Data and Information Security

Data and Information Security | News, how-tos, features, reviews, and videos

81p5l6fqewl. sl1500

38% off Seagate Backup Plus Ultra Slim 2TB Portable External Hard Drive - Deal Post

The Backup Plus Ultra Slim Portable Drive is one of Seagate's thinnest and most eye-catching portable hard drives

hidden door

How to respond to device and software backdoors inserted or left by vendors

Here are the challenges to finding them, mitigating the easily infected openings, and responding to this hardware, software, and IoT-based dilemma

alert blur

Critical flaw alert! Stop using JSON encryption

Developers shouldn't use JSON Web Tokens or JSON Web Encryption in their applications at all, lest their private keys get stolen

9 ways developers can help rebuild trust on the Internet

Google to Symantec: We don't trust you anymore

Admins need to consider whether they still want to use Symantec after its repeated mistakes with issuing TLS certificates

Digital Key encryption

Some HTTPS inspection tools might weaken security

Many security products that intercept HTTPS traffic don't properly validate certificates, US-CERT has warned

Edward Snowden Spiegel headline

Cebit showcases security after Snowden

One of the biggest changes on the internet in the four years since his revelations about NSA surveillance is the growth in the use of encryption

secusuite for samsung knox 1

BlackBerry readies a more secure version of the Samsung Galaxy S7

SecuSuite for Samsung Knox is a new version of BlackBerry's established security platform tailored for Samsung Electronics' high-end smartphones

01 plan

Do you have an incident response plan in place?

Details matter when developing an incident response (IR) plan. But, even the most successful IR plans can lack critical information, impeding how quickly normal business operations are restored.

caution tape

Warning: Your networking tools are weakening your web security

US-CERT says SSL inspection tools, which let enterprise administrators examine encrypted traffic to find and block malicious activity, actually hinder HTTPS

Digital Key encryption

It's time to turn on HTTPS: the benefits are well worth the effort

HTTPS websites get a speed boost, better search engine rankings, and fewer browser warnings

Google Cloud sharpens its enterprise strategy

Google used to rely mainly on its technical bona fides to sell its cloud, but now it's meeting customers halfway with new enterprise-friendly capabilities and support

diy robot

Bots: Biggest player on the cybercrime block

Bot fraud cost an estimated $31 billion in the US last year, dwarfing the estimated $1 billion lost to ransomware and DDoS attacks

Digital Key encryption

Free decryption tools now available for Dharma ransomware

Researchers created decryption tools for the Dharma ransomware after someone recently leaked the decryption keys for the program online

170227 mwc 160433

This tiny chip could revolutionize smartphone and IoT security

The tiny chip generates truly random numbers -- the basis for cryptography

Digital Key encryption

Chrome extension brings encryption to Gmail

E2Email, Google's latest open source project, wants to bring encrypted email to the masses, but without strong leadership, this project may wind up going nowhere

don't panic fortune cookie

Don't panic about SHA-1—fix it

Crypto experts agree it's time to ditch SHA-1 if you haven't already, but also to know where the real risks are

head on collision

Google kills SHA-1 with successful collision attack

SHA-1 in digital certificates and cryptographic keys hasn't been safe for years. With the world's first successful collision attack, the clock has run out for the hash function

Digital Key encryption

New MacOS ransomware spotted in the wild

A new file-encrypting ransomware program for macOS is being distributed through bittorrent websites and users who fall victim to it won't be able to recover their files, even if they pay.

3 bitcoin

Would killing bitcoin end ransomware?

Bitcoin and ransomware seem to go hand-in-hand, but experts say that doing away with the cybercurrency would only force cybercriminals to find another anonymous avenue to extort money

ransomware data laptop

Tips for negotiating with cyber extortionists

Whether you are opposed to it or not, enterprises need to have a plan for negotiating with people who take their data hostage

Load More