Encryption

Encryption news, analysis, research, how-to, opinion, and video.

4 encryption keys
WhatsApp secure messaging on a mobile phone

fbi badge gun

FBI 'Going Dark' whopper: Locked out of only 1,200 phones, not 7,775

The FBI blames programming errors for grossly inflating the number of encrypted, unhackable phones it said it needed backdoors into.

broken lock amid binary code and circuits

EFAIL: Critical PGP and S/MIME bugs could reveal plaintext of encrypted emails

There's currently no fix for the critical flaws in PGP and S/MIME that could reveal plaintext of encrypted email. Users are advised to disable PGP plug-ins and not to use decryption in email clients.

email bullseye with three red arrows

Researchers warn PGP and S/MIME users of serious vulnerabilities

A professor at Münster University issued a warning on Sunday about serious vulnerabilities in PGP and S/MIME – two widely-used methods for encrypting email – which, if exploited, could reveal plain text communications. The issue also...

digital money - binary code

How to detect and prevent crypto mining malware

Hackers are placing crypto mining software on devices, networks, and websites at an alarming rate. These tools can help spot it before it does great harm.

journalist interview microphone writer

8 security tools and tips for journalists

Journalists have a giant red target on their backs. How can we defend ourselves?

FBI Director Christopher Wray speaks at Boston College

FBI chief calls for public-private detente on encryption

Christopher Wray sees bureau's investigative work hindered by unbreakable encryption, but hopes to find a middle ground.

binary code

Sometimes encryption can actually make you less secure

In an age where advanced analytics to detect a sophisticated attack is often the only chance of heading off substantial harm, encrypting SMB is akin to taking one step forward and 50 steps back.

blind spot side view mirror car vehicle

You can’t protect what you can’t see

Visibility is a fundamental cybersecurity strategy to protect network assets and information.

bitcoin currency blockchain finance bank binary

6 use cases for blockchain in security

Blockchain has the potential to improve encryption and authentication, and that could be good news for IoT security and DDoS protection.

network security primary2

Why it’s harder for threats to hide behavior on a corporate network

If signatures in cybersecurity are like fingerprints in a criminal investigation, behavioral detection is like profiling – it’s harder to hide, but it’s not foolproof either.

blockchain cryptocurrency digital security

New cryptocurrencies offer better anonymity, new security challenges

Anonymous cryptocurrencies like Monero and Zcash help cybercriminals evade detection and make cryptojacking more profitable.

security internet network encryption privacy padlock

Full disk encryption: do we need it?

Companies should consider implementing full disk encryption alongside other encryption methods on mobile devices.

las vegas nighttime

Board cybersecurity field trips

Maybe this time, what happens in Vegas won't stay in Vegas!

fbi badge gun

FBI chief claims encryption is an 'urgent public safety issue’

After 25 years of "going dark" claims, FBI Director Christopher Wray says not being able to crack the encryption on devices is "a major public safety issue."

data security encryption

Cisco ETA solves one of the biggest cybersecurity problems

Cisco Encrypted Traffic Analysis (ETA), now generally available, addresses one of the biggest pain points in the cybersecurity industry — finding malware in encrypted traffic.

security internet network encryption privacy padlock

What is SSL/TLS? (And why it’s time to upgrade to TLS 1.3)

The TLS protocol encrypts internet traffic of all types, making secure internet communication (and therefore internet commerce) possible. Here are the basics of how it works and what comes next.

03 cryptography

Are you crypto-agile?

A recent spate of successful attacks against our most popular and trusted cryptographic algorithms has me hoping that all companies understand the importance of crypto-agility.

2 encryption

Not as secure as you think

How companies mislead the public about security.

Load More