Encryption

Protecting Privacy and Confidentiality in Data and Communications

Talking about security of communication and privacy is never enough, especially when political instabilities are driving leaders towards decisions …

Security

Breach Involving Encrypted Devices Raises Questions

Med Health Center in Kentucky Reports Insider Incident Marianne Kolbasuk McGee (HealthInfoSec) • March 23, 2017<p>Under the HIPAA Breach Notification …

Data Breach

Paper Spells Out Tech, Legal Options for Encryption Workarounds

FBI Director James Comey’s dogged attachment to the argument that strong encryption hinders criminal investigations by law enforcement is heading …

Surveillance

Operation innovation: Privatized messaging for student security

For IT managers at any organization, privatized messaging is an area of information security worth considering. Chances are, you heard about …

Cryptography

New draft article, ‘Encryption Workarounds’

I recently posted to SSRN a new draft article, “Encryption Workarounds,” that I co-authored with cryptographer Bruce Schneier. Here’s the abstract:<p>The widespread use of encryption has triggered a new step in many criminal investigations: the encryption workaround. We define an encryption workaround …

Security

Prosecutors hack phones seized in inauguration protests

Court papers say data is being extracted from 100 locked phones confiscated during arrests at anti-Trump protests.<p>Prosecutors are trying to pull data from 100 locked phones seized during arrests made in Washington on Inauguration Day, according to court papers filed Wednesday.<p>The officials said …

Security

Data Encryption in SQL Server

SQL Server provides functions to encrypt and decrypt data using a certificate, asymmetric key, or symmetric key. It manages all of these in an …

Databases

Malware Explained: Packer, Crypter Protector

SPONSORED BY<p>These three techniques can protect malware from analysis. Here's how they work.<p>In this article we will try to explain the terms packer, …

Information Security

Bypassing encryption: “Lawful hacking” is the next frontier of law enforcement technology

Intelligence agencies are going to find new ways to get access to information stored online<p>This article was originally published on The Conversation.<p>The discussion about how law enforcement or government intelligence agencies might rapidly decode information someone else wants to keep secret is – …

Surveillance

Wikileaks Only Told You Half The Story -- Why Encryption Matters More Than Ever

Touted in a press release as the largest release of CIA documentation ever, Wikileaks’ release of their “Vault 7” trove of CIA programs and documentation raises more than a few important questions for the security community. Most publicized among the discoveries is that the CIA has the ability to …

Security

How to Pick a Secure Messaging App

Secure messaging apps are in the news these days, following a WikiLeaks dump of alleged CIA documents that showed how hackers might be able to …

Security

GitHub Uses Broken Cryptography, But It Has a Plan - Motherboard

In February, Google shocked the cryptography community by effectively breaking the stalwart SHA-1 hashing algorithm, making hypothetical concerns about the security of SHA-1 concrete for the first time.<p>While most folks have moved on from SHA-1 already, there's one place on the web that has the …

Security

New AWS Encryption SDK for Python Simplifies Multiple Master Key Encryption | AWS Security Blog

The AWS Cryptography team is happy to announce a Python implementation of the AWS Encryption SDK. This new SDK helps manage data keys for you, and it …

Databases

Tor upgrades to make anonymous publishing safer

In the coming months, the Seattle-based nonprofit The Tor Project will be making some changes to improve how the Tor network protects users’ privacy …

Cryptography

fullstory

20 Mar 2017, 04:47 HRS IST<p>Welcome Guest! You Are Here: Home Business<p>Also in This Section<p>Air passenger traffic rises 16 pc in Feb<br>• Air Costa's woes …

Security

Be Careful: This Single Photo Is Hacking Everyone's WhatsApp, Telegram Accounts

One of the most worrying leaks arising from the recent WikiLeaks publication is the possibility that government organizations can compromise …

Security

How to know if Someone Deleted you on WhatsApp

WhatsApp, an instant messaging app, for which I have shared some tweaks like how to see if someone comes online without opening WhatsApp, download …

How-To's

Building Safe A.I.

<b>TLDR:</b> In this blogpost, we're going to train a neural network that is fully encrypted during training (trained on unencrypted data). The result will …

Security

How to Securely Dispose of an SSD

Solid State Drives (SSD) work a little differently than hard drive and no amount of drilling holes, degaussing, or zeroing out will actually properly …

Security

Laptop with info on Trump Tower, Clinton stolen from Secret Service agent

Police are scrambling to retrieve a laptop that was stolen from a Secret Service agent in Brooklyn, New York, Thursday morning.<p>The computer contained …

Trump Tower

Google Cloud adds new customer-supplied encryption key partners

After encrypting data at the storage level for many years, Google is working on giving customers more choices for securing their information.<p>After …

Cloud Computing

JSON Libraries Patched Against Invalid Curve Crypto Attack

A number of JSON libraries using the JSON Web Encryption specification (JWE) to create, sign and encrypt access tokens have been patched against an …

Information Security

Building Secure Systems Checklist

Building secure systems is not an easy task. It is a complex problem, that requires software developers to think as hackers and look at the system as …

Security

How to encrypt your Mac backups

How do you make sure the backups you take are as secure as your Mac itself? By encrypting the drives!<p>Encrypting backups is a controversial subject. …

Security

The road to a more private and secure calling protocol

<i>Wire’s AVS team lead Julian Spittka discusses the challenges that led to a</i> <i>major upgrade</i> <i>to the calling protocol.</i><p>When our old calling protocol was …

Security

Police hack PGP server with 3.6 million messages from organized crime BlackBerrys

Custom PGP BlackBerry smartphones allegedly used by criminal gangs for secure messaging have suffered a setback.<p>Dutch police say they've managed to …

Cryptography

What the CIA WikiLeaks dump tells us: Encryption works

NEW YORK (AP) — If the tech industry is drawing one lesson from the latest WikiLeaks disclosures, it's that data-scrambling encryption works, and the industry should use more of it.<p>Documents purportedly outlining a massive CIA surveillance program suggest that CIA agents must go to great lengths to …

Security

Signal's encrypted video calling is now available to all

Signal, the encrypted chat app from Open Whisper Systems, now lets anyone chat privately on video. The feature, which first launched on Android last month, has come out of beta and is now available on both Android and iOS. The company spent the relatively short beta period "collecting feedback and …

Security

SXSW: SXSW Panel: You Are Not Anonymous: The Myth of Online Privacy

The moving hand clicks, and its activity is tracked and sold everywhere

Security

Zix wins 5-vendor email encryption shootout

Email encryption products have made major strides since we last looked at them nearly two years ago. They have gotten easier to use and deploy, …

Security