Encryption

Encryption Backdoors: The Security Practitioners’ View

Encryption Backdoors: The Security Practitioners’ View 2025-06-19 at 14:08 By Kevin Townsend After decades of failed attempts to access encrypted communications, governments are shifting from persuasion to coercion—security experts say the risks are too high. The post Encryption Backdoors: The Security Practitioners’ View appeared first on SecurityWeek. This article is an excerpt from SecurityWeek View […]

React to this headline:

Loading spinner

Encryption Backdoors: The Security Practitioners’ View Read More »

CURBy: A quantum random number generator you can verify

CURBy: A quantum random number generator you can verify 2025-06-17 at 08:01 By Sinisa Markovic NIST and the University of Colorado Boulder have created a public service that delivers random numbers using quantum mechanics. Called the Colorado University Randomness Beacon (CURBy), the system offers a daily stream of certifiable random numbers generated through a process

React to this headline:

Loading spinner

CURBy: A quantum random number generator you can verify Read More »

MITRE Publishes Post-Quantum Cryptography Migration Roadmap

MITRE Publishes Post-Quantum Cryptography Migration Roadmap 2025-05-30 at 14:19 By Mike Lennon The roadmap provides an overview of four key stages of the migration process, namely preparation, baseline understanding, planning and execution, and monitoring and evaluation. The post MITRE Publishes Post-Quantum Cryptography Migration Roadmap appeared first on SecurityWeek. This article is an excerpt from SecurityWeek

React to this headline:

Loading spinner

MITRE Publishes Post-Quantum Cryptography Migration Roadmap Read More »

Critical OpenPGP.js Vulnerability Allows Spoofing

Critical OpenPGP.js Vulnerability Allows Spoofing 2025-05-21 at 10:16 By Eduard Kovacs An OpenPGP.js vulnerability tracked as CVE-2025-47934 allows message signature verification to be spoofed.  The post Critical OpenPGP.js Vulnerability Allows Spoofing appeared first on SecurityWeek. This article is an excerpt from SecurityWeek View Original Source React to this headline:

React to this headline:

Loading spinner

Critical OpenPGP.js Vulnerability Allows Spoofing Read More »

Why EU encryption policy needs technical and civil society input

Why EU encryption policy needs technical and civil society input 2025-05-19 at 08:02 By Mirko Zorz In this Help Net Security interview, Full Professor at University of Leuven, unpacks the European Commission’s encryption agenda, urging a balanced, technically informed approach to lawful access that safeguards privacy, security, and fundamental rights across the EU. Given the

React to this headline:

Loading spinner

Why EU encryption policy needs technical and civil society input Read More »

CISA Warns of Flaw in TeleMessage App Used by Ex-National Security Advisor 

CISA Warns of Flaw in TeleMessage App Used by Ex-National Security Advisor  2025-05-13 at 12:03 By Eduard Kovacs An information exposure flaw in TeleMessage has been added to CISA’s Known Exploited Vulnerabilities catalog.  The post CISA Warns of Flaw in TeleMessage App Used by Ex-National Security Advisor  appeared first on SecurityWeek. This article is an

React to this headline:

Loading spinner

CISA Warns of Flaw in TeleMessage App Used by Ex-National Security Advisor  Read More »

Lattica Emerges From Stealth With FHE Platform for AI

Lattica Emerges From Stealth With FHE Platform for AI 2025-04-25 at 16:32 By Eduard Kovacs Lattica has raised $3.25 million in pre-seed funding for a platform that uses FHE to enable AI models to process encrypted data.  The post Lattica Emerges From Stealth With FHE Platform for AI appeared first on SecurityWeek. This article is

React to this headline:

Loading spinner

Lattica Emerges From Stealth With FHE Platform for AI Read More »

Google is making sending end-to-end encrypted emails easy

Google is making sending end-to-end encrypted emails easy 2025-04-02 at 15:03 By Zeljka Zorz Sending end-to-end encrypted (E2EE) emails from Gmail enterprise accounts is about to become much easier than it is now, Google has announced on Tuesday. The company will first make available this simplified capability to users who want to send E2EE emails

React to this headline:

Loading spinner

Google is making sending end-to-end encrypted emails easy Read More »

Google Brings End-to-End Encrypted Emails to All Enterprise Gmail Users

Google Brings End-to-End Encrypted Emails to All Enterprise Gmail Users 2025-04-02 at 13:05 By Ionut Arghire Gmail now allows enterprise users to send end-to-end encrypted emails to colleagues, and will soon allow sending to any inbox. The post Google Brings End-to-End Encrypted Emails to All Enterprise Gmail Users appeared first on SecurityWeek. This article is

React to this headline:

Loading spinner

Google Brings End-to-End Encrypted Emails to All Enterprise Gmail Users Read More »

Post-quantum cryptography and the future of online safety

Post-quantum cryptography and the future of online safety 2025-03-28 at 07:04 By Help Net Security In this Help Net Security video, Rebecca Krauthamer, CEO of QuSecure, explores the rising urgency of post-quantum cryptography (PQC) and what organizations must do to prepare. She breaks down the so-called “quantum threat” and explains why it’s not just theoretical.

React to this headline:

Loading spinner

Post-quantum cryptography and the future of online safety Read More »

ETSI releases security standard for the quantum future

ETSI releases security standard for the quantum future 2025-03-27 at 06:35 By Help Net Security ETSI launched post-quantum security standard to guarantee the protection of critical data and communications in the future. The specification “Efficient Quantum-Safe Hybrid Key Exchanges with Hidden Access Policies” (ETSI TS 104 015) has been developed to enhance security mechanisms, ensuring

React to this headline:

Loading spinner

ETSI releases security standard for the quantum future Read More »

NetSfere Launches Quantum-Resilient Messaging Platform for Enterprise and Government Use

NetSfere Launches Quantum-Resilient Messaging Platform for Enterprise and Government Use 2025-03-24 at 12:47 By Kevin Townsend NetSfere Integrates ML-KEM and AES into its text, voice and video messaging platform to meet 2027 NSA Quantum Security mandates. The post NetSfere Launches Quantum-Resilient Messaging Platform for Enterprise and Government Use appeared first on SecurityWeek. This article is

React to this headline:

Loading spinner

NetSfere Launches Quantum-Resilient Messaging Platform for Enterprise and Government Use Read More »

Protecting your iCloud data after Apple’s Advanced Data Protection removal in the UK

Protecting your iCloud data after Apple’s Advanced Data Protection removal in the UK 2025-03-19 at 07:16 By Help Net Security Advanced Data Protection (ADP) secures iCloud data with end-to-end encryption. This ensures that no one, not even Apple, can access the encrypted data, which remains secure even in the event of a cloud breach. As

React to this headline:

Loading spinner

Protecting your iCloud data after Apple’s Advanced Data Protection removal in the UK Read More »

NIST Announces HQC as Fifth Standardized Post Quantum Algorithm

NIST Announces HQC as Fifth Standardized Post Quantum Algorithm 2025-03-17 at 19:58 By Kevin Townsend First choices for both KEMs and DSAs are already standardized, and organizations should not wait for the backups to be available before migrating to PQC.  The post NIST Announces HQC as Fifth Standardized Post Quantum Algorithm appeared first on SecurityWeek.

React to this headline:

Loading spinner

NIST Announces HQC as Fifth Standardized Post Quantum Algorithm Read More »

How to encrypt and secure sensitive files on macOS

How to encrypt and secure sensitive files on macOS 2025-03-17 at 18:14 By Anamarija Pogorelec Encrypting files keeps sensitive data like personal details, finances, and passwords safe from attackers by making them unreadable to unauthorized users. Encryption also safeguards data in case of device loss or theft, preventing malicious actors from accessing or misusing the

React to this headline:

Loading spinner

How to encrypt and secure sensitive files on macOS Read More »

NIST selects HQC as backup algorithm for post-quantum encryption

NIST selects HQC as backup algorithm for post-quantum encryption 2025-03-12 at 13:32 By Help Net Security Last year, NIST standardized a set of encryption algorithms that can keep data secure from a cyberattack by a future quantum computer. Now, NIST has selected a backup algorithm that can provide a second line of defense for the

React to this headline:

Loading spinner

NIST selects HQC as backup algorithm for post-quantum encryption Read More »

Why a push for encryption backdoors is a global security risk

Why a push for encryption backdoors is a global security risk 2025-03-04 at 07:36 By Help Net Security Governments in the UK, US, and Europe are pressuring tech companies to weaken encryption in the name of security. The latest push from the UK government demanding Apple create a backdoor to encrypted iCloud data is just

React to this headline:

Loading spinner

Why a push for encryption backdoors is a global security risk Read More »

Mastering the cybersecurity tightrope of protection, detection, and response

Mastering the cybersecurity tightrope of protection, detection, and response 2025-02-21 at 08:05 By Mirko Zorz In this Help Net Security interview, Chester Wisniewski, Director and Global Field CISO at Sophos, discusses the shifting ransomware landscape, the risks posed by quantum decryption threats, and the role of vendor security validation. Wisniewski notes that cyber resilience is

React to this headline:

Loading spinner

Mastering the cybersecurity tightrope of protection, detection, and response Read More »

The UK’s secret iCloud backdoor request: A dangerous step toward Orwellian mass surveillance

The UK’s secret iCloud backdoor request: A dangerous step toward Orwellian mass surveillance 2025-02-13 at 07:30 By Help Net Security The United Kingdom government has secretly requested that Apple build a backdoor into its iCloud service, granting the government unrestricted access to users’ private data. This revelation deeply concerns me – it is a blatant

React to this headline:

Loading spinner

The UK’s secret iCloud backdoor request: A dangerous step toward Orwellian mass surveillance Read More »

OpenNHP: Cryptography-driven zero trust protocol

OpenNHP: Cryptography-driven zero trust protocol 2025-02-05 at 07:01 By Mirko Zorz OpenNHP is the open-source implementation of NHP (Network-resource Hiding Protocol), a cryptography-based zero trust protocol for safeguarding servers and data. OpenNHP offers the following benefits: Reduces attack surface by hiding infrastructure Prevents unauthorized network reconnaissance Mitigates vulnerability exploitation Stops phishing via encrypted DNS Protects

React to this headline:

Loading spinner

OpenNHP: Cryptography-driven zero trust protocol Read More »

Scroll to Top