Encryption

Encryption news, analysis, research, how-to, opinion, and video.

signature signing contract handwriting cursive
keys

Digital Key encryption

Google Cloud Platform finally offers key management service

Google prides itself on its encryption efforts, but it lags behind Amazon and Microsoft in providing encryption tools for the cloud

godaddy office

GoDaddy revokes nearly 9,000 SSL certificates issued without proper validation

A bug in the CA's domain validation system for the past five months could have allowed attackers to obtain certificates without authorization

Digital Key encryption

Professionally designed ransomware Spora might be the next big thing

Security researchers have found a new very well designed ransomware program dubbed Spora that can perform strong offline file encryption and brings several innovations to the ransom payments model.

Digital Key encryption

Q&A: RSA crypto pioneer Adleman keeps pushing the limits

Dr. Leonard Adleman tells InfoWorld all about RSA's big breakthrough, why DNA works great for computing, and our coming cyberwar risk

video

What a Locky Ransomware attack looks like

CSO Online's Steve Ragan infects a laptop with Locky Ransomware

nordvpn

Get 72% off NordVPN Virtual Private Network Service For a Limited Time - Deal Alert

NordVPN has discounted their popular VPN software 72%. Use our link and see the discount applied when you click "buy now".

trophies ribbons winners prizes

Encryption in 2016: Small victories add up

The move from SHA-1 to SHA-2, a Congressional victory over backdoors, and the rise of encrypted communications are leading us toward a more secure world

internet security risk public domain

The real reason we can't secure the internet

We can surmount the technical and human obstacles to a dramatically more secure internet, but one factor stands in the way

Apple iPhone 5S (1)

Apple gives iOS app developers more time to encrypt communications

The iOS App Transport Security (ATS) will not become a requirement on Jan. 1, as previously announced

US Capitol

Congressional report sides with Apple on encryption debate

The bipartisan panel advises Congress to look into using legal hacking methods to break into tech products

security code attack hack

Google open-sources test suite to find crypto bugs

Developers can use Project Wycheproof to test cryptographic algorithms against a library of known attacks to uncover potential weaknesses

hacker hack

10 biggest hacks of user data in 2016

And how to protect yourself from similar breaches in 2017

data protection lock chain public domain

Vera for Microsoft protects Office 365 files everywhere

Vera's approach to information rights management lets IT apply security rules and permissions to Office 365 files no matter where they're saved

os1012 siridocsearch pr print

Apple's MacOS file encryption easily bypassed without the latest fixes

Custom-made Thunderbolt devices can be used to extract the encryption password from locked Macs

trump tower

Trump, tech leaders avoided encryption and surveillance talk at summit

Similar summits could take place as often as once per quarter

people search find locate public domain

Facebook tool helps find malicious SSL certificates

Facebook has released an internal tool that makes it easier for enterprise IT teams to search public Certificate Transparency logs for all certificates associated with their domains

dsc05314

Trump, tech executives may try to untangle relationship

The two sides are expected to try to sort out issues at a meeting this week in New York

security group team circuitry

Finally! A minimum standard for certificate authorities

IT admins, take note: The CA Security Council will require you to prove you are taking appropriate steps to secure your private keys from theft or misuse

Load More