Blogs DoJ claims victory, wins nothing The US government sought a legal endorsement of its war on encryption and all it got was an unlocked iPhone 29 Mar
Pro DoJ cracks San Bernardino shooter’s iPhone The FBI no longer needs Apple's help, it says in court filing 29 Mar
Pro French legislators want to compel companies to decrypt data New bill could force companies to hand over data protected by encryption systems they developed 10 Mar
Pro OpenSSL update fixes DROWN vulnerability Attack decrypts TLS sessions on servers supporting SSL v2, using RSA key exchange 3 Mar
Pro Node.js 5.7 released ahead of impending OpenSSL updates Once again, OpenSSL fixes must be evaluated by keepers of the popular server-side JavaScript platform 1 Mar
Pro FBI wants software equivalent of ‘cancer’ for iPhone Apple CEO asserts backdoor request could be the beginning of a worrying trend 25 Feb
Blogs Of back doors, back channels and moral high ground Is there more than meets the eye to the law enforcement request for an iPhone crack? 19 Feb
Life Cook says Apple will oppose court order rather than hack customers Court in California ordered company to assist the FBI to crack an iPhone 17 Feb
Pro Terrorists will use secure alternatives to avoid encryption backdoors Study says there are 546 encryption products that lie outside US law, says study 12 Feb
Pro Box simplifies encryption control for cloud data New KeySafe service leverages Amazon's cloud to help companies lock files down 5 Feb
Pro Amazon eases web encryption with AWS Cert Manager New service provides free, automatically upgraded SSL/TLS certificates for sites supported by Amazon's load balancing and CDN systems 25 Jan
Pro OpenSSH patches leak that could expose SSH keys Rogue or compromised OpenSSH servers can read private SSH keys from the memory of unpatched clients 18 Jan
Pro Blackphone update closes security hole SilentCircle used a third-party component that potentially exposed the secure Blackphone to attack 8 Jan
Pro Continued MD5 support threatens crypto protocols Authentication and impersonation attacks demonstrated against protocols supporting MD5 8 Jan
Pro New Chinese law takes aim at encryption Legal instrument modelled on Western examples, says government 4 Jan
Pro Companies scramble to fix lack of encryption on mobile apps Mobile apps were transmitting payment card information without encryption, including Aer Lingus 11 Dec
Pro Docker, Twistlock, CoreOS, and the state of container security Cryptographic hardware keys, inspecting for flawed software, and end-to-end trust add up to secure containers 8 Dec
Pro BlackBerry quits Pakistan over government surveillance demands Operations pulled rather than allow government intercept comms 30 Nov
Pro Millions of embedded devices use the same hard-coded SSH/TLS private keys Keys were hard-coded by manufacturers and can be used by attackers to launch man-in-the-middle attacks 27 Nov
Pro Dell certificate issue deepens as researchers dig deeper Fallout from encryption certificate mistake widens, as security experts find more issues of concern 24 Nov
Pro BitLocker encryption defeated by trivial Windows authentication bypass A researcher has found a Windows authentication bypass that puts data on BitLocker-encrypted laptops at risk 16 Nov
Pro Self-encrypting drives little better than software-based encryption Researchers demonstrated attacks against self-encrypting drives used in enterprise environments 13 Nov
Pro File-encrypting ransomware begins targeting Linux web servers After targeting consumer and then business computers, ransomware authors are now going after web servers 10 Nov
Life Encryption ban dropped from draft UK surveillance bill Britons' Web surfing habits will be stored for a year and made available to police 5 Nov
Pro Time to move on from 1024-bit encryption Crypto researchers have warned that current encryption standards can be beaten 21 Oct
Pro US will not seek legislation against encryption Tech industry had lobbied President Barack Obama to take a stand against any dilution of encryption 12 Oct
Pro Google donates on-disk encryption to MariaDB Latest version of MySQL variant has table-level encryption, courtesy of Google, but won't guard against the most common database attacks 17 Sep
Pro Xerox introduces printed-memory labels to fight counterfeiting The labels can contain encrypted data 17 Sep
Pro Encryption project issues first free SSL/TLS certificate Let's Encrypt plans to distribute certificates more widely in the next couple of months 16 Sep
Blogs Quantum computing and cryptography Will all encryption become breakable with the advent of quantum computers? 28 Aug
Pro Tips for protecting your business against cyber-extortion The rising incidence of cyber-extortion is being driven in part by encryption malware 25 Aug
Pro Ransomware not all it’s cracked up to be Readily detectable and in some cases can be forced to cough up frozen data without paying up, says researcher 5 Aug
Pro Google Compute Engine now supports bring-your-own-key encryption Other big cloud providers already offer BYOK, but Google claims its option, available at no additional cost, is more comprehensive 30 Jul
Pro OpenSSH bug exposes servers to brute-force password attacks Keyboard-interactive authentication setting could allow for thousands of password retries, a researcher found 23 Jul
Pro Amazon releases open source cryptographic module S2n module could serve as a leaner replacement for the OpenSSL TLS module 1 Jul
Pro Software devs failing to implement crypto correctly Lack of training and complexity leads to widespread encryption failures 29 Jun
Pro Security pros failing to replace keys and certs post breach Lack of knowledge in protecting encryption infrastructure, survey finds 9 Jun
Pro EC digital commissioner says no to encryption back doors As the US debates security agency demands for compulsory workarounds for encryption on mobile devices, the European Commission has come out against... 22 May
Subscribers 0
Fans 0
Followers 0
Followers