Encryption news, analysis, research, how-to, opinion, and video.

encryption goo.gl yiaw4a
generic image of a wi-fi router

Man in suit swirling in tornado of paper

Warning: Internet security turbulence ahead

As Internet growth approaches hyperspeed, security will get worse before it gets better

certifications certified certificate

Dell debacle reveals widespread ignorance on security certificates

Dell pre-installing eDellRoot on Windows machines shows that even the world's largest PC maker doesn't understand how certificates and keys function

dell xps 13 15

And then there were two: Another dangerous Dell root certificate discovered

After Dell confirmed that one of its support tools installed a dangerous self-signed root certificate and private key on computers, users discovered a similar certificate deployed by a different Dell tool

victim identity theft computer problem

What you need to know about Dell's root certificate security debacle

The full scope of the incident is still unclear -- and it's not just laptops -- but there's a removal tool available

8 https

Dell security error widens as researchers dig deeper

Duo Security researchers found a second weak digital certificate on a new Dell Inspiron laptop and evidence another problematic one is circulating

crosshair lock hunting

Stop the anti-encryption propaganda now

We cannot let the world think that encryption can be compromised or tossed aside


IBM offers to take on authentication for developers

IBM incorporated Identity Mixer, a cryptographic tool designed to handle authentication for third-party applications, into Bluemix

sdn nsa monitoring spying

Encryption is not the enemy

The fearmongering after last week's attacks in Paris does nothing to improve security and helps the terrorists' cause

hardware security embedded circuit board integrated controller

New Dell partnership throws doubt on traditional antivirus programs

A Dell executive says most AV products aren't effectively stopping attacks

Paris terrorist attacks peace symbol

After Paris: Liberté demands unlimited encryption

Allowing restricted access to encrypted communication would destroy privacy not only for people but also governments and businesses

isis portal on the darknet

After Paris, ISIS moves propaganda machine to Darknet

Less than a day after the horrific attacks in Paris, ISIS has taken the Al-Hayat propaganda machine to the Darknet and published a new video celebrating the Paris attacks

self encrypting hard drives black hat europe 2015

Self-encrypting drives are hardly any better than software-based encryption

Two researchers demonstrated attacks against self-encrypting drives used in enterprise environments at the Black Hat Europe conference in Amsterdam

Digital Key

First Linux ransomware program cracked, for now

There's now a free tool that can decrypt files held for ransom by Linux.Encoder.1

Digital Key

New ransomware program Chimera threatens to leak user files

In addition to encrypting people's private files a new ransomware program dubbed Chimera threatens to publish those files on the Internet

Digital Key

Microsoft follows Mozilla in considering early ban on SHA-1 certificates

Microsoft is considering blocking the hashing algorithm on Windows by June next year

Privacy (4)

Man whose iPhone passcode DOJ wanted Apple to bypass enters guilty plea

Guilty plea raises questions as to whether access to the iPhone data was really critical to the DOJ's investigations

Digital Key

Google threatens action against Symantec-issued certificates following botched investigation

Symantec's investigation into a case of internal testing gone wrong failed to find a large number of certificates issued without authorization

Fujitsu palm vein

Biometric data becomes key to encryption in Fujitsu system

Fujitsu says it has developed software that uses biometric data directly as the basis for encryption and decryption of data, simplifying and strengthening security systems that rely on biometrics such as fingerprints, retina scans and...

Load More