encryption - News, Features, and Slideshows
Microsoft has blacklisted a subordinate CA certificate that was wrongfully used to issue SSL certificates for several Google websites. The action will prevent those certificates from being used in Google website spoofing attacks against Internet Explorer users.
By Lucian Constantin | 26 March, 2015 00:59
The mystery high-severity flaw that people were expected to be fixed in OpenSSL is no Heartbleed, but it is serious and users should update.
By Lucian Constantin | 20 March, 2015 04:47
After a security enthusiast discovered a loophole that allowed him to register a valid SSL certificate for Microsoft's live.fi domain, he tried to responsibly disclose the issue. But instead of thanks he got locked out of his email, phone, Xbox and online storage accounts.
By Lucian Constantin | 19 March, 2015 04:52
Microsoft released an update to blacklist an SSL certificate for one of its domain names that was issued to an unauthorized third party.
By Lucian Constantin | 17 March, 2015 22:07
What if the key to your house was shared with 28,000 other homes?
By Jeremy Kirk | 17 March, 2015 12:23
FreeOTFE may sound like a political bumper sticker, but it stands for "Free On The Fly Encryption." The "Free" part is self-explanatory; "On The Fly Encryption" refers to the encrypting/decrypting of data as it is written to or read from your hard disk.
By Ian Harac | 09 March, 2011 06:09
Despite the convenience, free public Wi-Fi networks like those found in hotels, Starbucks, and McDonald's are also a serious risk when it comes to your data and personal information.
By Tony Bradley | 11 November, 2010 07:42
Losing your laptop can be expensive in three ways. First, you'll spend hundreds or thousands of dollars to replace the hardware. Second, you'll suffer the time and aggravation of restoring your data, all the while hoping you have everything backed up properly. But most expensive? Surviving the backlash and legal consequences of losing customer data, financial records and private company information.
By James E. Gaskin | 14 May, 2009 04:34
Apple has improved its security in recent years, but is it enough?
By Bob Violino | 10 March, 2014 11:04
The government's insistence, in its dispute with Lavabit, that cloud service providers hand over their encryption keys when asked, has refocused attention on the issue of key ownership and management in the cloud.
By Jaikumar Vijayan | 15 November, 2013 11:41
An encryption initiative runs into the law of unintended consequences, since the legal department can't search encrypted emails for e-discovery purposes.
By Mathias Thurman | 14 January, 2013 11:04
Whitepapers about encryption
As organizations begin to expand their encryption usage, several realities become readily apparent: Encryption, The increasing adoption of cloud services, and leveraging hardware security modules (HSM) as well as standards will become foundational requirements for central, enterprise-wide key management. How are organisations contending with these realities as they seek to meet the need for more widespread encryption? This executive summary draws on an extensive survey to provide an update.
The following report, is based on a global survey of 706 IT and security professionals conducted in the United States, Canada, Germany, United Kingdom, Australia and New Zealand. The goal of the survey was to capture data on current attitudes and trends with mobile devices and IT security. This is the third survey on this topic and this report evaluates differences in responses to similar questions asked over the past two years.
- FTSenior SQL DBANSW
- CCDBA (Oracle/SQL)NSW
- CCMobile iOS DeveloperNSW
- CCFront End Web Developer (Drupal)NSW
- CCSenior Systems EngineerNSW
- FT.Net Solution ArchitectNSW
- FTBusiness Management - Account Director - Leading Entertainment ClientNSW
- CCMobile Designer / Developer - IOSNSW
- CC.Net Solution ArchitectNSW
- FTJunior Media Buyer - Sales CoordinatorNSW
- CCMobile Designer / Developer - IOSNSW
- CCSenior Release EngineerNSW
- FTApplication Support SpecialistNSW
How do you ensure you are choosing the right threat intelligence solution for your organization? The recent Forrester Research, Inc. report, “Use Actionable Threat Intelligence to Protect Your Digital Business,” describes the characteristics of effective threat intelligence and what to look for in a threat intelligence vendor (August 2014).
- Vodafone cuts complaints
- GitHub recovering from massive DDoS attacks
- In Pictures: How 20 (mostly) tech companies' logos have evolved over the years
- In Pictures: Worst data breaches of 2014
- In Pictures: 9 security gadgets for mobile devices
- 'Largest DDoS attack' in GitHub's history targets anticensorship projects
- FCC will vote next month on plan to share valuable 3.5GHz spectrum
- Intel could strengthen its server product stack with Altera
- Kleiner Perkins cleared of sex discrimination against Ellen Pao
- Facebook reveals the logic behind its forced Messenger split
- French self-driving car goes for a spin around Paris monument
- Google to bring imaging, sensor technology to the operating room
- 5 freshly-funded cloud computing companies worth watching
- Why Meerkat and Periscope are the next big challenge for marketers
- USB Type-C peripherals are on the way, and storage devices are first up