Encryption

Encryption news, analysis, research, how-to, opinion, and video.

fbi trump iphone
https certificate secure

hourglass time deadline public domain

Time's almost out for websites to abandon SHA-1

One-third of all websites still rely on the insecure SHA-1 encryption algorithm, as the deadline to switch draws closer

Digital Key, security, encryption

Without tech industry guidance, U.S. may resort to weakening encryption

Security experts and privacy advocates say weakening encryption is counterproductive to fighting terrorism

Donald Trump

President Trump: An uncertain future for tech industry, digital rights

The new president's tech policy agenda is thin, and what little there is makes IT nervous

10 AWS configuration mistakes and how to avoid them

10 AWS security blunders and how to avoid them

Amazon Web Services is easy to work with -- but can easily compromise your environment with a single mistake

Digital Key, security, encryption

Google to untrust WoSign and StartCom certificates

Google Chrome will stop trusting digital certificates issued after Oct. 21 by the WoSign and StartCom certificate authorities

email thinkstock

How Clinton could have avoided the Wikileaks fiasco

Hillary Clinton's email server and her advisers' email accounts are no more or less vulnerable than most, but securing them would have been easy

Common crypto mistakes criminals makes

Stupid encryption mistakes criminals make

Blown cover: Malware authors show how easy it is to get encryption wrong and, in the process, help security pros crack their code

malware keyboard security bug virus

VeraCrypt fixes bugs uncovered in security audit

Security audit for full-disk encryption tool VeraCrypt found vulnerabilities, but they have already been addressed in VeraCrypt 1.19

best tools email encryption 1

GPG Sync simplifies encryption key management

Open source project GPG Sync makes it easier for organizations already using GPG to encrypt email messages to manage different user keys

vulnerable

12 hardware and software vulnerabilities you should address now

Hardware and software that live past their end-of-life dates pose serious risks to organizations. Find out which assets you should update, upgrade, or replace ASAP

Digital Key, security, encryption

Encrypted communications could have an undetectable backdoor

Security researchers warn about the use of standardized or hard-coded primes in existing cryptosystems

apple campus headquarters

After Mozilla inquiry, Apple untrusts Chinese certificate authority

After an upcoming update MacOS and iOS will not trust new certificates issued by WoSign

Firefox, Mozilla

Firefox blocks websites with vulnerable encryption keys

Users will receive an error when trying to access web servers that use weak Diffie-Hellman key exchange with weak keys

keys ring of old antique keys stock

The best online backup service for securely encrypting your data

Find out which ones give you more (or less) control over your data

Vinton Cerf Heidelberg Laureate Forum

Vint Cerf's dream do-over: 2 ways he'd make the internet different

'I doubt I could have gotten away with either one,' says the father of the internet

managed security service providers

Lockdown! Harden Windows 10 for maximum security

To make the most of Windows 10's security improvements, you must target the right edition and hardware for your needs

authentication

New Google API cryptographically secures Chromebooks

The Verified Access API uses the Trusted Platform Module to cryptographically identify and assess the security posture of Chrome OS devices

quantum computing KryptAll

Why quantum computing has the cybersecurity world white-knuckled

'There is a pending lethal attack, and the clock is ticking,' a new report warns

Load More