Encryption

03b2ceb73723f8b53cd533e4fba898ee

British Prime Minister Wants to Ban Online Messaging Apps Including WhatsApp

January 13, 2015 Added by:Pierluigi Paganini

Prime Minister Cameron said that the UK would pursue banning encrypted messaging apps if the Intelligence was not given access to the communications.

Comments  (9)

F45df53d99605d46f5ae32b7bed9fe22

Does Your Valuable Data Belong to Hackers?

January 05, 2015 Added by:Thu Pham

Every organization, regardless of size, is comprised of a variety of sensitive data - from HR and payroll handling medical, financial and personally identifiable employee data to your precious intellectual property. And each of these data types can be sold for a price on the black market, making them valuable to attackers financially as well as for blackmail purposes.

Comments  (6)

7ddc1f3000a13e4dfec28074e9e7b658

Email Encryption Grew Tremendously, but Still Needs Work: 2014 in Review

December 30, 2014 Added by:Electronic Frontier Foundation

What if there were one thing we could do today to make it harder for the NSA and other intelligence agencies to eavesdrop on millions of people's email communications, without users having to change their habits at all?

Comments  (1)

7ddc1f3000a13e4dfec28074e9e7b658

Sifting Fact from Fiction with All Writs and Encryption: No Backdoors

December 04, 2014 Added by:Electronic Frontier Foundation

Following recent reports in the Wall Street Journal and Ars Technica, there’s been new interest in the government’s use of a relatively obscure law, the All Writs Act.

Comments  (0)

D36d0936f0c839be7bf2b20d59eaa76d

Phones, Phablets and Clouds - Securing Today’s New Infrastructure

December 03, 2014 Added by:Steve Durbin

Despite the undeniable corporate and consumer interest, the security and privacy implications of cloud and mobile connected devices are concerning many security professionals. Countless organizations are still playing catch up – Bring Your Own Device (BYOD) polices are only starting to be embedded, reviewed and updated. IT departments are overwhelmed with the amount of devices entering the workp...

Comments  (0)

Bd07d58f0d31d48d3764821d109bf165

Operation Onymous Challenges Tor to Strengthen Its Security

November 19, 2014 Added by:Tripwire Inc

Earlier in November, Europol, the FBI and the Department of Homeland Security coordinated a global sting against the “Dark Web” drug trade.

Comments  (0)

7ddc1f3000a13e4dfec28074e9e7b658

ISPs Removing Their Customers' Email Encryption

November 11, 2014 Added by:Electronic Frontier Foundation

By stripping out this flag, these ISPs prevent the email servers from successfully encrypting their conversation, and by default the servers will proceed to send email unencrypted

Comments  (5)

Ffc4103a877b409fd8d6da8f854f617e

Webcast: How Gaps In SSH Security Create an Open Door for Attackers

October 27, 2014 Added by:InfosecIsland News

Please join us on Thursday, Oct. 30th at 1PM ET for a special webcast on how Gaps In SSH Security Create an Open Door for Attackers.

Comments  (0)

B742830daed9314883a0edc63daefc42

EBS Encryption: Enhancing the Amazon Web Services Offering with Key Management

July 23, 2014 Added by:Gilad Parann-Nissany

Full disk encryption is becoming more and more popular in cloud settings, and some of the smaller clouds like Google Compute Engine have supported it for a while. Amazon is a bit late to this game, and should lead the way in enabling customer control of encryption keys.

Comments  (1)

B742830daed9314883a0edc63daefc42

NSA vs. Cloud Encryption: Which is Stronger?

April 12, 2014 Added by:Gilad Parann-Nissany

The NSA is powerful: they watch, they listen, they collect data. In cases of national security, perhaps this is a good method to catch terrorists. In cases of private business data, there is a way to block the NSA from getting to your sensitive information: strong data encryption.

Comments  (0)

B742830daed9314883a0edc63daefc42

Pros and Cons of US-Based Cloud Services

March 31, 2014 Added by:Gilad Parann-Nissany

Any company or individual using cloud services today should encrypt data in addition to their firewall, anti-virus and other security measures. Incidentally, it is also encouraged by regulation in several sensitive sectors, notably businesses in the health industry under HIPAA patient and data privacy laws and the payment card industry under PCI DSS standards.

Comments  (0)

76e662e7786bf88946bd6c010c03ac65

We Have to Find Ways to Reinforce Trust

March 29, 2014 Added by:Jarno Limnéll

We are losing the battle for cyberspace. Not because malicious actors are taking over the digital world, but because we are forgetting what is the element that makes us feel safe and secure in any world: the ability to trust.

Comments  (0)

52a995fead03e1d828980d4b3efd2719

BYOD For Government?

March 23, 2014 Added by:Cam Roberson

BYOD is fast becoming the norm for many enterprises, despite the security risks. Government agencies have been slower to adopt, but will need to start implementing policies that address BYOD.

Comments  (1)

7ddc1f3000a13e4dfec28074e9e7b658

Making the Mobile Web Safer with HTTPS Everywhere

February 04, 2014 Added by:Electronic Frontier Foundation

As of today, you can install HTTPS Everywhere on Firefox for Android(until now, it could only protect desktop browsers).

Comments  (0)

E595c1d49bf4a26f8e14ce59812af80e

Encryption: The Key to Network Security

December 05, 2013 Added by:Patrick Oliver Graf

The newly released Encrypt the Web report by the Electronic Frontier Foundation (EFF) illustrates that even large, well-known enterprises are susceptible to lapses in properly securing network communications.

Comments  (0)

52a995fead03e1d828980d4b3efd2719

What the Snowden Leaks Can Teach Us About Data Security

November 14, 2013 Added by:Cam Roberson

One of the major issues discussed in the wake of the National Security Agency leak involving Edward Snowden was how the government can prevent a similar leak from happening in the future. This article looks at several specific measures that can strengthen data security, making it more difficult for bad actors to break into the system, and tougher for them to make off with sensitive information onc...

Comments  (0)

Page « < 1 - 2 - 3 - 4 - 5 > »