Encryption

Encryption news, trends, analysis and practical advice

nordvpn
data protection lock chain public domain

Digital Key encryption

Ransomware disrupts Washington DC's CCTV system

Around 70 percent of police cameras in Washington D.C. were reportedly unable to record footage for several days before President Trump's inauguration due to a ransomware attack.

code programming software bugs cybersecurity

GPG Suite updated for secure email on OSX Sierra

GPG Suite, an application that brings encrypted email to Mac OS, is now available in public beta for Sierra.

img 20170120 171638 01

Lavabit developer has a new encrypted, end-to-end email protocol

The developer behind Lavabit, an email service that noted leaker Edward Snowden used, is releasing source code for an open-source, end-to-end encrypted email standard that promises surveillance-proof messaging.

ransomware hardware security embedded circuit board integrated controller

Researchers propose a way to use your heartbeat as a password

Researchers at Binghamton State University have proposed a model that uses patients' heartbeats as an encryption key for electronic records.

Trump inauguration

Trump’s phone replaced with more secure device

President-elect Donald Trump has turned over the Android phone he used for tweeting and will use a more secure phone with encryption capabilities that was approved by the Secret Service, according to news reports.

20160225 stock mwc ericsson booth security locks

Encrypted email service ProtonMail is now accessible over Tor

The creators of encrypted email service ProtonMail have set up a server that's only accessible over the Tor anonymity network as a way to fight possible censorship attempts in some countries.

godaddy office

GoDaddy revokes nearly 9,000 SSL certificates issued without proper validation

GoDaddy, one of the world's largest domain registrars and certificate authorities, revoked almost 9,000 SSL certificates this week after it learned that its domain validation system has had a serious bug for the past five months.

Digital Key encryption

Professionally designed ransomware Spora might be the next big thing

Security researchers have found a new very well designed ransomware program dubbed Spora that can perform strong offline file encryption and brings several innovations to the ransom payments model.

video

What a Locky Ransomware attack looks like

CSO Online's Steve Ragan infects a laptop with Locky Ransomware

ransomware hardware security embedded circuit board integrated controller

KillDisk evolves into ransomware

A malicious program called KillDisk, which has been used in the past to wipe data from computers during cyberespionage attacks, is now encrypting files and asking for an unusually large ransom.

Digital Key encryption

Kaspersky antivirus exposed users to traffic-interception attacks

Security vendor Kaspersky Lab updated its antivirus products to fix an issue that could have exposed users to so-called man-in-the-middle attacks.

data security encryption

Apple gives iOS app developers more time to encrypt communications

Apple has backtracked on a plan to force iOS developers to encrypt their app communications by the end of the year.

Digital Key encryption

Encrypted messaging app Signal uses Google to bypass censorship

Developers of the popular Signal secure messaging app have started to use Google's domain as a front to hide traffic to their service and to sidestep blocking attempts.

US Capitol

Congressional report sides with Apple on encryption debate

The U.S. is better off supporting strong encryption than trying to weaken it, according to a congressional report that stands at odds with the FBI’s push to install backdoors into tech products.

Badlock vulnerability logo

Google researchers help test cryptographic flaws

Security experts from Google have developed a test suite that allows developers to find weaknesses in their cryptographic libraries and implementations.

20160225 stock mwc ericsson booth security locks

Ransomware became one of the top threats to enterprises this year

Ransomware creators are increasingly targeting companies and other organizations, sometimes using techniques borrowed from cyberespionage attacks, because they're likely to pay more money for their data.

security code attack hack

Google open-sources test suite for devs to find crypto bugs

Developers can use Project Wycheproof to test cryptographic algorithms against a library of known attacks to uncover potential weaknesses

os1012 siridocsearch pr print

Apple's macOS file encryption can be bypassed without latest fixes

Without the macOS update released this week, Apple's disk encryption can be easily bypassed by connecting a specially crafted device to a locked Macbook.

Load More