Encryption

Vulnerability allows Yubico security keys to be cloned

Vulnerability allows Yubico security keys to be cloned 2024-09-04 at 13:31 By Zeljka Zorz Researchers have unearthed a cryptographic vulnerability in popular Yubico (FIDO) hardware security keys and modules that may allow attackers to clone the devices. But the news is not as catastrophic as it may seem at first glance. “The attacker would need […]

React to this headline:

Loading spinner

Vulnerability allows Yubico security keys to be cloned Read More »

Intel Responds to SGX Hacking Research

Intel Responds to SGX Hacking Research 2024-09-03 at 14:01 By Eduard Kovacs Intel has shared some clarifications on claims made by a researcher regarding the hacking of its SGX security technology. The post Intel Responds to SGX Hacking Research appeared first on SecurityWeek. This article is an excerpt from SecurityWeek RSS Feed View Original Source

React to this headline:

Loading spinner

Intel Responds to SGX Hacking Research Read More »

Cryptomator: Open-source cloud storage encryption

Cryptomator: Open-source cloud storage encryption 2024-08-28 at 07:31 By Mirko Zorz Cryptomator offers open-source, client-side encryption of your files in the cloud. It’s available for Windows, Linux, macOS and iOS. Cryptomator works with Dropbox, Google Drive, OneDrive, MEGA, pCloud, ownCloud, Nextcloud, and any other cloud storage service that synchronizes with a local directory. Key features

React to this headline:

Loading spinner

Cryptomator: Open-source cloud storage encryption Read More »

Behind the scenes of Serious Cryptography

Behind the scenes of Serious Cryptography 2024-08-27 at 07:45 By Mirko Zorz In this Help Net Security interview, Jean-Philippe Aumasson, discusses the writing and research process for Serious Cryptography, his latest book. With a career steeped in research and practical cryptography, Aumasson offers a rare glimpse into the efforts required to distill complex concepts into

React to this headline:

Loading spinner

Behind the scenes of Serious Cryptography Read More »

NIST releases finalized post-quantum encryption standards

NIST releases finalized post-quantum encryption standards 2024-08-14 at 06:01 By Help Net Security NIST has finalized its principal set of encryption algorithms designed to withstand cyberattacks from a quantum computer. The announced algorithms are specified in the first completed standards from NIST’s post-quantum cryptography (PQC) standardization project and are ready for immediate use. “The transition

React to this headline:

Loading spinner

NIST releases finalized post-quantum encryption standards Read More »

Post-Quantum Cryptography Standards Officially Announced by NIST – a History and Explanation

Post-Quantum Cryptography Standards Officially Announced by NIST – a History and Explanation 2024-08-13 at 15:16 By Kevin Townsend SecurityWeek speaks to Michael Osborne, CTO of IBM Quantum Safe, for a better understanding of the need for and principles of quantum safe cryptography. The post Post-Quantum Cryptography Standards Officially Announced by NIST – a History and

React to this headline:

Loading spinner

Post-Quantum Cryptography Standards Officially Announced by NIST – a History and Explanation Read More »

Overlooked essentials: API security best practices

Overlooked essentials: API security best practices 2024-07-17 at 07:31 By Mirko Zorz In this Help Net Security, Ankita Gupta, CEO at Akto, discusses API security best practices, advocating for authentication protocols like OAuth 2.0 and OpenID Connect, strict HTTPS encryption, and the use of JWTs for stateless authentication. Gupta recommends role-based access control (RBAC) and

React to this headline:

Loading spinner

Overlooked essentials: API security best practices Read More »

Encrypted traffic: A double-edged sword for network defenders

Encrypted traffic: A double-edged sword for network defenders 2024-07-15 at 06:31 By Help Net Security Organizations are ramping up their use of encrypted traffic to lock down data. Could they be making it easier to hide threats in the process? On one hand, encryption means enhanced privacy, but it can also make the job of

React to this headline:

Loading spinner

Encrypted traffic: A double-edged sword for network defenders Read More »

Preparing for Q-Day as NIST nears approval of PQC standards

Preparing for Q-Day as NIST nears approval of PQC standards 2024-07-01 at 06:32 By Help Net Security Q-Day—the day when a cryptographically relevant quantum computer can break most forms of modern encryption—is fast approaching, leaving the complex systems our societies rely on vulnerable to a new wave of cyberattacks. While estimates just a few years

React to this headline:

Loading spinner

Preparing for Q-Day as NIST nears approval of PQC standards Read More »

Preparing for a post-quantum future

Preparing for a post-quantum future 2024-06-18 at 06:31 By Help Net Security Post-quantum cryptography (PQC) is a hot topic. A recent paper from Tsinghua University raised doubts about lattice-based cryptography for PQC, though an error was found. This has sparked questions about the strength of soon-to-be-standardized PQC algorithms. In this Help Net Security video, Kevin

React to this headline:

Loading spinner

Preparing for a post-quantum future Read More »

Windows Recall will be opt-in and the data more secure, Microsoft says

Windows Recall will be opt-in and the data more secure, Microsoft says 2024-06-07 at 22:02 By Zeljka Zorz The insistent public complaints and proof-of-concept tools have have borne fruit: Microsoft has realized that the security of its recently previewed Windows Recall feature leaves much to be desired, and has announced important changes. About Windows Recall

React to this headline:

Loading spinner

Windows Recall will be opt-in and the data more secure, Microsoft says Read More »

Encrypted Notepad: Open-source text editor

Encrypted Notepad: Open-source text editor 2024-05-31 at 06:33 By Mirko Zorz Encrypted Notepad, an open-source text editor, ensures your files are saved and loaded encrypted with AES-256. With no ads, no network connection required, and no unnecessary features, it’s a tool that simply works. “Like the Windows Notepad app, it has no features besides text

React to this headline:

Loading spinner

Encrypted Notepad: Open-source text editor Read More »

Zoom Adding Post-Quantum End-to-End Encryption to Products

Zoom Adding Post-Quantum End-to-End Encryption to Products 2024-05-21 at 16:46 By Eduard Kovacs Zoom is announcing post-quantum end-to-end encryption on Meetings, with Phone and Rooms coming soon.  The post Zoom Adding Post-Quantum End-to-End Encryption to Products appeared first on SecurityWeek. This article is an excerpt from SecurityWeek RSS Feed View Original Source React to this

React to this headline:

Loading spinner

Zoom Adding Post-Quantum End-to-End Encryption to Products Read More »

How secure is the “Password Protection” on your files and drives?

How secure is the “Password Protection” on your files and drives? 2024-05-10 at 08:31 By Help Net Security People in certain professions, such as healthcare, law, and corporations, often rely on password protection when sending files via email, believing it provides adequate security against prying eyes. However, simple password protection on a PDF or Excel

React to this headline:

Loading spinner

How secure is the “Password Protection” on your files and drives? Read More »

Niobium Raises $5.5M for Zero Trust Computing Hardware Acceleration

Niobium Raises $5.5M for Zero Trust Computing Hardware Acceleration 2024-05-07 at 19:01 By Eduard Kovacs Niobium has raised $5.5 million in seed funding for a fully homomorphic encryption (FHE) hardware accelerator designed for zero trust computing. The post Niobium Raises $5.5M for Zero Trust Computing Hardware Acceleration appeared first on SecurityWeek. This article is an

React to this headline:

Loading spinner

Niobium Raises $5.5M for Zero Trust Computing Hardware Acceleration Read More »

Q-Day approaching: Can Ethereum survive a quantum emergency?

Q-Day approaching: Can Ethereum survive a quantum emergency? 2024-04-26 at 17:02 By Cointelegraph by Daniel Ramirez-Escudero Quantum computing is the next most significant disruptive technological leap and its rapid evolution and funding will soon make it a reality. This article is an excerpt from Cointelegraph.com News View Original Source React to this headline:

React to this headline:

Loading spinner

Q-Day approaching: Can Ethereum survive a quantum emergency? Read More »

Critical PuTTY Vulnerability Allows Secret Key Recovery

Critical PuTTY Vulnerability Allows Secret Key Recovery 2024-04-16 at 20:01 By Eduard Kovacs PuTTY vulnerability CVE-2024-31497 allows attackers to compromise private keys and use them to forge signatures.  The post Critical PuTTY Vulnerability Allows Secret Key Recovery appeared first on SecurityWeek. This article is an excerpt from SecurityWeek RSS Feed View Original Source React to

React to this headline:

Loading spinner

Critical PuTTY Vulnerability Allows Secret Key Recovery Read More »

How Google’s 90-day TLS certificate validity proposal will affect enterprises

How Google’s 90-day TLS certificate validity proposal will affect enterprises 2024-04-11 at 08:01 By Help Net Security Announced last year, Google’s proposal to reduce the lifespan of TLS (transport layer security) certificates from 13 months to 90 days could be implemented in the near future. It will certainly improve security and shrink the window of

React to this headline:

Loading spinner

How Google’s 90-day TLS certificate validity proposal will affect enterprises Read More »

Surviving the “quantum apocalypse” with fully homomorphic encryption

Surviving the “quantum apocalypse” with fully homomorphic encryption 2024-03-19 at 10:04 By Help Net Security In the past few years, an increasing number of tech companies, organizations, and even governments have been working on one of the next big things in the tech world: successfully building quantum computers. These actors see a lot of potential

React to this headline:

Loading spinner

Surviving the “quantum apocalypse” with fully homomorphic encryption Read More »

How organizations can keep up with shifting data privacy regulations

How organizations can keep up with shifting data privacy regulations 2024-03-12 at 06:31 By Help Net Security With no sign of regulations slowing down, enterprises struggle to keep pace with the rapid changes. According to a recent NTT Data survey of business executives, 3 in 4 organizations can’t keep up with data regulations, holding them

React to this headline:

Loading spinner

How organizations can keep up with shifting data privacy regulations Read More »

Scroll to Top