Encryption

Encryption | News, how-tos, features, reviews, and videos

login password - user permissions - administrative control
race compet starting sucess leader prepar challenge

digital network privacy - eavesdropping

Are mixnets the answer to anonymous communications?

Combined with strong encryption such as the Signal protocol, modern mixnets could achieve the Holy Grail: metadata-resistant secure communications.

encryption decryption key code

Five Eyes threatens to force encryption backdoors, says 'privacy is not absolute'

The Five Eyes government intelligence alliance issued an encryption ultimatum to tech companies and device makers.

Globe with orbiting speech bubbles containing world flags, sitting on the edge of a laptop.

Traveling to China for work? Punch through the Great Firewall and securely connect with your home office

Security is not just about confidentiality and integrity. It's also about availability. The new partnership between Wickr and Psiphon is worth a look for global enterprises with traveling employees.

concentric rings of digital security with a lock at the center

Preparing for the day quantum computing cracks public-key cryptography: What to do now

Quantum computers could crack public-key encryption in as little as five years. Here's how to prepare for the post-quantum world.

03 cryptography

How to improve your crypto-agility

As the sheer number of connected devices continues to rise, securing these devices, and becoming “crypto agile” is a key component of an organization’s effort to become more agile. Read on to discover how to improve your...

quantum

How quantum computers will destroy and (maybe) save cryptography

Quantum computers advance mean we might have only a few years before they can break all public key encryption. The day when every secret is known is near.

binary code

The quantum computing cyber storm is coming

What cyber leaders need to know now to protect their critical data in the quantum era.

bitcoin cryptocurrency

Quantum random number generator set to transform internet security

The world’s first practical quantum random number generator (QRNG) will reportedly overcome weaknesses of current encryption, revolutionizing internet security.

4 encryption keys

Hardware, software options emerge for runtime encryption

Hackers are getting better at exploiting encryption gaps that expose plain-text data. New hardware and software runtime encryption solutions aim to close those gaps.

WhatsApp secure messaging on a mobile phone

Ripped from the headlines – are your messages secure in these encrypted apps?

In the investigations of Paul Manafort and Michael Cohen, the FBI has retrieved messages from Signal, Telegram and WhatsApp. Seth Hallem explains the weaknesses in these apps and what a good data protection scheme looks like.

fbi badge gun

FBI 'Going Dark' whopper: Locked out of only 1,200 phones, not 7,775

The FBI blames programming errors for grossly inflating the number of encrypted, unhackable phones it said it needed backdoors into.

broken lock amid binary code and circuits

EFAIL: Critical PGP and S/MIME bugs could reveal plaintext of encrypted emails

There's currently no fix for the critical flaws in PGP and S/MIME that could reveal plaintext of encrypted email. Users are advised to disable PGP plug-ins and not to use decryption in email clients.

email bullseye with three red arrows

Researchers warn PGP and S/MIME users of serious vulnerabilities

A professor at Münster University issued a warning on Sunday about serious vulnerabilities in PGP and S/MIME – two widely-used methods for encrypting email – which, if exploited, could reveal plain text communications. The issue also...

digital money - binary code

How to detect and prevent crypto mining malware

Hackers are placing crypto mining software on devices, networks, and websites at an alarming rate. These tools can help spot it before it does great harm.

journalist interview microphone writer

8 security tools and tips for journalists

Journalists have a giant red target on their backs. How can we defend ourselves?

FBI Director Christopher Wray speaks at Boston College

FBI chief calls for public-private detente on encryption

Christopher Wray sees bureau's investigative work hindered by unbreakable encryption, but hopes to find a middle ground.

binary code

Sometimes encryption can actually make you less secure

In an age where advanced analytics to detect a sophisticated attack is often the only chance of heading off substantial harm, encrypting SMB is akin to taking one step forward and 50 steps back.

blind spot side view mirror car vehicle

You can’t protect what you can’t see

Visibility is a fundamental cybersecurity strategy to protect network assets and information.

Load More