The CHK File Recovery Has Been Updated to Version 1.25

CHK File Recovery is an excellent recovery tool specialized in recovering CHK files in a quick and easy way, which has been updated to version 1.25. Change Log of CHK File Recovery V1.25: Version: 1.25 File Size: 6.23MB Category: CHK File Recovery Software Language: English License type: Trial Version OS Support: Win VISTA/Win 7/Win 8/Win ...

Iran blocks encrypted messaging apps amid nationwide protests

For the past six days, citizens have taken to the streets across Iran, protesting government oppression and the rising cost of goods. Video broadcasts from the country have shown increasingly intense clashes between protesters and riot police, with as many as 21 people estimated to have died since the protests began. But a complex fight ...

What can I do if I forget the password for my encrypted files?

To be safer, most people would like to protect their important files and folders by encrypting them with a password. While it's very common for people to forget the password because they should remember many different passwords. If you choose Best Folder Encryptor to encrypt your files and folders, and you forgot the encryption password, ...

It is difficult for the FBI to crack most smartphone encryption

The FBI is struggling to decode private messages on phones and other mobile devices that could contain key criminal evidence, and the agency failed to access data more than half of the times it tried during the last fiscal year, FBI Director Christopher Wray told House lawmakers. Wray will testify at the House Judiciary Committee ...

Texas Church Shooting: More Calls for Encryption Backdoors

US Deputy Attorney General, Rod Rosenstein, has decided to use the recent mass shooting at a Texas church to reiterate calls for encryption backdoors to help law enforcers. The incident took place at the First Baptist Church in Sutherland Springs, killing at least 26 people. Deceased suspect Devin Kelley’s mobile phone is now in the ...

Best Folder Encryptor Has Updated to Version 16.97

The professional file and folder encryption software - Best Folder Encryptor has been updated to version 16.97. The new version fixed bug that the control board cannot be closed after a Flash- and Hiding-encrypted folder is opened because of misjudgment, made some improvements and optimization, and several minor bug fixes. For more details about Best ...

Three Defenses to Solve the Problem of Storing Password

One of the biggest concerns around managing the passwords of an organization’s employees lies in how to store those passwords on a computer. Keeping every user’s password in a plain text file, for example, is too risky. Even if there are no bugs to recklessly leak the passwords to the console, there’s little to stop ...

Wi-Fi's Most Popular Encryption May Have Been Cracked

Your home Wi-Fi might not be as secure as you think. WPA2 -- the de facto standard for Wi-Fi password security worldwide -- may have been compromised, with huge ramifications for almost all of the Wi-Fi networks in our homes and businesses as well as for the networking companies that build them. Details are still ...

North Korean Hackers Blamed for Bitcoin Attacks

North Korean state hackers are increasingly looking to steal crypto-currency to fund the regime and circumvent tightening sanctions, according to FireEye. The security vendor’s ‎senior cyber threat intelligence analyst, Luke McNamara, revealed a spike in spear-phishing attacks targeting South Korean Bitcoin exchanges since May. The timing is important because April saw the US announce increased ...

Romanticizing Bugs Will Lead to Death of Information Security

Too much focus on vulnerabilities and their impact is leading information security into a slow death. Speaking in the keynote address at 44CON in London, security researcher Don A. Bailey said that while “we’re getting good at reducing problems and addressing problems, information security is dying a death it has earned.” Focusing on bugs and ...

Four Things Businesses Should be Doing to Protect from Cyber-Attacks

It’s a fact that every business needs to accept: everyone is at risk of a cyber-attack. What’s unfortunate is how many companies aren’t taking this seriously. There are a host of basic best practices that a majority of corporate networks are failing to implement, and it’s leaving them critically vulnerable. At the very minimum, there ...

Why You Need Private Browsing

If you thought browsing securely (and privately) was as easy as opening a new incognito window, think again. Private browsing is all the rage now that it’s necessary in order to access certain websites in some countries. Luckily, there are lots of ways to access the web that doesn’t require Safari, Firefox, or Chrome. There ...

French official begins anti-encryption campaign

This story was delivered to BI Intelligence Apps and Platforms Briefing subscribers. To learn more and subscribe, please click here. A French official plans to begin mobilizing a global effort — starting with Germany — against tech companies encrypting their messaging apps, according to Reuters. Messaging apps, such as Telegram and WhatsApp, that promote end-to-end ...

FBI Chief Calls for National Talk Over Encryption vs. Safety

SAN FRANCISCO — The FBI's director says the agency is collecting data that he will present next year in hopes of sparking a national conversation about law enforcement's increasing inability to access encrypted electronic devices. Speaking on Friday at the American Bar Association conference in San Francisco, James Comey says the agency was unable to ...

Google finally adds HSTS encryption to google.com

Google, known for its security practices, has finally brought HTTP Strict Transport Security (HSTS) to google.com to strengthen its data encryption. HSTS helps protect against eavesdroppers, man-in-the-middle attacks, and hijackers who attempt to spoof a trusted website. Chrome, Safari, and Internet Explorer all support HSTS. "HSTS prevents people from accidentally navigating to HTTP URLs by ...

Hacker finds breach in WhatsApp’s encryption system

A security expert has found a breach in WhatsApp’s supposed ‘end-to-end’ encryption system. On earlier 2016, the Facebook-owned company proudly announced that messages would feature end-to-end encryption, thus giving users the tranquility that their private conversations would remain untouched. Jonathan Zdziarski, a digital forensic specialist and digital security expert, published an article on Thursday with ...

Do anti-encryption Democrats see the importance of encryption now?

One would certainly hope so after the turmoil that has followed the release of thousands of DNC emails by Wikileaks. But Democratic lawmakers in the past have worked to weaken encryption standards, demanding backdoors that they say can be used by law enforcement authorities to track terrorists, but also leave computers vulnerable to hackers. Consider ...

Facebook to add end-to-end encryption to Messenger app

Facebook has started to introduce a setting to its "Messenger" app that provides users with end-to-end encryption, meaning messages can only be read on the device to which they were sent. The encrypted feature is currently only available in a beta form to a small number of users for testing, but it will become available ...

Full disk encryption flaw could affect millions of Android users

When it comes to vulnerabilities and security, Google’s Android has never been in the good books of security experts or even its users to a great extent. Now, another vulnerability has surfaced that claims to leave millions of devices affected. Security expert Gal Beniamini has now revealed another flaw in Android encryption. According to the ...

US wiretap operations encountering encryption fell in 2015

The US government has been very vocal recently about how the increase in encryption on user devices is hampering their investigations. The reality is that according to a report from the Administrative Office of U.S. Courts, law enforcement with court-ordered wiretaps encountered fewer encrypted devices in 2015 than in 2014. In regards to encrypted devices, ...

Greedy Bart ransomware encrypts files in ZIP archives

A new ransomware threat known as Bart is experimenting with the price it charges victims and encryption strategies. If your PC is infected by Bart you will be asked to pay three Bitcoin (BTC) or just under $2,000 to regain access to your files, which is significantly more than the usual 0.5 BTC ($300) to ...

Russia encryption grab may require chat backdoors as standard

MOOTED LEGAL CHANGES in Russia may apply a boot to the face of open and private chat messaging services and create a very cold winter for communications. Reports from the country said that plans to require backdoors in otherwise encrypted chat services are quite advanced and will launch with a mandatory status. Russia is often ...

Apple to expand encryption on Macs

Apple is amping up its commitment to encryption. The company is beginning the first major overhaul of the Mac filing system — the way it stores files on the hard drive — in more than 18 years. The move was quietly announced during a conference break out session after Apple’s blockbuster unveiling of its new ...

Apple Echoes Commitment to Encryption after Orlando Shooting

Apple used the kickoff of its Worldwide Developers Conference Monday to reaffirm the company’s stance on encryption and data monetization, one day after the most deadly mass shooting in U.S. history threatened to rekindle the debate surrounding the use of the technology. “In every feature that we do, we carefully consider how to protect your ...

UK's lower house eases up on encryption

The United Kingdom’s House of Commons approved far-reaching authority for spy agencies to access cyber data Tuesday, but pulled back some restrictions on encryption opposed by Apple and Facebook. The so-called “snooper’s charter,” officially the Investigatory Power Act, codifies intelligence agencies’ use of metadata analysis and malware to hack computers that has been ongoing in ...

Customer Headaches Could Curtail Apple’s Encryption Push

At an event held during Apple’s fight with the FBI over whether it should help unlock a dead terrorist’s iPhone, CEO Tim Cook promised “We will not shrink” from the responsibility of protecting customer data —including from government overreach. Yet the obvious next step for the company could be hard to take without inconveniencing customers. ...

HelpSystems Fills Encryption Gap With Linoma Buy

Despite all the IBM i security vendors that HelpSystems has bought over the years--and there have been at least five of them--the company has lacked one key security capability valued by enterprises: encryption. With last week's deal to acquire Linoma Software, the Minneapolis software vendor has finally obtained that encryption capability for IBM i. HelpSystems ...

Is Facebook making end-to-end encryption on Messenger opt-in only?

Facebook’s native chat is due to be silenced: Facebook’s reportedly going to kill it off, forcing users to instead use Messenger. Rumor has it that Facebook Messenger will also offer the option of end-to-end encryption sometime in the next few months. The Guardian, relying on input from three unnamed sources close to the project, earlier ...

​Symantec warns encryption and privacy are not the same

"Encryption and privacy is not the same thing," said Nick Savvides, Symantec APAC cybersecurity strategy manager. Encryption is a privacy "enhancing tool", Savvides went on to explain, while privacy is more about handling what information is collected, how the collected information is handled, and what other data can be derived from it. The two are ...

Google engineer says he'll push for default end-to-end encryption in Allo

After Google’s decision not to provide end-to-end encryption by default in its new chat app, Allo, raised questions about the balance of security and effective artificial intelligence, one of the company’s top security engineers said he’d push for end-to-end encryption to become the default in future versions of Allo. Allo debuted with an option to ...

OSGP custom RC4 encryption cracked yet again

The Open Smart Grid Protocol's (OSGP) home-grown RC4 encryption has been cracked once again. The easy-to-break custom RC4 was cracked last year. A year ago, the OSGP Alliance advised that better security would be implemented, but the RC4 still remains according to German researchers Linus Feiten and Matthias Sauer. Feiten and Sauer claim to have ...

Legal effects of encryption bills discussed at dark web event

An attorney who has worked for the U.S. Army and the Central Intelligence Agency discussed attempts to regulate encryption technologies at the Inside Dark Web conference in New York City on Thursday. "State legislative response may be un-Constitutional, because it would place a burden on interstate commerce," said Blackstone Law Group partner Alexander Urbeis. "So ...

Users'interest should drive encryption policy: IAMAI

Encryption is a fundamental and necessary tool to safeguard digital communication infrastructure but the interests of Internet users should be foremost in framing any policy, the Internet and Mobile Association of India (IAMAI) said here on Tuesday. “Trust, convenience and confidence of users are the keywords to designing an ideal encryption policy that will help ...

The encryption challenge

IT managers know the movies get it wrong. A teenager with a laptop cannot crack multiple layers of encryption -- unless that laptop is connected to a supercomputer somewhere and the teenager can afford to wait a few billion years. Encryption works. It works so well that even the government gets stymied, as demonstrated by ...

ON ENCRYPTION: THERE ARE NO LOCKS ONLY "ANGELS" CAN OPEN

Despite the FBI dropping its case against Apple over whether or not the tech giant should supply the government agency with the ability to hack into the San Bernardino shooter’s iPhone, the argument over how our devices — especially our phones — should be encrypted continues to rage on. And regardless of how you feel ...

Moot point: Judge closes iPhone encryption case in Brooklyn

The United States Justice Department said on Friday that it has withdrawn a request compelling Apple Inc to cooperate in unlocking an iPhone related to a drug case in NY following a third-party providing a passcode to the authorities to access the handset. "An individual provided the department with the passcode to the locked phone ...

FBI: Encryption increasing problem

The FBI is facing an increasing struggle to access readable information and evidence from digital devices because of default encryption, a senior FBI official told members of Congress at a hearing on digital encryption Tuesday. Amy Hess said officials encountered passwords in 30 percent of the phones the FBI seized during investigations in the last ...

How Apple makes encryption easy and invisible

Do you know how many times a day you unlock your iPhone? Every time you do, you’re participating in Apple’s user-friendly encryption scheme. Friday, the company hosted a security “deep dive” at which it shared some interesting numbers about its security measures and philosophy as well as user habits. To be honest, we’re less concerned ...

Apple, FBI set to resume encryption fight at House hearing

The encryption battle between Apple and the FBI is moving from the courtroom to Congress next week. Representatives from the tech titan and the federal law enforcement agency are scheduled to testify Tuesday before the House Energy and Commerce Committee about the debate over how the use of encryption in tech products and services hampers ...

Feinstein encryption bill sets off alarm bells

A draft version of a long-awaited encryption bill from Sens. Dianne Feinstein, D-Calif., and Richard Burr, R-N.C., was leaked online last week, and the technology industry is already calling foul. The bill requires any company that receives a court order for information or data to “provide such information or data to such government in an ...

"Petya" ransomware encryption cracked

Utility generates unscrambling key. Users whose data has been held to ransom by the Petya malware now have an option to decrypt the information, thanks to a new tool that generates an unscrambling key. Petya appeared around March this year. Once executed with Windows administrator privileges, Petya rewrites the master boot record on the computer's ...

FBI Hacks iPhone, Ending Apple Encryption Challenge

The Department of Justice said in a federal court filing Monday that it had bypassed encryption on the iPhone 5c used by a terrorist in a mass shooting last year in California and requested the court vacate its order compelling Apple to assist it in accessing the device. The filing effectively ends a contentious legal ...

Apple-FBI fight may be first salvo in encryption war

The Apple-FBI fight may just be the opening salvo in a broader war over encryption, as technology companies continue to lock up their users’ messages, photos and other data to shield them from thieves and spies — and, incidentally, criminal investigators. WhatsApp, the globally popular messaging system owned by Facebook, has already run into trouble ...

Debate over tech tools'encryption

Before the San Bernardino terror attack, Syed Rizawan Farook's iPhone was just one fancy Apple device among hundreds of millions worldwide. But since the California government worker and his wife shot and killed 14 people on December 2, apparently inspired by extremist group IS, his iPhone 5c has become a key witness - and the ...

Google closing in on target of full encryption

Google is disclosing how much of the traffic to its search engine and other services is being protected from hackers as part of its push to encrypt all online activity. Encryption shields 77 percent of the requests sent from around the world to Google’s data centers, up from 52 percent at the end of 2013, ...

Obama: ‘Absolutist view’ on encryption not answer

President Barack Obama said Friday that the encryption versus national security debate, currently being played out in Apple’s legal fight against the federal government, won’t be settled by taking an “absolutist view.” Addressing an audience of tech enthusiasts meeting in the Texas capital, Obama said both values are important. He restated his commitment to strong ...

New FBI strategy wins back lost ground in encryption fight

By July 2015, FBI Director Jim Comey knew he was losing the battle against sophisticated technologies that allowed criminals to communicate without fear of government surveillance. In back-to-back congressional hearings that month, Comey struggled to make the case that terrorists and crooks were routinely using such encryption systems to evade the authorities. He conceded that ...

No room for compromise in Apple vs FBI iPhone encryption battle

As Apple’s legal battle with the FBI over encryption heads toward a showdown, there appears little hope for a compromise that would placate both sides and avert a divisive court decision. The FBI is pressing Apple to develop a system that would allow the law enforcement agency to break into a locked iPhone used by ...

Amazon Dropping Fire Encryption Has Nothing to Do With Apple

Today, several reports pointed out that Amazon’s Fire OS 5 does not support device encryption, drawing a connection between the company’s encryption retreat and the current Apple-FBI iPhone unlocking fracas. But Amazon’s decision to remove Fire OS 5’s onboard encryption is not a new development, and it’s not related to the iPhone fight. The real ...

U.S.Defense Secretary Ashton Cater Doesn't Believe in Encryption Backdoors

Secretary of Defense Ashton Carter came out against supporting encryption back-doors at a conference panel on Wednesday. At the RSA information security conference in San Francisco, Carter told a packed room that he supported strong encryption and thought back-door access to encrypted communication as unrealistic. During his talk on the Apple vs. FBI case, which ...

Apple CEO defends position in encryption dispute with feds

Apple CEO Tim Cook said in an interview Wednesday it was a tough decision to resist a court order directing the tech giant to override security features on the iPhone used by one of the San Bernardino gunmen who killed 14 people in a December terror attack. However, Cook reiterated to ABC News in his ...

Why Canada isn’t having a policy debate over encryption

The legal saga between Apple and the FBI has thrust encryption into the government’s policy spotlight again – but only if you live in the United States. In Canada, you could be excused for not knowing such a debate exists . Ever since FBI director James Comey characterized the rising tide of encrypted data as ...

San Bernardino victims to oppose Apple on iPhone encryption

Some victims of the San Bernardino attack will file a legal brief in support of the U.S. government's attempt to force Apple Inc to unlock the encrypted iPhone belonging to one of the shooters, a lawyer representing the victims said on Sunday. Stephen Larson, a former federal judge who is now in private practice, told ...

What Tim Cook doesn't want to admit about iPhones and encryption

When Hillary Clinton called for a "Manhattan-like project" to find a way for the government to spy on criminals without undermining the security of everyone else's communications, the technology world responded with mockery. "Also we can create magical ponies who burp ice cream while we're at it," snarked prominent Silicon Valley investor Marc Andreessen. Clinton's ...

Google CEO Pichai Lends Apple Support on Encryption

Google Chief Executive Sundar Pichai lent support to Apple Inc.'s  pushback against a federal order to help law enforcement break into the locked iPhone of an alleged shooter in the San Bernardino, Calif., attacks. Mr. Pichai wrote on Twitter on Wednesday that “forcing companies to enable hacking could compromise users’ privacy.” A federal judge Tuesday ...

Weak email encryption laws put Aussie consumers at risk of fraud

A consumer alert issued by Victoria's Legal Services Commissioner a few weeks ago raised, to our mind, an old and curious issue. Why aren't Australian professionals required to secure their email? Eighteen years ago, Victoria's Law Institute Journal carried an excellent feature article on the ease with which email can be forged, the fact that ...

Top senator: Encryption bill may "do more harm than good"

Legislating encryption standards might “do more harm than good” in the fight against terrorism, Senate Homeland Security Committee Chairman Ron Johnson (R-Wis.) said on Thursday. In the wake of the terrorist attacks in Paris and San Bernardino, Calif., lawmakers have been debating whether to move a bill that would force U.S. companies to decrypt data ...

McCaul: US playing 'catchup' to terrorists using encryption

The U.S. is playing “catchup” with terrorists and cyber vigilantes who coordinate via encrypted communications, according to the chairman of the House Homeland Security Committee. "Today’s digital battlefield has many more adversaries that just nation states,” Rep. Michael McCaul (R-Texas) said in a Tuesday column for Bloomberg. “Terrorist groups such as ISIS [the Islamic State in ...

Half-Measures on Encryption Since Snowden

When the NSA subcontractor Edward Snowden released classified documents in June 2013 baring the U.S. intelligence community’s global surveillance programs, it revealed the lax attention to privacy and data security at major Internet companies like Apple, Google, Yahoo, and Microsoft. Warrantless surveillance was possible because data was unencrypted as it flowed between internal company data ...

AT&T CEO won’t join Tim Cook in fight against encryption backdoors

US politicians have been urging tech companies to weaken the security of smartphones and other products by inserting encryption backdoors that let the government access personal data. Numerous tech companies—including Apple—have come out strongly against the idea, saying that encryption backdoors would expose the personal data of ordinary consumers, not just terrorists. But tech company ...

Cisco Security Report: Dwell time and encryption security struggles

The 2016 Cisco Security Report highlighted the duality of cybersecurity and described a number of issues, including encryption security and dwell time as a constant struggle between threat actors looking for more effective and efficient attack techniques and security providers responding to those changes. One of the statistics in the report that could have been ...

British voice encryption protocol has massive weakness, researcher says

A protocol designed and promoted by the British government for encrypting voice calls has a by-design weakness built into it that could allow for mass surveillance, according to a University College London researcher. Steven Murdoch, who works in the university's Information Security Research Group, analyzed a protocol developed by CESG, which is part of the ...

Tim Cook pushes for strong encryption at White House summit

As expected, Apple CEO Tim Cook urged White House and government officials to come to terms with strong encryption practices that protect consumer data, at one point saying such intentions should be stated publicly. Cook's plea came during a cybersecurity summit held in San Jose, Calif., last week, where government officials met with Silicon Valley ...

Congress wades into encryption debate with bill to create expert panel

WASHINGTON — Growing concern about terrorists' use of encrypted communication is spurring Congress to act, but the first major piece of legislation is taking a cautious approach as lawmakers grapple with how to spy on suspected criminals without weakening cybersecurity and privacy. House Homeland Security Committee Chairman Michael McCaul, R-Texas, and Sen. Mark Warner, D-Va., ...

Ubuntu Touch to Support Encryption of User Data

The Ubuntu Touch operating system is also going to provide support for encryption of user data, developers have revealed. It wasn’t a secret that Ubuntu Touch will get encryption, but it’s also not listed as an upcoming feature. It’s buried in a wiki entry with plans for Ubuntu Touch, but it’s nice to see that ...

Tech big guns confront U.K. parliament on backdoors, encryption

A group of high tech corporate powerhouses has gathered together to protest a law proposed by the U.K. government that would allow an array of legal and intelligence agencies the ability to access computer data through backdoors and decryption. Facebook, Google, Microsoft, Twitter and Yahoo submitted a letter, dated December 21, 2015, to the parliamentary ...

Microsoft, Google, Facebook to U.K.: Don’t weaken encryption

Microsoft, Google and Facebook are urging U.K. officials not to undermine encryption as they work on laws that would authorize forcing communications service providers to decrypt customer traffic. In a joint written submission to the U.K. Parliament the three U.S.-based companies lay down several areas of concern, which, if not addressed, they say could damage ...

Netherlands opposes backdoors, but encryption still under assault

The Dutch government has officially declared its opposition to any restrictions on the development or use of encryption products, even as Dutch lawmakers are weighing legislation that could mandate backdoor government access to encrypted communications. In a 4 January 2016 letter to the Dutch parliament, the head of the Ministry of Security and Justice, Ard ...

The Netherlands will not weaken encryption for security purposes

The Dutch government believes that confidence in secure communication and storage data is essential for the development of the Dutch economy. The Netherlands will not follow the trend of weakening encryption for security purposes, according to a statement by the Dutch Minister of Security and Justice. In contrast, with the United Kingdom where the Investigatory ...

Microsoft may have your encryption key:here’s how to take it back

As happens from time to time, somebody hasspotted a feature in Windows 10 that isn't actually new and has largely denounced it as a great privacy violation. The Intercept has written that if you have bought a Windows PC recently then Microsoft probably has your encryption key. This is a reference to Windows' device encryption ...

Lawmakers push for commission on encryption

Congress should create a national commission to investigate the difficulties encryption has created for law enforcement, a bipartisan pair of lawmakers argued Monday in a Washington Post op-ed. “Congress must be proactive and should officially convene a body of experts representing all of the interests at stake so we can evaluate and improve America’s security ...

China Antiterror Law Doesn’t Require Encryption Code Handovers

BEIJING—China passed a new antiterrorism law that stepped back from previous language of concern to global technology firms, but which still raises questions about its scope and the potential impact on companies doing business there. The law, passed Sunday by China’s rubber-stamp parliament, also authorized the armed forces and paramilitary police to take part in ...

Senate Intel chair: "It's time" for encryption legislation

Congress must enact a law that would require companies to decrypt data upon government request, Senate Intelligence Committee Chairman Richard Burr (R-N.C.) argued Thursday in a Wall Street Journal op-ed. “Criminals in the U.S. have been using this technology for years to cover their tracks,” Burr said. “The time has come for Congress and technology ...

Best Disk Lock Has Been Updated to Version 2.62

The powerful data protection software-Best Disk Lock has been updated to version 2.62. There are many improvements in version 2.62, which are designed to make the program even easier to use. The latest version software not only improved the stability for disk elementary-lock, changed the Lock Log to Lock Record for easily unlocking, but also ...

Apple CEO Tim Cook Mounts Defense of Encryption on "60 Minutes"

In a “60 Minutes” appearance Sunday, Apple CEO Tim Cook reiterated his support of encryption, in the face of renewed criticism from the U.S. intelligence community that these digital locks interfere with the ability to detect threats to national security. Cook used an interview with CBS’s Charlie Rose to lay out his argument for why ...

Paris attack planners used encrypted apps, investigators believe

French counterterrorism investigators believe that the men suspected in last month's Paris attacks used widely available encryption tools to communicate with each other, officials familiar with the investigation said, raising questions about whether the men used U.S.-made tools to hide the plot from authorities. Investigators have previously said that messaging services WhatsApp and Telegram were ...

Encrypted Messages Stymied Probe of Garland Shooting — FBI Director

FBI Director James Comey Jr. testifies at a Senate Judiciary Committee hearing on Capitol Hill in Washington December 9, 2015. John McCain (R-Ariz.), who said after the Paris attacks that the status quo was "unacceptable". He said the Federal Bureau of Investigation was focused intently on the threat of homegrown violent extremism, "the radicalization in ...

McCaul wants new commission on encryption and law enforcement

The chairman of the House Homeland Security Committee said he plans to introduce legislation that would allow the creation of a "national commission on security and technology challenges in the Digital Age." The legislation "would bring together the technology sector, privacy and civil liberties groups, academics, and the law enforcement community to find common ground," ...

Apple, Google encryption is a blow to public safety

A November 2015 report of the Manhattan District Attorney’s Office in New York City sets forth succinctly a huge public safety problem of which most Americans are unaware: “Most people today live their lives on smartphones, and, in this regard at least, criminals are no different. While in the past criminals may have kept evidence ...

Encrypted messaging app Signal now available for desktops

The much-lauded encryption app Signal has launched a beta program for a desktop version of the app, which will run through Google's Chrome browser. Signal Desktop is Chrome app that will sync messages transmitted between it and an Android device, wrote Moxie Marlinspike, a cryptography expert who had helped develop Signal, in a blog post ...

Why Government and Tech Can't Agree about Encryption

Your g better and better at protecting your privacy. But Uncle Sam isn't totally comfortable with that, because it's also complicating the work of tracking criminals and potential national-security threats. For decades, tech companies have steadily expanded the use of encryption -- a data-scrambling technology that shields information from prying eyes, whether it's sent over ...

Paris attacks reignite debate over encryption,surveillance and privacy

WASHINGTON — Friday's terrorist attacks in Paris have revived the debate over whether U.S. tech companies should be required to build "backdoors" into encrypted phones, apps and Internet sites to let law enforcement conduct surveillance of suspected terrorists. There has been widespread speculation among law enforcement authorities and the media that the Islamic State terrorists ...

Paris attack stokes the flames in fight over US data encryption

Last week's terrorist attack on Paris sounded a call to arms for hawkish U.S. officials seeking broad oversight of encrypted digital communications, some of whom used the opportunity to rekindle discussions with Silicon Valley technology companies. In an interview with MSNBC on Monday, Senator Diane Feinstein (D-Calif.) said Silicon Valley companies, particularly those marketing secure ...

Microsoft releases encryption tech for bioinformatics

Allows researchers to work on data securely. Microsoft has released tools that allow bioinformatics researchers to work on genome data sets securely to protect privacy. Genomic data is becoming available in increasing amounts as gene sequencing becomes easier, cheaper and faster, and is used for several new applicaitons such as predicting the occurrence and survival ...

Apple’s Encryption Fight Turns To The UK

After a major victory in the United States, Apple is facing an another threat to its encryption efforts on a different front: the United Kingdom. The Cupertino-based tech giant typically shies away from taking firm stances on specific legislation and works through lobbying groups representing technology companies’ interests. Apple’s CEO Tim Cook today told students ...

Snowden Never Told Us About Ransom Encryption

While Edward Snowden is the source behind the largest scandal on the internet, he sure didn’t warn us that hackers would put ransoms onto their spyware. A special ransomware virus was discovered which targets Linux-based systems specifically, and it’s telling us hackers are expanding to web browsers for their vicious attacks. This specific malware, labeled ...

New U.K. online surveillance proposal could have international reach

A new surveillance proposal in the United Kingdom is drawing criticism from privacy advocates and tech companies that say it gives the government far-reaching digital surveillance powers that will affect users outside the nation's borders. The Draft Investigatory Powers Bill released by British Home Secretary Theresa May Wednesday would force tech companies to build intercept ...

This Snowden-Approved Encrypted-Communication App Is Coming to Android

Since it first appeared in Apple’s App Store last year, the free encrypted calling and texting app Signal has become the darling of the privacy community, recommended—and apparently used daily—by no less than Edward Snowden himself. Now its creator is bringing that same form of ultra-simple smartphone encryption to Android. On Monday the privacy-focused nonprofit ...

Biometric data becomes the encryption key in Fujitsu system

Fujitsu says it has developed software that uses biometric data directly as the basis for encryption and decryption of data, simplifying and strengthening security systems that rely on biometrics such as fingerprints, retina scans and palm vein scans. Current security systems that rely on encryption require the management of encryption keys, which are stored on ...

Western Digital's hard drive encryption is useless. Totally useless

The encryption systems used in Western Digital's portable hard drives are pretty pointless, according to new research. WD's My Passport boxes automatically encrypt data as it is written to disk and decrypt the data as it is read back to the computer. The devices use 256-bit AES encryption, and can be password-protected: giving the correct ...

NSA, Apple Chiefs Decode Encryption Views

LAGUNA BEACH, Calif.—The heads of the National Security Agency and the world’s most valuable company appeared to try to make nice Monday night over their contrasting views on encryption—to a point. NSA Director Adm. Michael Rogers and Apple Inc. Chief Executive Tim Cook, appearing at The Wall Street Journal’s technology conference, WSJDLive, spoke in broad ...

The next steps for the White House on encryption

THE OBAMA administration’s decision not to seek legislation requiring technology companies to give law enforcement access to encrypted communications on smartphones has a certain logic. In this age of hacking and cyberintrusion, encryption can keep most people safer. But the decision also carries risks. Encryption can give a tiny band of criminals and terrorists a ...

Aadhaar encryption protects privacy, will take eons to crack

The Aadhaar system's data collection and storage is strongly protected by sophisticated encryption processes to ensure biometric data does not leak either through private contractors running enrollment centres or at the central data servers that store the details. The unique identity authority of India's processes are intended to allay fears that biometric data collected by ...

Encrypted Smartphones Challenge Investigators

Law-enforcement officials are running up against a new hurdle in their investigations: the encrypted smartphone. Officials say they have been unable to unlock the phones of two homicide victims in recent months, hindering their ability to learn whom those victims contacted in their final hours. Even more common, say prosecutors from New York, Boston and ...

US Government Will No Longer Push For User’s Encrypted Data

Last year Google and Apple (and other companies) made some changes to the way encryption was handled. Instead of Google and Apple holding the keys to the encryption, they gave the keys to their customers. What this meant is that law enforcement agencies can no longer ask these companies to turn over user encrypted data. ...

Obama administration has decided not to seek a legislative remedy now

FBI Director James Comey told a congressional panel that the Obama administration won't ask Congress for legislation requiring the tech sector to install backdoors into their products so the authorities can access encrypted data. Comey said the administration for now will continue lobbying private industry to create backdoors to allow the authorities to open up ...

Obama administration opts not to force firms to decrypt data — for now

After months of deliberation, the Obama administration has made a long-awaited decision on the thorny issue of how to deal with encrypted communications: It will not — for now — call for legislation requiring companies to decode messages for law enforcement. Rather, the administration will continue trying to persuade companies that have moved to encrypt ...

Risk Analysis, Encryption Stressed in HITECH Act Final Rules

Two final rules for the HITECH electronic health record incentive program strongly emphasize the value of risk assessments and encryption as measures for safeguarding patient information. A new rule establishing requirements for proving a provider is a "meaningful user" for Stage 3 of the incentive program requires protecting patient data through the implementation of appropriate ...

CHK File Recovery Has Been Updated to Version 1.09

CHK File Recovery is an excellent recovery tool specialized in recovering CHK files in a quick and easy way, which has been updated to version 1.09 recently. In this new version, we fixed a bug which disabled to identify one file type, also we added one recoverable file type. Change Log of CHK File Recovery ...

Best Disk Lock Has Been Updated to Version 2.60

Best Disk Lock, which can completely hide the disk partitions, has been updated to the version 2.60. In this new version, we have improved the stability of disk advanced-lock, added the judgement for the disks unsuitable for lock when locking disks, also fixed a BUG that an error occurred in software uninstallation. Change Log of ...

Experts pick big holes in India's encryption policy

India's proposed encryption policy has come under heavy fire with internet experts and online activists alleging that it provides blanket backdoors to law enforcement agencies to access user data, which could be abused by hackers and spies. The Department of Electronics and Information Technology ( DeitY) has asked for public comments on the 'Draft National ...

Obama edges toward full support for encryption

President Obama recently called on the best minds in government, the tech sector and academia to help develop a policy consensus around "strong encryption" — powerful technologies that can thwart hackers and provide a profound new level of cybersecurity, but also put data beyond the reach of court-approved subpoenas. From Obama on down, government officials ...

Science on the Hill: For cybersecurity, in quantum encryption we trust

As everyone becomes more interconnected on the Internet, personal information like bank and investment accounts, credit card numbers, home addresses and even social security numbers becomes more vulnerable to cybertheft. The same goes for the corporate world. Identity theft struck 16.6 million Americans in 2012, the most recent year for which figures were available. According ...

MainOne addresses data centre security concerns

Keeping customer data secure is of utmost importance in any organization. Therefore, compliance with security standards is vital. In today’s world, a company cannot afford to experience breaches of customer information, transactional data or other important business information given the volume of business taking place online and the consequences of such breaches. When considering collocation ...

Encryption and privacy are priorities for tech firms

The Justice Department and Microsoft go head-to-head in the U.S. Second Circuit Court of Appeals in Manhattan on Wednesday. The battleground? Data privacy. At issue is the question of whether U.S. law enforcement can use a search warrant — in this case, in a drug investigation — to force the U.S.-based technology company to turn ...

CHK File Recovery Has Been Updated to Version 1.082

CHK File Recovery is an excellent recovery tool specialized in recovering CHK files in a quick and easy way, which has been updated to version 1.082 recently. In this new version, we fixed a bug which disabled to identify one file type, also we added one recoverable file type. Change Log of CHK File Recovery ...

Argument over strong encryption reaches boiling point as Apple, Microsoft rebuff court orders for data access

A long-running debate concerning recent advances in consumer data encryption came to a head this summer when Apple rebuffed a Justice Department court order demanding access to iMessage transcripts, causing some in the law enforcement community to call for legal action against the company. Over the summer Apple was asked to furnish real-time iMessage communications ...

Best Folder Encryptor Has Updated to Version 16.83

The professinal file and folder encryption software - Best Folder Encryptor has been updated to version 16.83 recently. In last version 16.82, we have fixed a bug that the encrypted file/folder cannot be prevented from deletion, copy and removal in 64 bit operating system, also fixed a bug that there is no verification for password ...

Vice News fixer 'charged over encryption software'

Three staff members from Vice News were charged with "engaging in terrorist activity" because one of the men was using an encryption system on his personal computer which is often used by the Islamic State of Iraq and the Levant (ISIL), a senior press official in the Turkish government has told Al Jazeera. Two UK ...

NSA wants encryption that fends off quantum computing hacks

The National Security Agency isn't just yearning for quantum computers that can break tough encryption -- it wants encryption that can protect against quantum computers, too. Officials have begun planning a transition to "quantum resistant" encryption that can't be cracked as quickly as conventional algorithms. As the NSA explains, even a seemingly exotic technique like ...

Whose keys are they anyway?

Google recently announced enhanced security support for its cloud customers by granting them the ability to hold the encryption keys to their data. These customer-supplied encryption keys for the Google Cloud Platform follow the example set by other cloud industry leaders such as Amazon Web Services and Box and position the tech giant as an ...

NCUA institutes encryption protocols for data provided to examiners

NCUA has instituted data encryption protocols as suggested by its Office of Inspector General this June following review of an examiner’s loss of a thumb drive containing credit union members’ data. The protocols were communicated Aug. 21 in a letter from NCUA Examination and Insurance Director Larry Fazio to the chief executives of federally insured ...

Reflective satellites may be the future of high-end encryption

Quantum key distribution is regularly touted as the encryption of the future. While the keys are exchanged on an insecure channel, the laws of physics provide a guarantee that two parties can exchange a secret key without knowing whether they're being overheard. This unencrypted-but-secure form of key exchange circumvents one of the potential shortcomings of ...

Jeb Bush: encryption makes it too hard to catch "evildoers"

Bush, the former governor of Florida, said Tuesday that encryption "makes it harder for the American government to do its job." That job would be, according to Bush, "making sure that evildoers aren't in our midst," echoing a phrase frequently used by his brother President George W. Bush to describe the threat of radical Islamic ...

Five free Android encryption tools for the paranoid user

Do your hats tend to fall into the tinfoil range? Are you afraid there is always somebody watching you? If so, rest assured that the Android ecosystem offers plenty of apps to soothe your paranoia. But which apps are the must-haves? Here are five apps you should immediately install and put to work. They'll bring ...

Pushbullet adds end-to-end encryption as it continues shift into messaging

Pushbullet, once a simple tool for sending files between your various devices, has announced that it now supports end-to-end encryption for additional user privacy, as it continues its march towards becoming a fully-fledged messenger. Announced in a blog post, the new encryption is applied across notifications that are mirrored between devices, any text captured by ...

NSA-grade encryption for mobile over untrusted networks

The only term being thrown around government more than “2016 elections” these days is “cybersecurity,” particularly following a rash of damaging and high-profile data breaches. With that focus on protecting information top of mind in agencies, USMobile officials hope to find a ready market for their commercial app, which lets government workers use their personal ...

Cloud encryption key management becomes table stakes

Encryption key management has become table stakes for cloud vendors, but bringing your own key isn't always the right move. The ability to bring your own encryption keys is fast becoming ubiquitous in public cloud, but that doesn't mean IT pros should retain control. Security concerns and data center oversight are two primary hang-ups for ...

SafeChats aims to give messaging an encryption edge

THE revelations from former US National Security Agency (NSA) contractor Edward Snowden that the US Government has been tapping communications have created greater awareness on the need for secure communications, which in turn has given rise to secure messaging apps such as Telegram, Wickr and Threema. Privacy should not be a concern for just individuals, ...

Researchers develop quantum-computing safe crypto

Practical implementation of secure key exchange for TLS. A team of researchers claim to have developed secure, quantum computing-proof encryption that can be practically implemented today. The paper, Post-quantum key exchange for the TLS protocol from the ring learning with errors problem [pdf] is written by Joppe Bos from NXP Semiconductors in Belgium, Craig Costello ...

DA Hillar Moore: Cellphone encryption hurting murder investigation of woman, her baby; family holds onto hope the case will be solved

Cellphone encryption practices could be keeping investigators from solving the murder of Brittney Mills and her son, East Baton Rouge Parish District Attorney Hillar Moore III said Saturday, but family members remain hopeful the truth will surface. “By no means have we forgotten them,” said Mills’ mother, Barbara Mills, on Sunday. “This will be in ...

Silent scanners: Emergency communications encrypted across Nova Scotia

SYDNEY — Citizens who like listening in on police, fire department and ambulance calls are out of luck, now that most emergency services communications in Cape Breton are conducted on fully encrypted radios. The scanners have gone silent, for the most part, with the introduction of the second generation of Trunk Mobile Radio (TMR2) communications. Being ...

Twitter Security Pro: Encryption Isn't Enough

Encryption can appear to be priceless when it's absent, as it was in the recent Office of Personnel Management breach. It can appear to be costly when it's present, as FBI director James Comey has argued. But not everything is as it appears. Michael Coates, trust and information security officer at Twitter and global board ...

It’s Time to End the “Debate” on Encryption Backdoors

Yesterday, on Lawfare, FBI Director James Comey laid out his concern that the growing adoption of strong encryption technologies will frustrate law enforcement’s ability to conduct investigations — what he calls the “Going Dark” problem. The gist of Comey’s position is this: He recognizes encryption is important to security and privacy, but believes we are ...

Encryption, Privacy, National Security And Ashley Madison

So, as about a million Australians quietly shit themselves as the Ashley Madison data breach starts to bleed data, we have the UK government talking about banning encryption. Although they have backtracked to some some degree UK Prime Minister David Cameron told his parliament the country needed to crack down on encryption in order to ...

Ace Secret Disk Updated to the Latest Version 8.05

Ace Secret Disk allows you to create a secret disk on your computer, on which you can store your private files (such as photos, videos and financial information documents) just like you would do on a normal disk. In this way the danger of data leakage can be completely eradicated. In the new version, we have ...

TeslaCrypt 2.0 comes with stronger encryption and a CryptoWall disguise

TeslaCrypt, primarily known for encrypting gaming files, has beefed up its techniques and most recently, greatly improved its encryption in its newest 2.0 version. Kasperky Lab wrote in a blog post that TeslaCrypt 2.0 not only makes it impossible to decrypt files, but also uses an HTML page copied directly from a separate ransomware: CryptoWall. ...

New Version of Teslacrypt changes encryption scheme

A new version of the nasty TeslaCrypt ransomware is making the rounds, and the creators have added several new features, including an improved encryption scheme and some details designed to mimic CryptoWall. TeslaCrypt is among the more recent variants of ransomware to emerge and the malware, which is a variant of CryptoLocker, is unique in ...

CHK File Recovery Has Been Updated to Version 1.08

CHK File Recovery is an excellent recovery tool specialized in recovering CHK files in a quick and easy way, which has been updated to version 1.08 recently. In this new version, we added 5 recoverable  file types, and fixed the bug that the chk file cannot be recovered after manually identified. Change Log of CHK ...

In The Debate Over Strong Encryption, Security And Liberty Must Win

When Sen. Chuck Grassley (R-Iowa) gaveled a Senate Judiciary Committee hearing into session on Wednesday, he called it the "start" of a conversation about privacy, security and encryption. Frankly, it was just the latest forum for a much older discussion. While it may have been the beginning of a long day on Capitol Hill for FBI ...

FBI chief wants 'backdoor access' to encrypted communications to fight Isis

The director of the Federal Bureau of Investigation has warned US senators that the threat from the Islamic State merits a "debate" about limiting commercial encryption – the linchpin of digital security – despite a growing chorus of technical experts who say that undermining encryption would prove an enormous boon for hackers, cybercriminals, foreign spies ...

OpenSSL to Patch Critical Mystery Bug on Thursday

The OpenSSL project team has sent a rather cryptic alert that it will be patching a high severity bug this Thursday, July 9. The announcement is terse: “The OpenSSL project team would like to announce the forthcoming release of OpenSSL versions 1.0.2d and 1.0.1p. These releases will be made available on 9th July. They will ...

Professional Folder Encryption Software - Easy Folder Guard Updated to Version 9.01 Recently

Easy Folder Guard is an excellent folder encryption software that protects your personal folders from prying eyes. You can choose to password-protect, disguise or hide your folders, or protect computer drives t suit you needs. Change Log of Easy Folder Guard 9.01: File Size: 2.62MB Version: 9.01 Released on: July 2, 2015 Category: Encryption Software Language: English License: ...

File Encryption Software Best Encryption Expert Has Been Updated to Version 12.05

The professional file and folder encryption software - Best Folder Encryptor, has been updated to the version 12.05. In this new version, we fixed some minor bugs. Change Log of Best Encryption Expert 12.03: File Name: Best Encrypiton Expert Version: 12.05 File Size: 3.96MB Category: File/Folder Encryption Software Language: English License: Trial version System Requirements: Win2000/XP/VISTA/Win ...

DoGoodSoft Recently Updated Best Disk Lock to Version 2.59

Best Disk Lock is a powerful utility that can completely hide hard disk partitions and CD-ROM drives on your PC, and disable USB storage devices or set them as read-only. In this new version, we have fixed three bugs and made minor enhancements for Best Disk Lock. Change Log of Best Disk Lock: File Size: 3.55MB Version: 2.59 ...

Software developers are not carrying out encryption properly

Despite a big push over the past few years to use encryption to combat security breaches, lack of expertise among developers and overly complex libraries have led to widespread implementation failures in business applications. The scale of the problem is significant. Cryptographic issues are the second most common type of flaws affecting applications across all ...

DoGoodSoft Recently Released the Latest Version of PC Monitor Expert 1.65

The well-known computer monitoring software PC Monitor Expert has been updated to the version 1.65, in which fixed a serious problem and some minor bugs. Change Log of PC Monitor Expert: File Name: PC Monitor Expert Version: 1.65 File Size: 3.79 Category: Computer Monitoring Software Language: English License: Trial version System Requirements: win xp/vista/win 7/win 8 Released ...

DoGoodSoft USB Encryptor Recently Updated to Version 7.25

USB Encryptor is a professional encryption software for USB sticks, protable hard drives and shared folders, which has been upgraded to the latest version 7.25. The new version fixed some bugs and enhanced the efficiency and strength of Flash Encryption. Change Log of USB Encryptor: File Name: USB Encryptor Version: 7.25 File Size: 1008KB Category: ...

Best Encryption Expert Updated to Version 12.03

A powerful file and folder encryption utility--Best Encryption Expert, recently upgraded to the latest version 12.03. This is a major upgrade offering some  significant changes, with the goal  to make Best Encryption Expert easy and powerful for users to employ. Change Log of Best Encryption Expert 12.03: File Name: Best Encrypiton Expert Version: 12.03 File Size: 3.31MB Category: ...

DoGoodSoft Released the Latest Version of CHK File Recovery 1.06

CHK File Recovery, a professional chk file recovery software, has been updated by DoGoodSoft to the Version 1.06. Update Information of CHK File Recovery: File Name: CHK File Recovery Version: 1.06 File Size: 2.82 Category: CHK File Recovery Software Language: English License: Trial version System Requirements: Win2000/XP/VISTA/Win 7/Win 8 Release on: Jun 1, 2015 Download Address: http://dogoodsoft.com/chk-file-recovery/free-download.html What's New ...

Google Hangouts doesn't use end-to-end encryption

If you're using Google Hangouts as your main messaging service, you might want to know that Hangouts doesn't use end-to-end encryption (E2EE), a must-have feature for messaging services in the post-Snowden world. This was recently confirmed during a Reddit Ask Us Anything (AUA) session by Google's Richard Salgado, Director for Law Enforcement and Information Security, ...

Google admits Hangouts doesn't use end-to-end encryption, opening the door for government wiretaps

If you’re really worried the government may be keeping tabs on your conversations, then you’d best avoid Hangouts. According to Motherboard, a Google representative confirmed that Hangouts conversations are only encrypted “in transit,” meaning after the message arrives at the intended recipient Google could access it if forced to do so by a government wiretap. The question ...

Chinese Version of PC Monitor Expert Updated to Version 1.63

PC Monitor Expert is designed to record all the computer activities, which works as a good helper for parents and computer administrators. For some bugs in the version 1.62 that brought the inconvenience to software users, we have upgraded PC Monitor Expert to version 1.63. Update information of PC Monitor Expert: File Name: PC Monitor ...

New technology to help users combat mobile malware attacks

As mobile phones increase in functionality, they are becoming increasingly ubiquitous in everyday life. At the same time, these devices also are becoming easy targets for malicious activities. One of the primary reasons for such malware explosion is user willingness to download applications from untrusted sources that may host apps with hidden malicious codes. Once installed ...

Key management is the biggest pain of encryption

Most IT professionals rate the pain of managing encryption keys as severe, according to a new global survey by the Ponemon Institute. On a scale of 1 to 10, respondents said that the risk and cost associated with managing keys or certificates was 7 or above, and cited unclear ownership of keys as the main reason. "There's ...

DHS Chief Says Encryption Threatens National Security

Department of Homeland Security (DHS) secretary Jeh Johnson wants the government to work more closely with tech companies on security issues, but it also wants them to dial back their security encryption efforts. Johnson made his comments Tuesday in front of a packed house at the RSA conference in San Francisco, one of the world’s ...

Google is Keeping the NSA Out of Your Data, Eric Schmidt Brags

Google (GOOGL) Chairman Eric Schmidt boasted on Wednesday about how improving the encryption of Google's products has successfully shut out warrantless surveillance by the NSA and other law enforcement. Schmidt talked about the encryption advances, and how former NSA contractor Edward Snowden's leaks prompted them, at BoxDev, a yearly developers conference for Box. "When the Snowden ...

Google and Yahoo Encrypting Ad Network Connections

Google and Yahoo in separate announcements said they will individually encrypt ad network connections to reduce bot traffic and other types of ad fraud. The news coincides with the release of Malwarebytes Labs findings last week. Researchers found malvertising in Flash ads involving the DoubleClick ad network. The two companies have support. The Interactive Advertising ...

Encryption Uncoded: A Consumers's Guide

Concerned by reports of hacking, data breaches and government spying, companies and consumers are looking for better ways to protect their data. Many are turning to encryption, a method of encoding messages that goes back millennia. Encryption is commonly used to secure online banking sessions and to protect credit-card data. But for the average computer ...

Online Extortionists Are Using Encryption as a Ransom Weapon

Most of the time we discuss encryption as a way to protect ourselves online , but an increasingly popular form of digital attack uses it as an extortion tool. Criminals are stealing personal files, encrypting them, and hold them hostage until their targets pay for the decryption key. A report from security firm Symantec details ...

Europol chief warns on computer encryption

A European police chief says the sophisticated online communications are the biggest problem for security agencies tackling terrorism. Hidden areas of the internet and encrypted communications make it harder to monitor terror suspects, warns Europol's Rob Wainwright. "Tech firms should consider the impact sophisticated encryption software has on law enforcement", he said. A spokesman for TechUK, ...

Multiple Digital Certificate Attacks Affect 100% of UK Businesses

All—as in 100%—of UK organizations have responded to multiple attacks on keys and certificates in the past two years. The Ponemon Institute found that attacks are becoming more widespread as the number of keys and certificates deployed on infrastructure such as web servers, network appliances and cloud services has grown by 40% to almost 24,000 ...

Bee behaviour mapped by tiny trackers

A tiny new tracker designed to monitor bee behaviour is being tested by ecologists at Kew Gardens in London. It is made from off-the-shelf technology and is based on equipment used to track pallets in warehouses, said its creator Dr Mark O'Neill. Readers, used to pick up a signal from the kit, are connected to ...

Encryption not the way to tackle DStv: DOC

Government should make better use of regulatory tools and legislation to foster a more competitive environment in South Africa’s pay-television industry rather than requiring that conditional access technology be included in state-subsidised set-top boxes. That’s the view of Solly Mokoetle, the head of the digital migration project at the department of communications (DOC). “The issue ...

Encryption today: how safe is it really?

When checking your email over a secure connection, or making a purchase from an online retailer, have you ever wondered how your private information or credit card data is kept secure? Our information is kept away from prying eyes thanks to cryptographic algorithms, which scramble the message so no-one else can read it but its ...

New bugs uncovered in encryption software

New bugs in the widely used encryption software known as OpenSSL were disclosed on Thursday, though experts say do not pose a serious threat like the "Heartbleed" vulnerability in the same technology that surfaced a year ago. "Heartbleed" triggered panic throughout the computer industry when it was reported in April 2014. That bug forced dozens ...

Yahoo Rolls Out End-To-End Encryption For Email

Back in 2012 (pre-Snowden!), we wrote about why Google should encrypt everyone's emails using end-to-end encryption (inspired by a post by Julian Sanchez saying the same thing. Since then, securing private communications has become increasingly important. That's why we were happy to see Google announce that it was, in fact, working on a project to ...

Can software-based POS encryption improve PCI compliance?

In the wake of the recent Verizon report that shows that 80 percent are out of PCI DSS compliance between audits, some vendors are urging the PCI Council to consider approving software-based point-to-point encryption, in addition to the current hardware-based standard. PCI-approved, hardware-based P2PE allows merchants to drastically shrink the systems subject to compliance, reducing ...

Tired of forgetting your password? Yahoo says you don't need one any more

Passwords: easily forgotten, but also easily guessed. It’s a bitter irony that minutes can be spent racking brains trying to remember whether a required security question answer is a pet’s name, first school or place of birth – meanwhile a cyber-criminal is merrily typing in a person’s favourite colour and relieving bank accounts of hard-earned ...

Yahoo puts email encryption plugin source code up for review

Yahoo released the source code for a plugin that will enable end-to-end encryption of email messages, a planned data-security improvement prompted by disclosures of U.S. National Security Agency snooping. The company is asking security experts to look at its code, published on GitHub, and report vulnerabilities, wrote Alex Stamos, Yahoo’s chief information security officer, in ...

How Encryption Software Works in Enterprises'Data Leakage-proof?

For modern enterprises, the trend in information computerization’s development means the data is not only the assets, but is the reflection of enterprise’s core competitiveness. To make your enterprises remain invincible in the fierce business competition, you should protect the sensitive and key data of enterprise effectively. In reality, data leakage will lead to economic ...

Computer-stored encryption keys are not safe from side-channel attacks

Figure A: Tel Aviv University researchers built this self-contained PITA receiver. Not that long ago, grabbing information from air-gapped computers required sophisticated equipment. In my TechRepublic column Air-gapped computers are no longer secure, researchers at Georgia Institute of Technology explain how simple it is to capture keystrokes from a computer just using spurious electromagnetic side-channel ...

CIA spent last 10 years cracking Apple’s encryption

The CIA has been trying to crack Apple’s encryption for nearly 10 years. According to a report by The Intercept, the CIA began trying to crack Apple’s encryption in 2006 using funds from the “black budget.”  The researchers who worked on breaking down Apple’s privacy wall were purportedly based at Sandia National Laboratories. Although the ...

Encryption is gone, communications minister Muthambi restates

Government-provided set-top boxes for digital terrestrial television will not contain conditional access based on encryption, and prospective pay-television operators wanting to use such a system will have to deploy their own boxes to subscribers. That’s according to a statement, issued at the weekend by communications minister Faith Muthambi, in which she makes it clear that ...

Microsoft Windows also vulnerable to 'FREAK' encryption flaw

Computers running all supported releases of Microsoft Windows are vulnerable to "FREAK," a decade-old encryption flaw that leaves device users vulnerable to having their electronic communications intercepted when visiting any of hundreds of thousands of websites, including Whitehouse.gov, NSA.gov and FBI.gov. The flaw was previously thought to be limited to Apple's Safari and Google's Android ...

How to Encrypt Folder in “Encryption Year”?

Recently, the president of United States Barack Obama called himself “a firm believer of strong encryption” when he visited Silicon Valley. Although some people criticized Obama for vague statement, the actual networking environment is really worrying, and the data security is more of concern, so data encryption appears to be more important. That is someone ...

Samsung is still lying about the encryption on its Smart TVs

When news broke that Samsung’s Smart TV’s listened to conversations and sent them to a third-party server company, the Korean manufacturer countered by claiming that all data transmissions to and from its televisions were encrypted. When testing demonstrated that the data in question wasn’t encrypted (despite being sent via Port 443, which is typically used ...

Chinese Version of PC Monitor Expert Updated to Version 1.62

PC Monitor Expert is a trusted computer monitoring product. It can capture every keystroke, Chat, Instant Message, visited website, screenshot, running program, application and etc of the monitored computer. It can also block the use of any program, app, chatting software, downloading software or game software as you want. Once found opening a prohibited program, ...

DoGoodSoft Releases Best Folder Encryptor 16.75 with Higher Security

DoGoodSoft, one of the leading security software developers in China, offers better-in-class software for both individual and enterprise users at home and abroad. Recently, it released the latest version of its encryption software Best Folder Encryptor. In this new version, DoGoodSoft fixed certain bugs by which users will feel more security to protect their important ...

DoGoodSoft Updated Magic Timed Shutdown to Version 9.96

Professional PC auto-shutdown software-Magic Timed Shutdown is updated to version 9.96. In this version optimize software performance and fix a Bug. Latest Version Information of Magic Timed Shutdown: Version: V9.96 File Size: 4324KB Category: Timed Shutdown Software Language: English License Type: Trial Version Operating System(s): Win XP/Vista/7 Last Updated On: March 8th, 2012 Download:http: www.dogoodsoft.com/magic-timed-shutdown/free-download.html ...

Guard vital and private data on mobile devices with DoGoodSoft USB Encryptor

The latest Global Study on Mobility Risks shows that the phenomena of enterprises' introduction of mobile devices and employees’ carrying of mobile devices are overhead current enterprise security system and security policy. Websense also said that 51% of enterprise data leakage is caused by mobile devices. Besides, according to one research on IT persons offered ...

Luoyang Xiabing Software Technologies Ltd Recently Released Ace Secret Folder For Data Security

Ace Secret Folder is a kind of folder encryption software which makes your folder "secret" and invisible, providing strong shield to protect your important documents and privacy. It features four characters: completely invisible after installation, simple Hotkey invocation, folders disappearance after encryption and fast encryption and decryption. Features The program will become unseen and invisible ...

Meet New English Version of Ease Folder Guard

Dogoodsoft recently announces the release of the new version of Ease Folder Guard in English. Ease Folder Guard offers the professional and powerful features for protecting personal folders from prying eyes. Disk protection and other functions are included. Also, it is easy to operate. Ease Folder Guard protects folders in three different ways – password ...

Best Encryption Expert Will Be the Escort for Your Data Security

DoGoodSoft now recommends Best Encryption Expert – a perfect and easy-to-use application that combines file/folder encryption, folder protection, disk protection and other enhanced features. It had been acknowledged as the best choice for those who have the urgent need to protect data security. Best Encryption Expert encrypts files and folders in various ways. With advanced ...

DoGoodSoft Magic Timed Shutdown is a Good Helper for Parents and Managers

DoGoodSoft recommends its monitoring and control product, Magic Timed Shutdown, an advanced and powerful tool permitting you to schedule certain tasks for your computer. It is known for four major features—Timed Shutdown, PC Management, Timed Limit and Log Analysis, which make Magic Timed Shutdown be a very good helper for users, especially for parents and ...

USB Encryptor Shields Data on Portable Devices

It is small and light instead of clumsy. Data stored on flash drives is impervious to mechanical shock, magnetic fields, scratches and dust, plus they plug and unplug from the computer easily. These properties make flash drives suitable for transporting data from place to place and keeping the data readily at hand. USB flash drives ...

Can Anti-virus Software be Powerful

Whether you sit back and relax with your PC installed anti-virus software? Whether you believe and depend on it completely? If yes, you’re badly wrong. On May 18, 2007, the case of Norton manslaughter shocked the whole world. After Norton upgraded the virus database, it isolated and removed the system files netapi32.dll and Isasrv.dll of ...

Encryption Software Fight Against Malware

With the speedy development of technologies, as this trend going, data security becomes more and more significant. While enjoying a million merits and convenience technology brings, there is still one thing to consider, the networking and information security are growing to be a big concern. Allow me ask you one question: When mentioned data security, ...

加载更多