encryption - News, Features, and Slideshows
Encrypting data traffic is mandatory for safeguarding information. But when attackers use encryption to mask their activity, it can be hard for enterprises to figure out what they're stealing.
By Jeremy Kirk | 29 October, 2014 14:07
A new technique that allows attackers to hide encrypted malicious Android applications inside images could be used to evade detection by antivirus products and possibly Google Play's own malware scanner.
By Lucian Constantin | 17 October, 2014 22:09
Apple and Google should reconsider their plans to enable encryption by default on their smartphones, and the U.S. Congress should pass a law requiring that all communication tools allow police access to user data, U.S. FBI Director James Comey said.
By Grant Gross | 17 October, 2014 04:02
Google researchers have found a severe flaw in an obsolete but still used encryption software, which could be exploited to steal sensitive data.
By Jeremy Kirk | 15 October, 2014 15:07
The strength of Apple's revised encryption scheme in iOS 8 hinges on users choosing a strong passcode or password, which they rarely do, according to a Princeton University fellow.
By Jeremy Kirk | 09 October, 2014 11:50
FreeOTFE may sound like a political bumper sticker, but it stands for "Free On The Fly Encryption." The "Free" part is self-explanatory; "On The Fly Encryption" refers to the encrypting/decrypting of data as it is written to or read from your hard disk.
By Ian Harac | 09 March, 2011 06:09
Despite the convenience, free public Wi-Fi networks like those found in hotels, Starbucks, and McDonald's are also a serious risk when it comes to your data and personal information.
By Tony Bradley | 11 November, 2010 07:42
Losing your laptop can be expensive in three ways. First, you'll spend hundreds or thousands of dollars to replace the hardware. Second, you'll suffer the time and aggravation of restoring your data, all the while hoping you have everything backed up properly. But most expensive? Surviving the backlash and legal consequences of losing customer data, financial records and private company information.
By James E. Gaskin | 14 May, 2009 04:34
Apple has improved its security in recent years, but is it enough?
By Bob Violino | 10 March, 2014 11:04
The government's insistence, in its dispute with Lavabit, that cloud service providers hand over their encryption keys when asked, has refocused attention on the issue of key ownership and management in the cloud.
By Jaikumar Vijayan | 15 November, 2013 11:41
An encryption initiative runs into the law of unintended consequences, since the legal department can't search encrypted emails for e-discovery purposes.
By Mathias Thurman | 14 January, 2013 11:04
Whitepapers about encryption
As organizations begin to expand their encryption usage, several realities become readily apparent: Encryption, The increasing adoption of cloud services, and leveraging hardware security modules (HSM) as well as standards will become foundational requirements for central, enterprise-wide key management. How are organisations contending with these realities as they seek to meet the need for more widespread encryption? This executive summary draws on an extensive survey to provide an update.
Developed by the CIO executive Council in conjunction with Rob Livingstone Advisory, Pathways Advanced is a 12-month CIO delivered, small group, mentor based professional leadership development program. Pathways Advanced brings together best practice, thought leadership and business insights for today’s most promising ICT professionals
- FTDigital Marketing CoordinatorNSW
- CCWeb / Mobile Developer - Magento - HTML5, CSS - Excellent CMS SkillsNSW
- FTDigital Performance Manager - MediaNSW
- FTAccount Manager - DataNSW
- FTClient Service Director - Search: SEO & PPCNSW
- FTSenior SEO ManagerNSW
- FTStudio Design ManagerVIC
- FTChief Information Officer - CSIROACT
CUA, Australia’s largest customer-owned financial institution, provides banking products and services to over 400,000 customers across the country. An initiative to develop new ‘branch of the future’ retail locations made securing mobile data and applications a number one priority. Read this case study to learn how secure mobility helped them to increase collaboration, manageability and innovation.
- FCC's Wheeler said to mull hybrid approach to net neutrality
- Some Aussie businesses using DevOps to improve customer engagement and reduce IT spend: report
- The Google shakeup continues: Andy Rubin is out
- Google project aims to preserve privacy when collecting software stats
- Major banks ready their own mobile payment apps
- Android creator Andy Rubin leaving Google
- Data retention is necessary red tape: Turnbull
- Zuckerberg to connect with regular folk in first 'community Q&A'
- In Pictures: 12 shocking social media horror stories
- In Pictures: 10 cool new features found in iOS 8.1
- RCA gives unexpected boost to tablet market in Q3
- Apple surrenders top tablet satisfaction spot to Amazon
- Petition targets Apple over ‘spyware' in OS X Yosemite
- IBM drills into the energy industry for cognitive computing advances
- Vulnerabilities found in more command-line tools, wget and tnftp get patches