Encryption

Encryption news, analysis, research, how-to, opinion, and video.

Vinton Cerf Heidelberg Laureate Forum
managed security service providers

authentication

New Google API cryptographically secures Chromebooks

The Verified Access API uses the Trusted Platform Module to cryptographically identify and assess the security posture of Chrome OS devices

quantum computing KryptAll

Why quantum computing has the cybersecurity world white-knuckled

'There is a pending lethal attack, and the clock is ticking,' a new report warns

light switch power on off

How to turn on HTTPS company-wide in one swoop

The GSA's effort to get all federal websites and services to use HTTPS reveals some points to keep in mind for your own switchover

cyber attack stock image

New collision attacks against triple-DES, Blowfish break HTTPS sessions

Legacy ciphers such as triple-DES and Blowfish are vulnerable to Sweet32 attacks, which let attackers decrypt HTTPS sessions even without the encryption key

clicks pageviews traffic denial of service ddos attack

Poorly configured DNSSEC servers at root of DDoS attacks

Admins need to ensure that their DNSSEC domains are properly set up -- which can be easier said than done

party favors

6 security advances worth celebrating

In a world besieged by criminal hackers, we'll take all the good security news we can get. Here are six advances that can improve your defenses

New features in Windows 10 laptop

Respect: Windows 10 security impresses hackers

Windows is a popular attack target for criminals and researchers alike, but Microsoft has done a good job of making it harder to target security flaws in the OS

keys ring of old antique keys stock

AWS to enterprises: Bring your own encryption

AWS Key Management Service offers a plus for enterprises that want the benefits of local key management as a service without ceding control

Closeup of burglar criminal trying to break in chain locked door

Secure Boot proves insecurity of backdoors

Microsoft's Secure Boot prevents unauthorized software from running on Windows systems, but a leaked superpolicy bypasses those restrictions

penguin linux open source crystal ball predict future

SHA-2 shortcut: Easy certificate management for Linux

Due to the rollover from SHA-1 to SHA-2, a ton of digital certificate work is needed. With CertAccord, it's as easy to do on Linux as on Windows

blue max medal merit

Profiles in cryptographic courage

Security problems sometimes seem depressingly intractable. The cure? Read about the fascinating people responsible for seminal breakthroughs

data security low res

Google steps up home page security with HSTS

With HTTP Strict Transport Security activated, the site prevents users from trying to log in over a nonencrypted connection

security

Reworked OpenSSL on track for government validation

Encryption vendor SafeLogic commits to sponsoring OpenSSL 1.1 through the arduous, government-required FIPS-140-2 validation process

messaging bots_2

Wire open-sources messaging client, woos developers

Secure messaging apps are all the rage, and developers can now write their own open source Wire client

Digital Key, security, encryption

New Locky ransomware version can operate in offline mode

The creators of the widespread Locky ransomware have added a fallback mechanism in the latest version of their program for situations where the malware can't reach their command-and-control servers.

150914 salesforce dreamforce 2

Salesforce expands encryption options with 'bring your own key'

Adding BYOK encryption to its Salesforce Shield cloud services could help to alleviate data-sovereignty concerns, one analyst says

encryption email

Google Chrome tests future of encryption with post-quantum crypto

Google is testing a post-quantum cryptographic algorithm in Chrome Canary to improve the future of encrypted communications

air travel

11 essential data security tips for travelers

Your data and privacy are never more at risk than when you travel; here's how to protect them

Load More