Encryption

Encryption news, analysis, research, how-to, opinion, and video.

FREAK is another serious security flaw in the Web's encryption

U.S. export restrictions on encryption technology from the 1990s have come back to haunt the modern Web


Is data on your new Lollipop Android device encrypted? Maybe not

Google has relaxed a requirement for manufacturers to turn on encryption by default in Lollipop

Superfish

Mozilla scrubs Superfish certificate from Firefox

Firefox update removes from the browser's repository the self-signed digital certificate implanted by Superfish

Flaw in popular Web analytics plug-in exposes WordPress sites to hacking

Attackers can easily crack cryptographic keys used by the WP-Slimstat plug-in and use them to read information from a site's database

emerging monarch 93153534

Emerging enterprise techs to watch

The latest technologies include quantum computing, gamification, reactive programming, augmented reality, and others

Superfish security flaw also exists in other apps, non-Lenovo systems

A third-party, man-in-the-middle proxy used by Superfish is also used in other apps

ssl secure browser security lock

Lenovo shows us why we need to reinvent Web security

What was Lenovo thinking? We can only hope the company's disastrous decision to install adware on laptops that opens users to attack will inspire the industry to revamp SSL

Long-awaited Blackphone tablet may emerge at MWC

Pre-release version of the secure tablet will be demoed and could share some features with the Blackphone smartphone

Internet of Things

Gartner: Makers of things for Internet of things undervalue security

Vendors making devices for the Internet of Things are putting user friendliness and time to market ahead of security, Gartner says

old keys 000013823610

Box: You can bring your own keys to encrypt in our cloud

Box's Enterprise Key Management service lets customers encrypt Box-stored files with their own keys -- a bid to bring in a new class of regulated and cloud-hesitant customers

Ransomware authors streamline attacks, infections rise

Security researchers spotted improved versions of ransomware programs for both Windows and Android

box logo

Box adds enterprise key management to overcome last hurdle to the cloud

Box Enterprise Key Management security model lets users securely stash encryption keys in the cloud

encryption locks security

All you need to know about the move to SHA-2 encryption

Over the next two years, the industry will move from SHA-1 encryption to the vastly more secure SHA-2. Here's how to prepare

New Chrome extension spots unencrypted tracking

TrackerSSL is aimed at alerting websites of insecure tracking via Twitter

OpenSSL patches eight new vulnerabilities

The flaws are of moderate and low severity, but server admins should still update

cyber security lock glow data

4 positive predictions for security in 2015

Sick of the constant drumbeat of data breaches and destructive exploits? There's no magic bullet, but these four measures may help in the coming year

security and privacy icon

The four Mac security options everyone should know

By default, the Mac is pretty secure. But with the help of a couple of built-in options, you can make it even more so

Google's work on full encryption chugs along, with Yahoo's help

Code has been migrated to GitHub to foster involvement from the wider tech community

google privacy

A shadowy consortium opposes your Internet privacy

A cabal of communications companies wants to kill a new Internet standard that will make your Web experience faster and safer

Load More