Encryption

Encryption | News, how-tos, features, reviews, and videos

04 encryption
Computerworld - Scary Tech [Slide-05] - Encryption systems with backdoors

security internet network encryption privacy padlock

What is SSL, TLS? And why it’s time to upgrade to TLS 1.3

The TLS protocol encrypts internet traffic of all types, making secure internet communication (and therefore internet commerce) possible. Here are the basics of how it works and what comes next.

8 encryption

Encryption is the best way to protect payment card transaction data

Criminals are going to steal payment card transaction data, but it won't matter if that data is devalued through encryption.

login password - user permissions - administrative control

From CIA to #CIA

The evolution of our security journey using the three pillars of security.

race compet starting sucess leader prepar challenge

Start preparing today for the future of quantum computing

With so many issues competing for an IT security professional's time, it’s difficult to find time for future planning. That being said, now is the time of professionals to have quantum computing on the radar.

digital network privacy - eavesdropping

Are mixnets the answer to anonymous communications?

Combined with strong encryption such as the Signal protocol, modern mixnets could achieve the Holy Grail: metadata-resistant secure communications.

encryption decryption key code

Five Eyes threatens to force encryption backdoors, says 'privacy is not absolute'

The Five Eyes government intelligence alliance issued an encryption ultimatum to tech companies and device makers.

Globe with orbiting speech bubbles containing world flags, sitting on the edge of a laptop.

Traveling to China for work? Punch through the Great Firewall and securely connect with your home office

Security is not just about confidentiality and integrity. It's also about availability. The new partnership between Wickr and Psiphon is worth a look for global enterprises with traveling employees.

concentric rings of digital security with a lock at the center

Preparing for the day quantum computing cracks public-key cryptography: What to do now

Quantum computers could crack public-key encryption in as little as five years. Here's how to prepare for the post-quantum world.

03 cryptography

How to improve your crypto-agility

As the sheer number of connected devices continues to rise, securing these devices, and becoming “crypto agile” is a key component of an organization’s effort to become more agile. Read on to discover how to improve your...

quantum

How quantum computers will destroy and (maybe) save cryptography

Quantum computers advance mean we might have only a few years before they can break all public key encryption. The day when every secret is known is near.

binary code

The quantum computing cyber storm is coming

What cyber leaders need to know now to protect their critical data in the quantum era.

bitcoin cryptocurrency

Quantum random number generator set to transform internet security

The world’s first practical quantum random number generator (QRNG) will reportedly overcome weaknesses of current encryption, revolutionizing internet security.

4 encryption keys

Hardware, software options emerge for runtime encryption

Hackers are getting better at exploiting encryption gaps that expose plain-text data. New hardware and software runtime encryption solutions aim to close those gaps.

WhatsApp secure messaging on a mobile phone

Ripped from the headlines – are your messages secure in these encrypted apps?

In the investigations of Paul Manafort and Michael Cohen, the FBI has retrieved messages from Signal, Telegram and WhatsApp. Seth Hallem explains the weaknesses in these apps and what a good data protection scheme looks like.

fbi badge gun

FBI 'Going Dark' whopper: Locked out of only 1,200 phones, not 7,775

The FBI blames programming errors for grossly inflating the number of encrypted, unhackable phones it said it needed backdoors into.

broken lock amid binary code and circuits

EFAIL: Critical PGP and S/MIME bugs could reveal plaintext of encrypted emails

There's currently no fix for the critical flaws in PGP and S/MIME that could reveal plaintext of encrypted email. Users are advised to disable PGP plug-ins and not to use decryption in email clients.

email bullseye with three red arrows

Researchers warn PGP and S/MIME users of serious vulnerabilities

A professor at Münster University issued a warning on Sunday about serious vulnerabilities in PGP and S/MIME – two widely-used methods for encrypting email – which, if exploited, could reveal plain text communications. The issue also...

digital money - binary code

How to detect and prevent crypto mining malware

Hackers are placing crypto mining software on devices, networks, and websites at an alarming rate. These tools can help spot it before it does great harm.

Load More