Encryption

ProBeat: SHA-1 encryption is shattered, so stop using it

OPINION:<p>Software’s biggest advantage is that innovations can be rapidly adopted. But that’s also its biggest downfall: It’s incredibly difficult for everyone to move on after that software is no longer deemed safe. SHA-1 is the latest example in a long list of technologies that needs to be …

Security

How to encrypt and decrypt data with Hibernate

Introduction<p>Today, one of my Twitter followers sent me the following StackOverflow answer, and I realized that it definitely deserves a post of its …

Databases

Famed Hacker Kevin Mitnick Shows You How to Go Invisible Online

If you’re like me, one of the first things you do in the morning is check your email. And, if you’re like me, you also wonder who else has read your …

Security

Secure messaging: Signal's the best, and then there's the rest

The best<p>When it comes to messaging securely, Signal is the best available. It's end-to-end encryption protocol is highly-regarded in the security …

Security

Which Messaging App Should You Use?

WHY ARE THERE SO MANY?!<p>There are so many ways to send a message these days. Google Voice recently added texts, group messaging, and transcribed voicemail after not updating their app for *five years,* bringing the number of Google’s messaging apps to four (including Hangouts, Allo, and Duo). …

Security

The basics of crypto, in 4.5 pages, using only small words lawmakers can understand

Ed Felten (previously) -- copyfighter, Princeton computer scientist, former deputy CTO of the White House -- has published a four-and-a-half-page …

Security

Full Disk Encryption with VeraCrypt

<b>A straightforward guide to getting you working with VeraCrypt. Protect sensitive data on your hard-drive, USB stick, and external drives.</b><p>This article …

Linux

Deep State Uses Encryption to Subvert Trump Administration

The Trump administration has faced a series of embarrassing leaks from rogue officials encrypting their communications, leading allies in Congress to …

Security

Meet the innovators fighting for your right to privacy online

The second phase of the Re-Inventors series highlights the exciting individuals and groups bringing about the next wave of digital security<p>From intelligence agency dragnets, to data broker profiling; from the Sony email hacks to hundreds of thousands of credit card details being sold on the Dark …

Bitcoin

Your Guide to the Encryption Debate

Encryption could soon become part of national debates over consumer issues ranging from data breaches to the safety of connected cars.<p>Not long ago, …

Security

Could the Signal Private Messenger App Be Right for Your Team?

The increasingly popular encrypted instant messaging and voice calling application Signal has added video calling to its list of features. This …

Security

Google just cracked one of the building blocks of web encryption (but don’t worry)

It’s all over for SHA-1<p>Today, Google made major waves in the cryptography world, announcing a public collision in the SHA-1 algorithm. It’s a deathblow to what was once one of the most popular algorithms in cryptography, and a crisis for anyone still using the function. The good news is, almost no …

Google

Cloud-based databases need new approaches to ensure data security

Interest and adoption of cloud-based databases is ramping up as more companies see the value of moving from traditional on-premise IT infrastructures …

Cloud Computing

Web Publishers Increasingly Adopt Encryption

• Dslreports, Wednesday, February 22, 2017 4:42 PM<p>More than 50% of Web pages are now encrypted, according to data provided by the Chrome and Firefox …

Advertising Industry

Stethoscope spurs employees to implement better security practices

Every now and then, Netflix open sources some of the security tools created by its coders. The latest example of this is Stethoscope, a web …

Security

New macOS ransomware masquerades as software cracking tools

New crypto ransomware dubbed Filecoder is stalking macOS users, ESET researchers warn.<p>Masquerading as an application for cracking/patching legal …

Malware

What it Means to Have an ‘Adult’ Conversation on Encryption

<i>In 2017, we need to move past the debate over backdoors.</i><p><b>By Kevin Bankston</b><p>Since last summer, FBI Director James Comey has been signaling his intent to …

Security

Avast Releases a Decryptor for Offline Versions of the CryptoMix Ransomware

Today, Avast released a decryptor for CryptoMix victim's that were encrypted while in offline mode. Offline mode is when the ransomware runs and …

Malware

It's about time: Half of all websites are now encrypted

Slowly but surely, the web is becoming more secure.<p>About half of all websites are now encrypted using HTTPS, in a development the Electronic Freedom Foundation (EFF) has labeled a significant milestone.<p>Both Google and Mozilla now report that at least 50 percent of web traffic from their respective …

Security

crackle - Crack Bluetooth Smart Encryption (BLE)

0<p>crackle is a tool to crack Bluetooth Smart Encryption (BLE), it exploits a flaw in the pairing mechanism that leaves all communications vulnerable …

Security

Is buying a second-hand phone worth the risk?

While millions of Australians choose to invest in a new smartphone every year, there's also a booming second-hand market. But is it too risky handing …

Australian News

Signal app gets video calling overhaul and a warning for iOS users

Apple iOS users upgrading to the latest beta of the famous Signal secure messaging app should consider disabling CallKit integration if they want to …

iOS

RSAC17: Geopolitical changes driving encryption usage, survey shows

Recent geopolitical changes are driving concern about data privacy in the security industry, resulting in the increasing use of encryption to protect …

Security

New York Prosecutor to Trump: Have Our Backs Against Cop-proof Encryption

New York District Attorney Cyrus Vance has a message for the Trump administration as it puts its cybersecurity priorities in order: Listen to state …

Security

White House staff members are using a 'secure' app that's really not so secure

A number of senior White House officials, including press secretary Sean Spicer, have at one point downloaded the Confide messaging app that touts …

Security

How To Safely Send Your Nudes

A guide to sexting best practices for you and your favorite taker-of-nudes.<p>If you’ve ever sent or received a sext, you’re not alone. In a 2013 study, about 27% of all smartphone users said they receive sexts on a regular basis, and 12% admitted to sending nudes (though the people polled may have …

How-To's

How paranoid is too paranoid when it comes to privacy and security?

End-to-end encryption is the new security mantra, but how far will you go to foil the thought police?<p>It's difficult to maintain a healthy level of …

Security

Privacy Versus Security: How Americans View The Issue Of Encryption [Infographic]

Remember last year when Apple refused to give the FBI the ability to unlock a cell phone that belonged to Syed Rizwan Farook, accused of the December mass shooting in San Bernardino, California?<p>Apple said that by creating new software to break into the iPhone it could create a permanent security …

Security

Operational Signal

Using Signal pseudonymously<p>A lot of people are asking me about secure messaging and how to properly use such tools. Every secure messaging …

Security

Some in-house legal departments use encrypted emails to communicate with their law firms

• Home<br>• Daily News<br>• Some in-house legal departments use encrypted…<p>Legal Technology<p>Reports of law firm data breaches have led some in-house lawyers to use …

Security