Encryption

Encryption | News, how-tos, features, reviews, and videos

don't panic fortune cookie

Don't panic about SHA-1—fix it

Crypto experts agree it's time to ditch SHA-1 if you haven't already, but also to know where the real risks are

head on collision

Google kills SHA-1 with successful collision attack

SHA-1 in digital certificates and cryptographic keys hasn't been safe for years. With the world's first successful collision attack, the clock has run out for the hash function

Digital Key encryption

New MacOS ransomware spotted in the wild

A new file-encrypting ransomware program for macOS is being distributed through bittorrent websites and users who fall victim to it won't be able to recover their files, even if they pay.

Digital Key encryption

Ransomware disrupts Washington DC's CCTV system

Ransomware attacks target various types of systems and businesses and are unlikely to stop

https certificate secure website

Google moves into the Certificate Authority business

Google doesn't seem to trust the current system, as it has launched its own security certificates

heartbleed illustration

OpenSSL issues new patches as Heartbleed still lurks

The latest OpenSSL update may only address moderate-severity vulnerabilities, but admins shouldn't get lax about staying current with the patches

heartbleed illustration

That Hearbleed problem may be more pervasive than you think

The 200,000 devices with the OpenSSL Heartbleed vulnerability may include commercial software you are running

facebook login screen oct2016

Facebook taps FIDO U2F for stronger login security

Facebook joins Google, Salesforce, GitHub, Dashlane, and Dropbox in supporting FIDO U2F to help prevent attackers from hacking user accounts

161118 pompeo 1

Pompeo sworn in as CIA chief amid opposition from surveillance critics

Critics are concerned he may roll back privacy reforms, like restrictions on collection of bulk telephone metadata, and may try to introduce curbs on the use of encryption

signature signing contract handwriting cursive

Oracle to Java devs: Stop signing JAR files with MD5

Starting in April, if a JAR file is signed with MD5, Oracle will treat it as unsigned

keys

Google ventures into public key encryption

Google's Key Transparency project offers a model of a public lookup service for encryption keys

Digital Key encryption

Google Cloud Platform finally offers key management service

Google prides itself on its encryption efforts, but it lags behind Amazon and Microsoft in providing encryption tools for the cloud

godaddy office

GoDaddy revokes nearly 9,000 SSL certificates issued without proper validation

A bug in the CA's domain validation system for the past five months could have allowed attackers to obtain certificates without authorization

Digital Key encryption

Professionally designed ransomware Spora might be the next big thing

Security researchers have found a new very well designed ransomware program dubbed Spora that can perform strong offline file encryption and brings several innovations to the ransom payments model.

trophies ribbons winners prizes

Encryption in 2016: Small victories add up

The move from SHA-1 to SHA-2, a Congressional victory over backdoors, and the rise of encrypted communications are leading us toward a more secure world

Apple iPhone 5S (1)

Apple gives iOS app developers more time to encrypt communications

The iOS App Transport Security (ATS) will not become a requirement on Jan. 1, as previously announced

US Capitol

Congressional report sides with Apple on encryption debate

The bipartisan panel advises Congress to look into using legal hacking methods to break into tech products

security code attack hack

Google open-sources test suite to find crypto bugs

Developers can use Project Wycheproof to test cryptographic algorithms against a library of known attacks to uncover potential weaknesses

hacker hack

10 biggest hacks of user data in 2016

And how to protect yourself from similar breaches in 2017

data protection lock chain

Vera for Microsoft protects Office 365 files everywhere

Vera's approach to information rights management lets IT apply security rules and permissions to Office 365 files no matter where they're saved

Load More