sockets Layer) certificates used by some malware programs to hide their communications.
By Lucian Constantin | 17 July, 2014 01:16
FreeOTFE may sound like a political bumper sticker, but it stands for "Free On The Fly Encryption." The "Free" part is self-explanatory; "On The Fly Encryption" refers to the encrypting/decrypting of data as it is written to or read from your hard disk.
By Ian Harac | 09 March, 2011 06:09
Despite the convenience, free public Wi-Fi networks like those found in hotels, Starbucks, and McDonald's are also a serious risk when it comes to your data and personal information.
By Tony Bradley | 11 November, 2010 07:42
Losing your laptop can be expensive in three ways. First, you'll spend hundreds or thousands of dollars to replace the hardware. Second, you'll suffer the time and aggravation of restoring your data, all the while hoping you have everything backed up properly. But most expensive? Surviving the backlash and legal consequences of losing customer data, financial records and private company information.
By James E. Gaskin | 14 May, 2009 04:34
Apple has improved its security in recent years, but is it enough?
By Bob Violino | 10 March, 2014 11:04
The government's insistence, in its dispute with Lavabit, that cloud service providers hand over their encryption keys when asked, has refocused attention on the issue of key ownership and management in the cloud.
By Jaikumar Vijayan | 15 November, 2013 11:41
An encryption initiative runs into the law of unintended consequences, since the legal department can't search encrypted emails for e-discovery purposes.
By Mathias Thurman | 14 January, 2013 11:04
Whitepapers about encryption
As organizations begin to expand their encryption usage, several realities become readily apparent: Encryption, The increasing adoption of cloud services, and leveraging hardware security modules (HSM) as well as standards will become foundational requirements for central, enterprise-wide key management. How are organisations contending with these realities as they seek to meet the need for more widespread encryption? This executive summary draws on an extensive survey to provide an update.
If you’re looking for your first ERP system or looking to upgrade from an existing system, the evaluation, selection and implementation process is a long-term strategic decision for your organization. To help you through this process, here are eight simple steps for a successful ERP system selection.
Technology has become the heart and soul of every business, but IT workload and system complexity become more challenging. This whitepaper details the future of IT, the major challenges facing CIOs, and the three ways to transform IT so CIOs can lead the way.
- Sale of Mt. Gox-related Bitcoins.com halted after court order
- Qualcomm faces hurdles collecting royalties from China
- Twitter employees mainly male and white, says it has 'lot of work to do'
- Facebook isn't giving up on search
- Firm says vulnerability in Tails contained in I2P component
- More AT&T customers switch to paying for their phones
- Dropbox lures business users from consumer product
- Ultra high-def TVs still too expensive
- Facebook reports a big sales jump, helped by mobile ads
- SSD prices for hybrids, ultrathin laptops to flatten next year
- Microsoft verging on single OS across all devices
- Top 5 take-aways from Tim Cook on Apple's Q3 earnings call
- IBM aims to disrupt supercomputing market with Cloud enticements
- Microsoft again writes off Surface inventory, renews profitability doubts
- Arrests made after international cyber-ring targets StubHub