How to Safeguard Your Business Data With Encryption
What organizations need to know when it comes to implementing encryption, the function of encryption, and how failing to encrypt data can lead to compromise.
The ‘Not Secure’ Web
After years of hinting it would do so, Google finally began marking HTTP pages that collect information as "Not Secure" in Chrome this week.
USB the Hard Way
Apple made it trickier for anyone looking to download the contents of an iOS device this week with a new feature that prevents USB accessories from communicating with devices that haven't been unlocked in an hour.
Preventing a Ban on Encryption
A bipartisan bill, the ENCRYPT Act, has resurfaced in the House of Representatives this week. The legislation would block states and governments from compelling companies to weaken encryption with a backdoor.
Critical Email Encryption Flaws Outlined
A set of vulnerabilities dubbed "EFAIL" affect encryption standards like PGP and S/MIME and could reveal the plaintext of encrypted emails sent in the past.
Domain Fronting Shutdown Hits Hard
Amazon followed in Google's footsteps this week in banning domain fronting, a technique that allows app and site developers to evade censorship.
Telegram Zero Day Let Hackers Mine Cryptocurrency, Drop Backdoors
Researchers said Tuesday the app was vulnerable to a right-to-left override attack, something which let attackers trick unsuspecting users into installing malware.
Weakened Encryption Solves Nothing
Christoper Wray, who was confirmed as the new FBI Director in August, said last week the concept of "Going Dark," compounded by new encrypted communications services and technologies, is still posing a challenge for the bureau.
What CIA Hacking Says About Encryption
If you haven’t been following the news this week, you missed a major story. Wikileaks has revealed that CIA actively engages in espionage. And it uses computers to do so. But for most end users and encryption advocates, this news is good.
Math is Hard, But Not as Hard as it Used to Be
The Internet’s security infrastructure is incredibly fragile, and every once in a while a small fragment of it comes loose and breaks all over the floor. Depending upon the importance of the piece, the mess can sometimes be swept up quickly before anyone notices. That is most decidedly not the case with the recent demonstration of a practical collision in SHA-1.
Don't Fall Behind
Get the latest security insights
delivered to your inbox each week.
Thank you for subscribing!