Featured
Iran blocks encrypted messaging apps amid nationwide protests

Iran blocks encrypted messaging apps amid nationwide protests

For the past six days, citizens have taken to the streets across Iran, protesting government oppression and the rising cost of goods. Video broadcasts from the country have shown increasingly intense clashes between protesters and riot police, with as many as 21 people estimated to have died since the protests began. But a complex fight is also raging online, as protesters look for secure channels where they can organize free of government interference. Even before the protest, Iran’s government blocked…

Read More Read More

Featured
What can I do if I forget the password for my encrypted files?

What can I do if I forget the password for my encrypted files?

To be safer, most people would like to protect their important files and folders by encrypting them with a password. While it’s very common for people to forget the password because they should remember many different passwords. If you choose Best Folder Encryptor to encrypt your files and folders, and you forgot the encryption password, what should you do? 1 Confirm Encryption Type There are five encryption types in Best Folder Encryptor – flash encryption, hiding encryption, diamond encryption, full…

Read More Read More

Featured
What if I want to use Best Folder Encryptor on another computer?

What if I want to use Best Folder Encryptor on another computer?

“I have used Best Folder Encryptor on my laptop for two years, now I want to use it on another computer. What can I do?” If you purchase a license of Best Folder Encryptor, you will receive a registration code, with which you can activate Best Folder Encryptor on one computer. While if you change a new computer, should you have to purchase a license again? Of course not. Then what should we do? In the new version of Best…

Read More Read More

Featured
It is difficult for the FBI to crack most smartphone encryption

It is difficult for the FBI to crack most smartphone encryption

The FBI is struggling to decode private messages on phones and other mobile devices that could contain key criminal evidence, and the agency failed to access data more than half of the times it tried during the last fiscal year, FBI Director Christopher Wray told House lawmakers. Wray will testify at the House Judiciary Committee Thursday morning on the wide range of issues the FBI faces. One of the issues hurting the FBI, he said, is the ability of criminals…

Read More Read More

Featured
Texas Church Shooting: More Calls for Encryption Backdoors

Texas Church Shooting: More Calls for Encryption Backdoors

US Deputy Attorney General, Rod Rosenstein, has decided to use the recent mass shooting at a Texas church to reiterate calls for encryption backdoors to help law enforcers. The incident took place at the First Baptist Church in Sutherland Springs, killing at least 26 people. Deceased suspect Devin Kelley’s mobile phone is now in the hands of investigators, but they can’t access it — a similar situation to the one following the mass shooting in San Bernardino which resulted in…

Read More Read More

Featured
Best Folder Encryptor Has Updated to Version 16.97

Best Folder Encryptor Has Updated to Version 16.97

The professional file and folder encryption software – Best Folder Encryptor has been updated to version 16.97. The new version fixed bug that the control board cannot be closed after a Flash- and Hiding-encrypted folder is opened because of misjudgment, made some improvements and optimization, and several minor bug fixes. For more details about Best Folder Encryptor, please read the following content. More about Best Folder Encryptor 16.97 File Name: Best Folder Encryptor Version: 16.97 File Size: 10.04MB Category: Folder…

Read More Read More

Featured
Three Defenses to Solve the Problem of Storing Password

Three Defenses to Solve the Problem of Storing Password

One of the biggest concerns around managing the passwords of an organization’s employees lies in how to store those passwords on a computer. Keeping every user’s password in a plain text file, for example, is too risky. Even if there are no bugs to recklessly leak the passwords to the console, there’s little to stop a disgruntled systems administrator taking a peek at the file for pleasure or profit. Another line of defense is needed. Let’s hash it out Back…

Read More Read More

Featured
Quantum Computing will not be able to crack Encryption Keys until the 2030s

Quantum Computing will not be able to crack Encryption Keys until the 2030s

In September, Satya Nadella announced that Microsoft is working on a quantum computer (QC) architecture. Since then, Intel also has announced it is working on a QC architecture. Microsoft and Intel join Alibaba, Google, IBM, Tencent and a host of academic and national research labs (including China, the European Commission, Russia and the US) in a quest to build working QC hardware and software that can solve real-world problems. What is quantum computing and why will it make a difference?…

Read More Read More

Featured
FBI couldn’t retrieve data from nearly 7000 mobile phones due to encryption

FBI couldn’t retrieve data from nearly 7000 mobile phones due to encryption

The head of the FBI has reignited the debate about technology companies continuing to protect customer privacy despite law enforcement having a search warrant. The FBI says it hasn’t been able to retrieve data from nearly 7000 mobile phones in less than one year, as the US agency turns up the heat on the ongoing debate between tech companies and law enforcement officials. FBI Director Christopher Wray says in the first 11 months of the fiscal year, US federal agents…

Read More Read More

Featured
Wi-Fi’s Most Popular Encryption May Have Been Cracked

Wi-Fi’s Most Popular Encryption May Have Been Cracked

Your home Wi-Fi might not be as secure as you think. WPA2 — the de facto standard for Wi-Fi password security worldwide — may have been compromised, with huge ramifications for almost all of the Wi-Fi networks in our homes and businesses as well as for the networking companies that build them. Details are still sketchy as the story develops, but it’s looking like a new method called KRACK — for Key Reinstallation AttaCK — is responsible. WPA stands for…

Read More Read More

Featured
North Korean Hackers Blamed for Bitcoin Attacks

North Korean Hackers Blamed for Bitcoin Attacks

North Korean state hackers are increasingly looking to steal crypto-currency to fund the regime and circumvent tightening sanctions, according to FireEye. The security vendor’s ‎senior cyber threat intelligence analyst, Luke McNamara, revealed a spike in spear-phishing attacks targeting South Korean Bitcoin exchanges since May. The timing is important because April saw the US announce increased economic sanctions against North Korea. “The spear-phishing we have observed in these cases often targets personal email accounts of employees at digital currency exchanges, frequently…

Read More Read More

Featured
Romanticizing Bugs Will Lead to Death of Information Security

Romanticizing Bugs Will Lead to Death of Information Security

Too much focus on vulnerabilities and their impact is leading information security into a slow death. Speaking in the keynote address at 44CON in London, security researcher Don A. Bailey said that while “we’re getting good at reducing problems and addressing problems, information security is dying a death it has earned.” Focusing on bugs and vulnerabilities, Bailey said that his initial perception of information security was about reducing risk for consumers, but that perception was “so off base as all…

Read More Read More

Featured
Four Things Businesses Should be Doing to Protect from Cyber-Attacks

Four Things Businesses Should be Doing to Protect from Cyber-Attacks

It’s a fact that every business needs to accept: everyone is at risk of a cyber-attack. What’s unfortunate is how many companies aren’t taking this seriously. There are a host of basic best practices that a majority of corporate networks are failing to implement, and it’s leaving them critically vulnerable. At the very minimum, there are four things every business should be doing to protect their online presence and to protect their customers from the fallout from a cyber-attack: instituting…

Read More Read More

Featured
Why You Need Private Browsing

Why You Need Private Browsing

If you thought browsing securely (and privately) was as easy as opening a new incognito window, think again. Private browsing is all the rage now that it’s necessary in order to access certain websites in some countries. Luckily, there are lots of ways to access the web that doesn’t require Safari, Firefox, or Chrome. There are also ways to surf the internet that aren’t actually secure at all — even if they’re advertised as such. The first step to tapping…

Read More Read More

Featured
French official begins anti-encryption campaign

French official begins anti-encryption campaign

This story was delivered to BI Intelligence Apps and Platforms Briefing subscribers. To learn more and subscribe, please click here. A French official plans to begin mobilizing a global effort — starting with Germany — against tech companies encrypting their messaging apps, according to Reuters. Messaging apps, such as Telegram and WhatsApp, that promote end-to-end encryption, are used by terrorists to organize attacks in Europe, the minister said. Although individual governments have previously explored seeking mandatory backdoors from tech companies,…

Read More Read More

Featured
FBI Chief Calls for National Talk Over Encryption vs. Safety

FBI Chief Calls for National Talk Over Encryption vs. Safety

SAN FRANCISCO — The FBI’s director says the agency is collecting data that he will present next year in hopes of sparking a national conversation about law enforcement’s increasing inability to access encrypted electronic devices. Speaking on Friday at the American Bar Association conference in San Francisco, James Comey says the agency was unable to access 650 of 5,000 electronic devices investigators attempted to search over the last 10 months. Comey says encryption technology makes it impossible in a growing…

Read More Read More

Featured
Google finally adds HSTS encryption to google.com

Google finally adds HSTS encryption to google.com

Google, known for its security practices, has finally brought HTTP Strict Transport Security (HSTS) to google.com to strengthen its data encryption. HSTS helps protect against eavesdroppers, man-in-the-middle attacks, and hijackers who attempt to spoof a trusted website. Chrome, Safari, and Internet Explorer all support HSTS. “HSTS prevents people from accidentally navigating to HTTP URLs by automatically converting insecure HTTP URLs into secure HTTPS URLs,” said Jay Brown, a senior technical program manager for security at Google, in a blog post….

Read More Read More

Featured
Hacker finds breach in WhatsApp’s encryption system

Hacker finds breach in WhatsApp’s encryption system

A security expert has found a breach in WhatsApp’s supposed ‘end-to-end’ encryption system. On earlier 2016, the Facebook-owned company proudly announced that messages would feature end-to-end encryption, thus giving users the tranquility that their private conversations would remain untouched. Jonathan Zdziarski, a digital forensic specialist and digital security expert, published an article on Thursday with bold declarations. He stated that WhatsApp does not really delete users’ messages. Zdziarski started several conversations on his WhatsApp account, using an iPhone. After a…

Read More Read More

Featured
Do anti-encryption Democrats see the importance of encryption now?

Do anti-encryption Democrats see the importance of encryption now?

One would certainly hope so after the turmoil that has followed the release of thousands of DNC emails by Wikileaks. But Democratic lawmakers in the past have worked to weaken encryption standards, demanding backdoors that they say can be used by law enforcement authorities to track terrorists, but also leave computers vulnerable to hackers. Consider CISA, a bill introduced to the Senate by California Democrat Dianne Feinstein. Despite near-unanimous expert testimony opposing the bill, along with a vocal public outcry,…

Read More Read More

Featured
Facebook to add end-to-end encryption to Messenger app

Facebook to add end-to-end encryption to Messenger app

Facebook has started to introduce a setting to its “Messenger” app that provides users with end-to-end encryption, meaning messages can only be read on the device to which they were sent. The encrypted feature is currently only available in a beta form to a small number of users for testing, but it will become available to all of its estimated 900-million users by late summer or in the fall, the social media giant said. The feature will be called “secret…

Read More Read More

Featured
Full disk encryption flaw could affect millions of Android users

Full disk encryption flaw could affect millions of Android users

When it comes to vulnerabilities and security, Google’s Android has never been in the good books of security experts or even its users to a great extent. Now, another vulnerability has surfaced that claims to leave millions of devices affected. Security expert Gal Beniamini has now revealed another flaw in Android encryption. According to the DailyMail, the security researcher has said that Android devices with full disk encryption and powered by Qualcomm processors are at risk of brute force attacks…

Read More Read More

Featured
US wiretap operations encountering encryption fell in 2015

US wiretap operations encountering encryption fell in 2015

The US government has been very vocal recently about how the increase in encryption on user devices is hampering their investigations. The reality is that according to a report from the Administrative Office of U.S. Courts, law enforcement with court-ordered wiretaps encountered fewer encrypted devices in 2015 than in 2014. In regards to encrypted devices, the reports states: “The number of state wiretaps in which encryption was encountered decreased from 22 in 2014 to seven in 2015. In all of…

Read More Read More

Featured
Supreme Court rejects PIL for WhatsApp ban, but encryption debate is just beginning

Supreme Court rejects PIL for WhatsApp ban, but encryption debate is just beginning

WhatsApp’s end-to-end encryption might still be a contentious issue, but on Wednesday the Supreme Court refused to allow a PIL seeking a ban on the popular app and similar messenger services. The PIL, filed by Gurugram-based RTI activist Sudhir Yadav, said these apps have complete encryption, which poses a threat to the country’s security. A bench of Chief Justice T S Thakur and Justice A M Khanwilkar rejected the PIL, suggesting Yadav could approach the government or Telecom Regulatory Authority…

Read More Read More

Featured
Greedy Bart ransomware encrypts files in ZIP archives

Greedy Bart ransomware encrypts files in ZIP archives

A new ransomware threat known as Bart is experimenting with the price it charges victims and encryption strategies. If your PC is infected by Bart you will be asked to pay three Bitcoin (BTC) or just under $2,000 to regain access to your files, which is significantly more than the usual 0.5 BTC ($300) to 1.5 BTC fee. Also, you won’t get a decryption key, but rather a password that opens password-protected ZIP archives, where the files of Bart-infected machines…

Read More Read More

Featured
Russia encryption grab may require chat backdoors as standard

Russia encryption grab may require chat backdoors as standard

MOOTED LEGAL CHANGES in Russia may apply a boot to the face of open and private chat messaging services and create a very cold winter for communications. Reports from the country said that plans to require backdoors in otherwise encrypted chat services are quite advanced and will launch with a mandatory status. Russia is often accused of messing with internet liberties, but before we get on our high horse we should remember that this is exactly the kind of ambrosia…

Read More Read More

Featured
Apple to expand encryption on Macs

Apple to expand encryption on Macs

Apple is amping up its commitment to encryption. The company is beginning the first major overhaul of the Mac filing system — the way it stores files on the hard drive — in more than 18 years. The move was quietly announced during a conference break out session after Apple’s blockbuster unveiling of its new operating system MacOS Sierra. Amidst other new features, including the ability to place timestamps on files accurate to fractional seconds and a more efficient mechanism…

Read More Read More

Featured
Apple Echoes Commitment to Encryption after Orlando Shooting

Apple Echoes Commitment to Encryption after Orlando Shooting

Apple used the kickoff of its Worldwide Developers Conference Monday to reaffirm the company’s stance on encryption and data monetization, one day after the most deadly mass shooting in U.S. history threatened to rekindle the debate surrounding the use of the technology. “In every feature that we do, we carefully consider how to protect your privacy,” Apple senior vice president of software engineering Craig Federighi told conference attendees in San Francisco Monday. Federighi said that includes the Cupertino-based company’s commitment…

Read More Read More

Featured
Amazon is going to remove encryption capabilities of its Kindle Fire, Rumours says Apple & FBI Case is reason – Lansing Technology Time

Amazon is going to remove encryption capabilities of its Kindle Fire, Rumours says Apple & FBI Case is reason – Lansing Technology Time

According to Amazon, Removing Kindle Fire,Fire OS 5’s onboard encryption is not a new development, and it’s not related to the iPhone fight Amazon said that the Fire OS 5 update removed local device encryption support for the Kindle Fire, Fire Phone, Amazon Fire HD, or Amazon Fire TV Stick was because the feature simply wasn’t being used. Privacy advocates and some users criticized the move, which came to light on Thursday even as Apple Inc was waging an unprecedented…

Read More Read More

Featured
UK’s lower house eases up on encryption

UK’s lower house eases up on encryption

The United Kingdom’s House of Commons approved far-reaching authority for spy agencies to access cyber data Tuesday, but pulled back some restrictions on encryption opposed by Apple and Facebook. The so-called “snooper’s charter,” officially the Investigatory Power Act, codifies intelligence agencies’ use of metadata analysis and malware to hack computers that has been ongoing in the U.K. It requires communications companies to maintain records of customers’ web browsing for a full year to assist investigations. But the final version eased…

Read More Read More

Featured
Customer Headaches Could Curtail Apple’s Encryption Push

Customer Headaches Could Curtail Apple’s Encryption Push

At an event held during Apple’s fight with the FBI over whether it should help unlock a dead terrorist’s iPhone, CEO Tim Cook promised “We will not shrink” from the responsibility of protecting customer data —including from government overreach. Yet the obvious next step for the company could be hard to take without inconveniencing customers. Apple is currently able to read the contents of data stored in its iCloud backup service, something at odds with Cook’s claims that he doesn’t…

Read More Read More

Featured
HelpSystems Fills Encryption Gap With Linoma Buy

HelpSystems Fills Encryption Gap With Linoma Buy

Despite all the IBM i security vendors that HelpSystems has bought over the years–and there have been at least five of them–the company has lacked one key security capability valued by enterprises: encryption. With last week’s deal to acquire Linoma Software, the Minneapolis software vendor has finally obtained that encryption capability for IBM i. HelpSystems has been experiencing heavy demand for IBM i encryption capabilities, says CEO Chris Heim. “I wouldn’t say we lost sales because of it, but we…

Read More Read More

Featured
Is Facebook making end-to-end encryption on Messenger opt-in only?

Is Facebook making end-to-end encryption on Messenger opt-in only?

Facebook’s native chat is due to be silenced: Facebook’s reportedly going to kill it off, forcing users to instead use Messenger. Rumor has it that Facebook Messenger will also offer the option of end-to-end encryption sometime in the next few months. The Guardian, relying on input from three unnamed sources close to the project, earlier this week reported the end-to-end encryption news. Facebook hasn’t confirmed it, declining to comment on rumors or speculation. The timing of these two things isn’t…

Read More Read More

Featured
Despite end-to-end encryption, your WhatsApp and Telegram chats can be spied on

Despite end-to-end encryption, your WhatsApp and Telegram chats can be spied on

Even though WhatsApp promises end-to-end encryption on all of its chats, and Telegram offers end-to-end encryption on secret chats, the truth is that messages on these platforms can still be hacked. The reason is because the messaging apps still rely on phone networks that use Signalling System No. 7, better known as SS7. You might recall that back in April, we told you about SS7 when we passed along a story shown on 60 Minutes about hacking. SS7 is a…

Read More Read More

Featured
​Symantec warns encryption and privacy are not the same

​Symantec warns encryption and privacy are not the same

“Encryption and privacy is not the same thing,” said Nick Savvides, Symantec APAC cybersecurity strategy manager. Encryption is a privacy “enhancing tool”, Savvides went on to explain, while privacy is more about handling what information is collected, how the collected information is handled, and what other data can be derived from it. The two are often confused because they are related: Encryption is used to maintain privacy. Savvides said that unfortunately most websites do not use encryption, highlighting the company’s…

Read More Read More

Featured
Allo doesn’t offer default end-to-end encryption setting because it would disable Google Assistant

Allo doesn’t offer default end-to-end encryption setting because it would disable Google Assistant

When Google unveiled Allo — their smart messaging app coming soon to Android and iOS — one of the more interesting features they revealed was end-to-end encryption. As we later learned, the technology powering Allo’s end-to-end encryption was built upon Signal Protocol, the same open-source protocol from Open Whisper Systems that WhatsApp currently uses. We’ve known since the announcement that E2E encryption was a feature of Allo’s Incognito mode, but now Ars Technica has confirmed exactly why this is the…

Read More Read More

Featured
Google engineer says he’ll push for default end-to-end encryption in Allo

Google engineer says he’ll push for default end-to-end encryption in Allo

After Google’s decision not to provide end-to-end encryption by default in its new chat app, Allo, raised questions about the balance of security and effective artificial intelligence, one of the company’s top security engineers said he’d push for end-to-end encryption to become the default in future versions of Allo. Allo debuted with an option to turn on end-to-end encryption, dubbed “incognito mode.” Google obviously takes security seriously, but had to compromise on strong encryption in Allo in order for its…

Read More Read More

Featured
OSGP custom RC4 encryption cracked yet again

OSGP custom RC4 encryption cracked yet again

The Open Smart Grid Protocol’s (OSGP) home-grown RC4 encryption has been cracked once again. The easy-to-break custom RC4 was cracked last year. A year ago, the OSGP Alliance advised that better security would be implemented, but the RC4 still remains according to German researchers Linus Feiten and Matthias Sauer. Feiten and Sauer claim to have the ability to extract the secret key used in the OSGP’s RC4 stream cipher. “Our new method comprises the modification of a known attack exploiting…

Read More Read More

Featured
John McAfee claims to have hacked WhatsApp’s encrypted messages, but the real story could be different

John McAfee claims to have hacked WhatsApp’s encrypted messages, but the real story could be different

Last month, WhatsApp enabled end-to-end encryption for its billion users to secure all the communications made between users — be it a group chat, voice calls, personal chats or the photos and videos that are being shared. While WhatsApp says it is difficult even for them to access the conversations, cybersecurity expert John McAfee and his team of four hackers claim to successfully read an encrypted WhatsApp message, Cybersecurity Ventures reports. While it sounds like a bold claim, the real…

Read More Read More

Featured
Legal effects of encryption bills discussed at dark web event

Legal effects of encryption bills discussed at dark web event

An attorney who has worked for the U.S. Army and the Central Intelligence Agency discussed attempts to regulate encryption technologies at the Inside Dark Web conference in New York City on Thursday. “State legislative response may be un-Constitutional, because it would place a burden on interstate commerce,” said Blackstone Law Group partner Alexander Urbeis. “So they may, in fact, be a way to encourage the federal government to enact encryption legislation.” Several states, including California, Louisiana, and New York, have…

Read More Read More

Featured
American ISIS Recruits Down, but Encryption Is Helping Terrorists’Online Efforts, Says FBI Director

American ISIS Recruits Down, but Encryption Is Helping Terrorists’Online Efforts, Says FBI Director

The number of Americans traveling to the Middle East to fight alongside Islamic State has dropped, but the terrorist group’s efforts to radicalize people online is getting a major boost from encryption technology, FBI Director James Comey said Wednesday. Since August, just one American a month has traveled or attempted to travel to the Middle East to join the group, compared with around six to 10 a month in the preceding year and a half, Mr. Comey told reporters in…

Read More Read More

Featured
Users’interest should drive encryption policy: IAMAI

Users’interest should drive encryption policy: IAMAI

Encryption is a fundamental and necessary tool to safeguard digital communication infrastructure but the interests of Internet users should be foremost in framing any policy, the Internet and Mobile Association of India (IAMAI) said here on Tuesday. “Trust, convenience and confidence of users are the keywords to designing an ideal encryption policy that will help in getting more people online with safe and secured internet platforms,” said IAMAI president Subho Ray. The association, which has published a discussion paper on…

Read More Read More

Featured
The encryption challenge

The encryption challenge

IT managers know the movies get it wrong. A teenager with a laptop cannot crack multiple layers of encryption — unless that laptop is connected to a supercomputer somewhere and the teenager can afford to wait a few billion years. Encryption works. It works so well that even the government gets stymied, as demonstrated by the lengths to which the FBI went to access an iPhone used by one of the San Bernardino, Calif., shooters. So in the face of…

Read More Read More

Featured
ON ENCRYPTION: THERE ARE NO LOCKS ONLY “ANGELS” CAN OPEN

ON ENCRYPTION: THERE ARE NO LOCKS ONLY “ANGELS” CAN OPEN

Despite the FBI dropping its case against Apple over whether or not the tech giant should supply the government agency with the ability to hack into the San Bernardino shooter’s iPhone, the argument over how our devices — especially our phones — should be encrypted continues to rage on. And regardless of how you feel about the issue, almost everybody agrees that the debate can be pretty murky, as privacy vs. protection debates usually are. To make the whole argument…

Read More Read More

Featured
Moot point: Judge closes iPhone encryption case in Brooklyn

Moot point: Judge closes iPhone encryption case in Brooklyn

The United States Justice Department said on Friday that it has withdrawn a request compelling Apple Inc to cooperate in unlocking an iPhone related to a drug case in NY following a third-party providing a passcode to the authorities to access the handset. “An individual provided the department with the passcode to the locked phone at issue in the Eastern District of New York”, Justice Department spokesman Marc Raimondi said in a statement. On Friday, the Justice Department told a…

Read More Read More

Featured
FBI: Encryption increasing problem

FBI: Encryption increasing problem

The FBI is facing an increasing struggle to access readable information and evidence from digital devices because of default encryption, a senior FBI official told members of Congress at a hearing on digital encryption Tuesday. Amy Hess said officials encountered passwords in 30 percent of the phones the FBI seized during investigations in the last six months, and investigators have had “no capability” to access information in about 13 percent of the cases. “We have seen those numbers continue to…

Read More Read More

Featured
How Apple makes encryption easy and invisible

How Apple makes encryption easy and invisible

Do you know how many times a day you unlock your iPhone? Every time you do, you’re participating in Apple’s user-friendly encryption scheme. Friday, the company hosted a security “deep dive” at which it shared some interesting numbers about its security measures and philosophy as well as user habits. To be honest, we’re less concerned with how Apple’s standards work than the fact that they do and will continue to. But that’s kind of the point behind the whole system…

Read More Read More

Featured
Apple, FBI set to resume encryption fight at House hearing

Apple, FBI set to resume encryption fight at House hearing

The encryption battle between Apple and the FBI is moving from the courtroom to Congress next week. Representatives from the tech titan and the federal law enforcement agency are scheduled to testify Tuesday before the House Energy and Commerce Committee about the debate over how the use of encryption in tech products and services hampers law enforcement activities. In February, Apple clashed with the FBI over whether the company would help investigators hack into the encrypted iPhone of San Bernardino…

Read More Read More

Featured
Feinstein encryption bill sets off alarm bells

Feinstein encryption bill sets off alarm bells

A draft version of a long-awaited encryption bill from Sens. Dianne Feinstein, D-Calif., and Richard Burr, R-N.C., was leaked online last week, and the technology industry is already calling foul. The bill requires any company that receives a court order for information or data to “provide such information or data to such government in an intelligible format” or to “provide such technical assistance as is necessary to obtain such information or data in an intelligible format.” It doesn’t specify the…

Read More Read More

Featured
“Petya” ransomware encryption cracked

“Petya” ransomware encryption cracked

Utility generates unscrambling key. Users whose data has been held to ransom by the Petya malware now have an option to decrypt the information, thanks to a new tool that generates an unscrambling key. Petya appeared around March this year. Once executed with Windows administrator privileges, Petya rewrites the master boot record on the computer’s hard drive, crashes the operating system and on restart, scrambles the data on the disk while masquerading as the CHKDSK file consistency utility. The Petya…

Read More Read More

Featured
WhatsApp’s encryption services are legal for now, but maybe not for long

WhatsApp’s encryption services are legal for now, but maybe not for long

WhatsApp introduced end-to-end encryption for all its services today. This means that all user calls, texts, video, images and other files sent can only be viewed by the intended recipient, and no one, not even WhatsApp itself, can access this data. This guarantee of user privacy creates new concerns for the government. WhatsApp will now find it impossible to comply with government requests for data, since WhatsApp itself will not have the decryption key. In effect, WhatsApp is doing exactly…

Read More Read More

Featured
Brooklyn case takes front seat in Apple encryption fight

Brooklyn case takes front seat in Apple encryption fight

The Justice Department said Friday it will continue trying to force Apple to reveal an iPhone’s data in a New York drug case, putting the Brooklyn case at the center of a fight over whether a 227-year-old law gives officials wide authority to force a technology company to help in criminal probes. The government told U.S. District Judge Margo K. Brodie in Brooklyn that it still wants an order requiring Apple’s cooperation in the drug case even though it recently…

Read More Read More

Featured
How to encrypt iPhone and Android, and why you should do it now

How to encrypt iPhone and Android, and why you should do it now

Apple’s fight with the FBI may be over for the time being, but this high-profile fight about user privacy and state security may have puzzled some smartphone users. When is an iPhone or Android device encrypted? And how does one go about securing the data on them? iPhone It’s pretty simple actually: as long as you set up a password or PIN for the iPhone or iPad’s lockscreen, the device is encrypted. Without knowing the access code, nobody can unlock…

Read More Read More

Featured
Forget iPhone encryption, the FBI can’t legally touch the software ISIS uses

Forget iPhone encryption, the FBI can’t legally touch the software ISIS uses

The FBI insists that encrypted products like the iPhone and encrypted online services will put people in harm’s way, especially in light of the ISIS-connected San Bernardino shooting late last year. That’s why the Bureau has been arguing for encryption backdoors that would be available to law enforcement agencies, and why it looked to coerce Apple to add a backdoor to iOS. However, extensive reports that show the preparations ISIS made before hitting Paris and Brussels revealed the kind of…

Read More Read More

Featured
How the FBI Cracked the iPhone Encryption and Averted a Legal Showdown With Apple

How the FBI Cracked the iPhone Encryption and Averted a Legal Showdown With Apple

An urgent meeting inside FBI headquarters little more than a week ago is what convinced federal law enforcement officials that they may be able to abandon a brewing legal fight with tech giant Apple, sources told ABC News today. In the days after the December 2015 massacre in San Bernardino, California, which killed 14 people and wounded 22 others, the iPhone left behind by one of the shooters, Syed Farook, was secretly flown to the FBI’s laboratory in Quantico, Virginia,…

Read More Read More

Featured
FBI Hacks iPhone, Ending Apple Encryption Challenge

FBI Hacks iPhone, Ending Apple Encryption Challenge

The Department of Justice said in a federal court filing Monday that it had bypassed encryption on the iPhone 5c used by a terrorist in a mass shooting last year in California and requested the court vacate its order compelling Apple to assist it in accessing the device. The filing effectively ends a contentious legal battle between the federal government and Apple over the phone used by Syed Rizwan Farook. Farook was fatally shot by authorities along with his wife,…

Read More Read More

Featured
Why few hackers are lining up to help FBI crack iPhone encryption

Why few hackers are lining up to help FBI crack iPhone encryption

When the FBI said it couldn’t unlock the iPhone at the center of the San Bernardino shooting investigation without the help of Apple, the hackers at DriveSavers Data Recovery took it as a challenge. Almost 200 man hours and one destroyed iPhone later, the Bay Area company has yet to prove the FBI wrong. But an Israeli digital forensics firm reportedly has, and the FBI is testing the method. Finding a solution to such a high-profile problem would be a…

Read More Read More

Featured
Apple-FBI fight may be first salvo in encryption war

Apple-FBI fight may be first salvo in encryption war

The Apple-FBI fight may just be the opening salvo in a broader war over encryption, as technology companies continue to lock up their users’ messages, photos and other data to shield them from thieves and spies — and, incidentally, criminal investigators. WhatsApp, the globally popular messaging system owned by Facebook, has already run into trouble on this front in Brazil. WhatsApp encrypts all user messages in “end to end” fashion, meaning no one but the sender and recipient can read…

Read More Read More

Featured
Debate over tech tools’encryption

Debate over tech tools’encryption

Before the San Bernardino terror attack, Syed Rizawan Farook’s iPhone was just one fancy Apple device among hundreds of millions worldwide. But since the California government worker and his wife shot and killed 14 people on December 2, apparently inspired by extremist group IS, his iPhone 5c has become a key witness – and the government wants Apple to make it talk. The iPhone, WhatsApp, even social media – government authorities say some of tech fans’ favourite playthings are also…

Read More Read More

Featured
Google closing in on target of full encryption

Google closing in on target of full encryption

Google is disclosing how much of the traffic to its search engine and other services is being protected from hackers as part of its push to encrypt all online activity. Encryption shields 77 percent of the requests sent from around the world to Google’s data centers, up from 52 percent at the end of 2013, according to company statistics released Tuesday. The numbers cover all Google services except its YouTube video site, which has more than 1 billion users. Google…

Read More Read More

Featured
Take a stand against the Obama/FBI anti-encryption charm offensive

Take a stand against the Obama/FBI anti-encryption charm offensive

It has been frustrating to watch as the horrific San Bernardino terrorist killing spree has been used as a cover by the FBI to achieve the anti-encryption goals they’ve been working towards for years. Much of that frustration stems from the fact that the American media has so poorly reported the facts in this case. The real issue in play is that the FBI wants backdoor access to any and all forms of encryption and is willing to demonize Apple…

Read More Read More

Featured
Obama: ‘Absolutist view’ on encryption not answer

Obama: ‘Absolutist view’ on encryption not answer

President Barack Obama said Friday that the encryption versus national security debate, currently being played out in Apple’s legal fight against the federal government, won’t be settled by taking an “absolutist view.” Addressing an audience of tech enthusiasts meeting in the Texas capital, Obama said both values are important. He restated his commitment to strong encryption, but also asked how will government catch child pornographers or disrupt terrorist plots if smartphones and other electronic devices are made ways that keep…

Read More Read More

Featured
Government says Apple arguments in encryption case a “diversion”, presents point-by-point rebuttal

Government says Apple arguments in encryption case a “diversion”, presents point-by-point rebuttal

As the Apple vs. FBI encryption debate heats up in California, the U.S. government on Thursday fired back at Apple’s oppositions to a court order compelling its assistance in an FBI investigation, and in a new motion discounted a number of arguments related to supposed backdoors, “master keys,” the All Writs Act and more. In its letter in support of a federal magistrate judge’s original order to compel Apple’s help in unlocking an iPhone used by San Bernardino terror suspect…

Read More Read More

Featured
New FBI strategy wins back lost ground in encryption fight

New FBI strategy wins back lost ground in encryption fight

By July 2015, FBI Director Jim Comey knew he was losing the battle against sophisticated technologies that allowed criminals to communicate without fear of government surveillance. In back-to-back congressional hearings that month, Comey struggled to make the case that terrorists and crooks were routinely using such encryption systems to evade the authorities. He conceded that he had no real answer to the problem and agreed that all suggested remedies had major drawbacks. Pressed for specifics, he couldn’t even say how…

Read More Read More

Featured
No room for compromise in Apple vs FBI iPhone encryption battle

No room for compromise in Apple vs FBI iPhone encryption battle

As Apple’s legal battle with the FBI over encryption heads toward a showdown, there appears little hope for a compromise that would placate both sides and avert a divisive court decision. The FBI is pressing Apple to develop a system that would allow the law enforcement agency to break into a locked iPhone used by one of the San Bernardino attackers, a demand the tech company claims would make all its devices vulnerable. In an effort to break the deadlock,…

Read More Read More

Featured
Amazon Dropping Fire Encryption Has Nothing to Do With Apple

Amazon Dropping Fire Encryption Has Nothing to Do With Apple

Today, several reports pointed out that Amazon’s Fire OS 5 does not support device encryption, drawing a connection between the company’s encryption retreat and the current Apple-FBI iPhone unlocking fracas. But Amazon’s decision to remove Fire OS 5’s onboard encryption is not a new development, and it’s not related to the iPhone fight. The real question at hand is why Amazon decided to roll back encryption protection for consumers all on its own. Introduced last fall, Amazon’s Fire OS 5…

Read More Read More

Featured
U.S.Defense Secretary Ashton Cater Doesn’t Believe in Encryption Backdoors

U.S.Defense Secretary Ashton Cater Doesn’t Believe in Encryption Backdoors

Secretary of Defense Ashton Carter came out against supporting encryption back-doors at a conference panel on Wednesday. At the RSA information security conference in San Francisco, Carter told a packed room that he supported strong encryption and thought back-door access to encrypted communication as unrealistic. During his talk on the Apple vs. FBI case, which he shied away from the details because it is a “law enforcement issue,” Carter received scattered applause from the crowd of security professionals after he…

Read More Read More

Featured
Apple’s rivals wary of taking stand on encryption issue, against the FBI

Apple’s rivals wary of taking stand on encryption issue, against the FBI

As Apple resists the US government in a high profile stand-off over privacy, rival device makers are, for now, keeping a low profile. Most are Asian companies — the region produces eight of every 10 smartphones sold around the world — and operate in a complex legal, political and security landscape. Only China’s Huawei has publicly backed Apple CEO Tim Cook in his fight to resist demands to unlock an encrypted iPhone belonging to one of those who went on…

Read More Read More

Featured
Encryption is Not a Threat to Our Safety, But Political Correctness is

Encryption is Not a Threat to Our Safety, But Political Correctness is

The legal battle between Apple, Inc and the US government has no sign of abating. Tim Cook, CEO of Apple, indicated that he is willing to fight the US government all the way to the Supreme Court. Apple Inc. just upped the ante by announcing that its engineers are working on new iPhone security features, which would make the iphone almost impossible to hack into by the company itself or government agencies. On the other hand, many government officials and…

Read More Read More

Featured
Apple and FBI to testify before Congress next week over encryption

Apple and FBI to testify before Congress next week over encryption

Over the past few days, Apple has made it abundantly clear that it will not comply with the FBI’s demand that it write a new piece of software to help bypass built-in iPhone security measures. On the contrary, Apple has said that it wants the FBI to withdraw all of its demands while adding that the only way to move forward is to form a commission of experts on intelligence, technology, and civil liberties to discuss “the implications for law…

Read More Read More

Featured
Apple CEO defends position in encryption dispute with feds

Apple CEO defends position in encryption dispute with feds

Apple CEO Tim Cook said in an interview Wednesday it was a tough decision to resist a court order directing the tech giant to override security features on the iPhone used by one of the San Bernardino gunmen who killed 14 people in a December terror attack. However, Cook reiterated to ABC News in his first interview since the controversy erupted last week that if his company complied with the FBI’s demand to unlock Syed Rizwan Farook’s encrypted phone it…

Read More Read More

Featured
Why Canada isn’t having a policy debate over encryption

Why Canada isn’t having a policy debate over encryption

The legal saga between Apple and the FBI has thrust encryption into the government’s policy spotlight again – but only if you live in the United States. In Canada, you could be excused for not knowing such a debate exists . Ever since FBI director James Comey characterized the rising tide of encrypted data as “going dark” in an October, 2014 speech, American civil liberties groups, cryptographers, private companies and politicians have argued ceaselessly about encryption’s merits and the dangers…

Read More Read More

Featured
Mark Zuckerberg Defends Apple’s Stance On Encryption

Mark Zuckerberg Defends Apple’s Stance On Encryption

The real battle for data encryption on our mobile devices has heated up considerably over the past few weeks and is looking to come to a boil relatively soon as tech companies and industry moguls alike join Apple in its defense of encryption. This all began way back in 2013 when Edward Snowden became the whistleblower on the US government’s PRISM domestic spying program, revealing that our mobile devices might be feeding the government more information than anyone had thought…

Read More Read More

Featured
San Bernardino victims to oppose Apple on iPhone encryption

San Bernardino victims to oppose Apple on iPhone encryption

Some victims of the San Bernardino attack will file a legal brief in support of the U.S. government’s attempt to force Apple Inc to unlock the encrypted iPhone belonging to one of the shooters, a lawyer representing the victims said on Sunday. Stephen Larson, a former federal judge who is now in private practice, told Reuters that the victims he represents have an interest in the information which goes beyond the Justice Department’s criminal investigation. “They were targeted by terrorists,…

Read More Read More

Featured
What Tim Cook doesn’t want to admit about iPhones and encryption

What Tim Cook doesn’t want to admit about iPhones and encryption

When Hillary Clinton called for a “Manhattan-like project” to find a way for the government to spy on criminals without undermining the security of everyone else’s communications, the technology world responded with mockery. “Also we can create magical ponies who burp ice cream while we’re at it,” snarked prominent Silicon Valley investor Marc Andreessen. Clinton’s idea “makes no sense,” added Techdirt’s Mike Masnick, because “backdooring encryption means that everyone is more exposed to everyone, including malicious hackers.” It’s an argument…

Read More Read More

Featured
Google CEO Pichai Lends Apple Support on Encryption

Google CEO Pichai Lends Apple Support on Encryption

Google Chief Executive Sundar Pichai lent support to Apple Inc.’s  pushback against a federal order to help law enforcement break into the locked iPhone of an alleged shooter in the San Bernardino, Calif., attacks. Mr. Pichai wrote on Twitter on Wednesday that “forcing companies to enable hacking could compromise users’ privacy.” A federal judge Tuesday ordered Apple to enable investigators to bypass the passcode of the iPhone once used by alleged shooter Syed Rizwan Farook. Apple CEO Tim Cook wrote…

Read More Read More

Featured
Here’s why the FBI forcing Apple to break into an iPhone is a big deal

Here’s why the FBI forcing Apple to break into an iPhone is a big deal

When U.S. Magistrate Sheri Pym ruled that Apple must help the FBI break into an iPhone belonging to one of the killers in the San Bernardino, Calif., shootings, the tech world shuddered. Why? The battle of encryption “backdoors” has been longstanding in Silicon Valley, where a company’s success could be made or broken based on its ability to protect customer data. The issue came into the spotlight after Edward Snowden disclosed the extent to which technology and phone companies were…

Read More Read More

Featured
Encryption May Hurt Surveillance, but Internet Of Things Could Open New Doors

Encryption May Hurt Surveillance, but Internet Of Things Could Open New Doors

Tech companies and privacy advocates have been in a stalemate with government officials over how encrypted communication affects the ability of federal investigators to monitor terrorists and other criminals. A new study by Harvard’s Berkman Center for Internet and Society convened experts from all sides to put the issue in context. The report concluded that information from some apps and devices like smartphones may be harder for government investigators to intercept because of stronger encryption. But, it said, we are…

Read More Read More

Featured
Weak email encryption laws put Aussie consumers at risk of fraud

Weak email encryption laws put Aussie consumers at risk of fraud

A consumer alert issued by Victoria’s Legal Services Commissioner a few weeks ago raised, to our mind, an old and curious issue. Why aren’t Australian professionals required to secure their email? Eighteen years ago, Victoria’s Law Institute Journal carried an excellent feature article on the ease with which email can be forged, the fact that it was already happening and the gold standard technology for mitigating the risk, digital signatures and encryption. We have to say it was excellent, since…

Read More Read More

Featured
Top senator: Encryption bill may “do more harm than good”

Top senator: Encryption bill may “do more harm than good”

Legislating encryption standards might “do more harm than good” in the fight against terrorism, Senate Homeland Security Committee Chairman Ron Johnson (R-Wis.) said on Thursday. In the wake of the terrorist attacks in Paris and San Bernardino, Calif., lawmakers have been debating whether to move a bill that would force U.S. companies to decrypt data for law enforcement. “Is it really going to solve any problems if we force our companies to do something here in the U.S.?” Johnson asked…

Read More Read More

Featured
McCaul: US playing ‘catchup’ to terrorists using encryption

McCaul: US playing ‘catchup’ to terrorists using encryption

The U.S. is playing “catchup” with terrorists and cyber vigilantes who coordinate via encrypted communications, according to the chairman of the House Homeland Security Committee. “Today’s digital battlefield has many more adversaries that just nation states,” Rep. Michael McCaul (R-Texas) said in a Tuesday column for Bloomberg. “Terrorist groups such as ISIS [the Islamic State in Iraq and Syria], as well as hacktivists … are adept at using encryption technologies to communicate and carry out malicious campaigns, leaving America to play…

Read More Read More

Featured
Half-Measures on Encryption Since Snowden

Half-Measures on Encryption Since Snowden

When the NSA subcontractor Edward Snowden released classified documents in June 2013 baring the U.S. intelligence community’s global surveillance programs, it revealed the lax attention to privacy and data security at major Internet companies like Apple, Google, Yahoo, and Microsoft. Warrantless surveillance was possible because data was unencrypted as it flowed between internal company data centers and service providers. The revelations damaged technology companies’ relationships with businesses and consumers. Various estimates pegged the impact at between $35 billion and $180…

Read More Read More

Featured
AT&T CEO won’t join Tim Cook in fight against encryption backdoors

AT&T CEO won’t join Tim Cook in fight against encryption backdoors

US politicians have been urging tech companies to weaken the security of smartphones and other products by inserting encryption backdoors that let the government access personal data. Numerous tech companies—including Apple—have come out strongly against the idea, saying that encryption backdoors would expose the personal data of ordinary consumers, not just terrorists. But tech company leaders aren’t all joining the fight against the deliberate weakening of encryption. AT&T CEO Randall Stephenson said this week that AT&T, Apple, and other tech…

Read More Read More

Featured
Cisco Security Report: Dwell time and encryption security struggles

Cisco Security Report: Dwell time and encryption security struggles

The 2016 Cisco Security Report highlighted the duality of cybersecurity and described a number of issues, including encryption security and dwell time as a constant struggle between threat actors looking for more effective and efficient attack techniques and security providers responding to those changes. One of the statistics in the report that could have been spun as a net positive for Cisco was that since May, Cisco reduced the median time to detection (or dwell time) of known threats on…

Read More Read More

Featured
British voice encryption protocol has massive weakness, researcher says

British voice encryption protocol has massive weakness, researcher says

A protocol designed and promoted by the British government for encrypting voice calls has a by-design weakness built into it that could allow for mass surveillance, according to a University College London researcher. Steven Murdoch, who works in the university’s Information Security Research Group, analyzed a protocol developed by CESG, which is part of the spy agency GCHQ. The MIKEY-SAKKE (Multimedia Internet KEYing-Sakai-KasaharaKey Encryption) protocol calls for a master decryption key to be held by a service provider, he wrote…

Read More Read More

Featured
There is no ‘compromise’ in encryption debate between Silicon Valley and government leaders

There is no ‘compromise’ in encryption debate between Silicon Valley and government leaders

During last night’s democratic debate we were once again inundated with calls from politicians who sought compromise from Silicon Valley in its on-going battle with terrorism. Encryption was the point of contention. The candidates echoed previous statements regarding the dangerous world we live in. The reason for danger, or so it goes, is the inability of law enforcement to pursue threats from terrorists, both domestic and international, who are increasingly reliant on encryption to communicate. The sentiment is true, albeit…

Read More Read More

Featured
What “El Chapo”, Sean Penn and BlackBerry teach us about encryption

What “El Chapo”, Sean Penn and BlackBerry teach us about encryption

Have you heard the one about the Mexican drug kingpin, the eccentric movie star and the Ugly Duckling smartphone that’s all of a sudden the talk of the tech town for all the wrong reasons? No? Me neither, but recent reports about the role Sean Penn and BlackBerry phones allegedly played in the capture of two-time prison escapee and illegal-substance peddler extraordinaire Joaquin “El Chapo” Guzman have all the makings of a classic knee-slapper. If you just came out of…

Read More Read More

Featured
Tim Cook pushes for strong encryption at White House summit

Tim Cook pushes for strong encryption at White House summit

As expected, Apple CEO Tim Cook urged White House and government officials to come to terms with strong encryption practices that protect consumer data, at one point saying such intentions should be stated publicly. Cook’s plea came during a cybersecurity summit held in San Jose, Calif., last week, where government officials met with Silicon Valley tech executives to discuss how best to stymie threats posed by non-state actors like ISIS, reports The Guardian. According to a follow-up report from The…

Read More Read More

Featured
Congress wades into encryption debate with bill to create expert panel

Congress wades into encryption debate with bill to create expert panel

WASHINGTON — Growing concern about terrorists’ use of encrypted communication is spurring Congress to act, but the first major piece of legislation is taking a cautious approach as lawmakers grapple with how to spy on suspected criminals without weakening cybersecurity and privacy. House Homeland Security Committee Chairman Michael McCaul, R-Texas, and Sen. Mark Warner, D-Va., who serves on the Intelligence Committee, are set to brief reporters this week on a bill that would create a national commission on security and…

Read More Read More

Featured
Ubuntu Touch to Support Encryption of User Data

Ubuntu Touch to Support Encryption of User Data

The Ubuntu Touch operating system is also going to provide support for encryption of user data, developers have revealed. It wasn’t a secret that Ubuntu Touch will get encryption, but it’s also not listed as an upcoming feature. It’s buried in a wiki entry with plans for Ubuntu Touch, but it’s nice to see that it’s still being considered, even if it’s not going to arrive anytime soon. Ubuntu Touch is a Linux distribution before being an operating system for…

Read More Read More

Featured
Tech big guns confront U.K. parliament on backdoors, encryption

Tech big guns confront U.K. parliament on backdoors, encryption

A group of high tech corporate powerhouses has gathered together to protest a law proposed by the U.K. government that would allow an array of legal and intelligence agencies the ability to access computer data through backdoors and decryption. Facebook, Google, Microsoft, Twitter and Yahoo submitted a letter, dated December 21, 2015, to the parliamentary committee charged with reviewing the Investigatory Powers Bill saying it would have a negative impact on both the nation’s citizenry and the corporation’s customers. “We…

Read More Read More

Featured
Microsoft, Google, Facebook to U.K.: Don’t weaken encryption

Microsoft, Google, Facebook to U.K.: Don’t weaken encryption

Microsoft, Google and Facebook are urging U.K. officials not to undermine encryption as they work on laws that would authorize forcing communications service providers to decrypt customer traffic. In a joint written submission to the U.K. Parliament the three U.S.-based companies lay down several areas of concern, which, if not addressed, they say could damage their businesses and leave them caught in legal crossfires among the many countries where they do business. The companies say they don’t want the U.K….

Read More Read More

Featured
Netherlands opposes backdoors, but encryption still under assault

Netherlands opposes backdoors, but encryption still under assault

The Dutch government has officially declared its opposition to any restrictions on the development or use of encryption products, even as Dutch lawmakers are weighing legislation that could mandate backdoor government access to encrypted communications. In a 4 January 2016 letter to the Dutch parliament, the head of the Ministry of Security and Justice, Ard van der Steur, explained the government’s reasons for endorsing strong encryption, which sound quite similar to those cited by technologists such as Apple’s Tim Cook,…

Read More Read More

Featured
The Netherlands will not weaken encryption for security purposes

The Netherlands will not weaken encryption for security purposes

The Dutch government believes that confidence in secure communication and storage data is essential for the development of the Dutch economy. The Netherlands will not follow the trend of weakening encryption for security purposes, according to a statement by the Dutch Minister of Security and Justice. In contrast, with the United Kingdom where the Investigatory Powers Bill, will ban internet firms of holding client’s private communication information the Dutch government believes that strong encryption is key for the future growth…

Read More Read More

Featured
Microsoft may have your encryption key:here’s how to take it back

Microsoft may have your encryption key:here’s how to take it back

As happens from time to time, somebody hasspotted a feature in Windows 10 that isn’t actually new and has largely denounced it as a great privacy violation. The Intercept has written that if you have bought a Windows PC recently then Microsoft probably has your encryption key. This is a reference to Windows’ device encryption feature. We wrote about this feature when it was new, back when Microsoft introduced it in Windows 8.1 in 2013 (and before that, in Windows…

Read More Read More

Featured
Lawmakers push for commission on encryption

Lawmakers push for commission on encryption

Congress should create a national commission to investigate the difficulties encryption has created for law enforcement, a bipartisan pair of lawmakers argued Monday in a Washington Post op-ed. “Congress must be proactive and should officially convene a body of experts representing all of the interests at stake so we can evaluate and improve America’s security posture as technology — and our adversaries — evolve,” said House Homeland Security Committee Chairman Michael McCaul (R-Texas) and Sen. Mark Warner (D-Va.). It’s an…

Read More Read More

Featured
China Antiterror Law Doesn’t Require Encryption Code Handovers

China Antiterror Law Doesn’t Require Encryption Code Handovers

BEIJING—China passed a new antiterrorism law that stepped back from previous language of concern to global technology firms, but which still raises questions about its scope and the potential impact on companies doing business there. The law, passed Sunday by China’s rubber-stamp parliament, also authorized the armed forces and paramilitary police to take part in counterterrorism operations in foreign countries with the approval of those countries and Beijing’s military leadership. Chinese authorities say the law is intended to help prevent…

Read More Read More

Featured
Senate Intel chair: “It’s time” for encryption legislation

Senate Intel chair: “It’s time” for encryption legislation

Congress must enact a law that would require companies to decrypt data upon government request, Senate Intelligence Committee Chairman Richard Burr (R-N.C.) argued Thursday in a Wall Street Journal op-ed. “Criminals in the U.S. have been using this technology for years to cover their tracks,” Burr said. “The time has come for Congress and technology companies to discuss how encryption — encoding messages to protect their content — is enabling murderers, pedophiles, drug dealers and, increasingly, terrorists.” The recent terrorist…

Read More Read More

Featured
Best Disk Lock Has Been Updated to Version 2.62

Best Disk Lock Has Been Updated to Version 2.62

The powerful data protection software-Best Disk Lock has been updated to version 2.62. There are many improvements in version 2.62, which are designed to make the program even easier to use. The latest version software not only improved the stability for disk elementary-lock, changed the Lock Log to Lock Record for easily unlocking, but also fixed the BUG that an error message occurred when the disk is opened after being unlocked in Windows XP. Besides, six new features are introduced in…

Read More Read More

Featured
Apple CEO Tim Cook Mounts Defense of Encryption on “60 Minutes”

Apple CEO Tim Cook Mounts Defense of Encryption on “60 Minutes”

In a “60 Minutes” appearance Sunday, Apple CEO Tim Cook reiterated his support of encryption, in the face of renewed criticism from the U.S. intelligence community that these digital locks interfere with the ability to detect threats to national security. Cook used an interview with CBS’s Charlie Rose to lay out his argument for why weakening encryption on consumer devices is a bad idea. “If there’s a way to get in, then somebody will find the way in,” Cook said….

Read More Read More

Featured
Paris attack planners used encrypted apps, investigators believe

Paris attack planners used encrypted apps, investigators believe

French counterterrorism investigators believe that the men suspected in last month’s Paris attacks used widely available encryption tools to communicate with each other, officials familiar with the investigation said, raising questions about whether the men used U.S.-made tools to hide the plot from authorities. Investigators have previously said that messaging services WhatsApp and Telegram were found on some of the phones of the men suspected in the November attacks that claimed 130 victims. But they had not previously said that…

Read More Read More

Featured
FBI chief James Comey says Calif. killers used encrypted email, but not social media

FBI chief James Comey says Calif. killers used encrypted email, but not social media

The couple who killed 14 people and wounded nearly two dozen others this month in California chatted secretly of jihad long before they married or entered the United States, not on social media as politicians have claimed, FBI Director James Comey said Wednesday at a Manhattan law enforcement conference, where he urged the public to remain alert for signs someone close to them is being radicalized online. Comey said those messages between Syed Rizwan Farook and Tashfeen Malik were direct,…

Read More Read More

Featured
Encrypted Messages Stymied Probe of Garland Shooting — FBI Director

Encrypted Messages Stymied Probe of Garland Shooting — FBI Director

FBI Director James Comey Jr. testifies at a Senate Judiciary Committee hearing on Capitol Hill in Washington December 9, 2015. John McCain (R-Ariz.), who said after the Paris attacks that the status quo was “unacceptable”. He said the Federal Bureau of Investigation was focused intently on the threat of homegrown violent extremism, “the radicalization in place” of people who become inspired, influenced and/or directed by a terrorist group or extremists. Though he said the Obama administration was not seeking to…

Read More Read More

Featured
FBI Director: Silicon Valley’s encryption is a “business model problem”

FBI Director: Silicon Valley’s encryption is a “business model problem”

Leaders in both major political parties have increasingly been calling on tech companies to give law enforcement encryption backdoors in the wake of recent terror attacks in Paris and California. Today, FBI director James Comey has suggested that Silicon Valley isn’t faced with a serious technical problem, but rather a “business model problem,” according to a report on his comments in The Intercept, based on C-SPAN video of the hearing. On the face of it, Comey’s statement would seem to…

Read More Read More

Featured
McCaul wants new commission on encryption and law enforcement

McCaul wants new commission on encryption and law enforcement

The chairman of the House Homeland Security Committee said he plans to introduce legislation that would allow the creation of a “national commission on security and technology challenges in the Digital Age.” The legislation “would bring together the technology sector, privacy and civil liberties groups, academics, and the law enforcement community to find common ground,” Chairman Rep. Michael McCaul (R-Texas) said in a Dec. 7 speech at National Defense University. “This will not be like other blue ribbon panels, established…

Read More Read More

Featured
Apple, Google encryption is a blow to public safety

Apple, Google encryption is a blow to public safety

A November 2015 report of the Manhattan District Attorney’s Office in New York City sets forth succinctly a huge public safety problem of which most Americans are unaware: “Most people today live their lives on smartphones, and, in this regard at least, criminals are no different. While in the past criminals may have kept evidence of their crimes in file cabinets, closets and safes, today that evidence is more often found on smartphones. Photos and videos of child sexual assault,…

Read More Read More

Featured
Encrypted messaging app Signal now available for desktops

Encrypted messaging app Signal now available for desktops

The much-lauded encryption app Signal has launched a beta program for a desktop version of the app, which will run through Google’s Chrome browser. Signal Desktop is Chrome app that will sync messages transmitted between it and an Android device, wrote Moxie Marlinspike, a cryptography expert who had helped develop Signal, in a blog post on Wednesday. The app comes from Open Whisper Systems, which developed Signal’s predecessors, Redphone and TextSecure, which were two Android applications that encrypt calls and…

Read More Read More

Featured
Why Government and Tech Can’t Agree about Encryption

Why Government and Tech Can’t Agree about Encryption

Your g better and better at protecting your privacy. But Uncle Sam isn’t totally comfortable with that, because it’s also complicating the work of tracking criminals and potential national-security threats. For decades, tech companies have steadily expanded the use of encryption — a data-scrambling technology that shields information from prying eyes, whether it’s sent over the Internet or stored on phones and computers. For almost as long, police and intelligence agencies have sought to poke holes in the security technology,…

Read More Read More

Featured
The secret American origins of Telegram, the encrypted messaging app favored by the Islamic State

The secret American origins of Telegram, the encrypted messaging app favored by the Islamic State

An encrypted communications app called Telegram has been in the news a lot this week, amid fears that the Islamic State has adopted it as its preferred platform for messaging. On Nov. 18, Telegram reportedly banned 78 ISIS-related channels, “disturbed” to learn how popular the app had become among extremists. Those extremists had used the app both to spread propaganda, according to an October report, and to crowdfund money for guns and rockets, according to Vocativ. Telegram makes an obvious…

Read More Read More

Featured
Encryption Debate Erupts Post-Paris Attacks But Don’t Expect Any Change Soon

Encryption Debate Erupts Post-Paris Attacks But Don’t Expect Any Change Soon

Despite the lack of evidence, the Obama Administration has revived the encryption debate, pointing to encryption as an aid to the terrorists behind the Nov. 13 Paris attacks. Investigators from France and the U.S. have conceded that there has been no evidence backing up their conclusion that the terrorist behind the attacks relied on the latest, high-level encryption techniques being offered to consumers by Google and Apple. Yet, the debate over government-grieving encryption is back in high gear. Decrypting the…

Read More Read More

Featured
Paris attacks reignite debate over encryption,surveillance and privacy

Paris attacks reignite debate over encryption,surveillance and privacy

WASHINGTON — Friday’s terrorist attacks in Paris have revived the debate over whether U.S. tech companies should be required to build “backdoors” into encrypted phones, apps and Internet sites to let law enforcement conduct surveillance of suspected terrorists. There has been widespread speculation among law enforcement authorities and the media that the Islamic State terrorists who attacked Paris were using some kind of encryption technology to communicate. However, American and French authorities have said there is no hard evidence to…

Read More Read More

Featured
Paris attack stokes the flames in fight over US data encryption

Paris attack stokes the flames in fight over US data encryption

Last week’s terrorist attack on Paris sounded a call to arms for hawkish U.S. officials seeking broad oversight of encrypted digital communications, some of whom used the opportunity to rekindle discussions with Silicon Valley technology companies. In an interview with MSNBC on Monday, Senator Diane Feinstein (D-Calif.) said Silicon Valley companies, particularly those marketing secure Internet messaging services, should help government agencies protect the homeland by allowing controlled access to encrypted data. “They have apps to communicate on that cannot…

Read More Read More

Featured
Microsoft releases encryption tech for bioinformatics

Microsoft releases encryption tech for bioinformatics

Allows researchers to work on data securely. Microsoft has released tools that allow bioinformatics researchers to work on genome data sets securely to protect privacy. Genomic data is becoming available in increasing amounts as gene sequencing becomes easier, cheaper and faster, and is used for several new applicaitons such as predicting the occurrence and survival of cardiovascular disease. Hospitals, clinics, companies and other insitutions are faced with handling large amounts of such data securely, to ensure the privacy of subjects,…

Read More Read More

Featured
Apple’s Encryption Fight Turns To The UK

Apple’s Encryption Fight Turns To The UK

After a major victory in the United States, Apple is facing an another threat to its encryption efforts on a different front: the United Kingdom. The Cupertino-based tech giant typically shies away from taking firm stances on specific legislation and works through lobbying groups representing technology companies’ interests. Apple’s CEO Tim Cook today told students in Dublin that the company is opposed to a new British proposal that would require it to provide law enforcement with access to encrypted data….

Read More Read More

Featured
Snowden Never Told Us About Ransom Encryption

Snowden Never Told Us About Ransom Encryption

While Edward Snowden is the source behind the largest scandal on the internet, he sure didn’t warn us that hackers would put ransoms onto their spyware. A special ransomware virus was discovered which targets Linux-based systems specifically, and it’s telling us hackers are expanding to web browsers for their vicious attacks. This specific malware, labeled Lunix.Encoder.1, it breakes all files and goes through specific directories, encrypting home directories, the MySQL server directory, logs, and Web directories of Apache and the…

Read More Read More

Featured
Investigatory Powers Bill could allow Government to ban end-to-end encryption, technology powering iMessage and WhatsApp

Investigatory Powers Bill could allow Government to ban end-to-end encryption, technology powering iMessage and WhatsApp

The new Investigatory Powers Bill could ban WhatsApp and iMessage as they currently exist and lead to the weakening of security. Introducing the Bill this week, Home Secretary Theresa May said that it didn’t include a controversial proposal to ban the encryption that ensures that messages can’t be read as they are sent between devices. But it does include rules that could allow the Government to force companies to create technology that allows those messages to be read, weakening encryption….

Read More Read More

Featured
New U.K. online surveillance proposal could have international reach

New U.K. online surveillance proposal could have international reach

A new surveillance proposal in the United Kingdom is drawing criticism from privacy advocates and tech companies that say it gives the government far-reaching digital surveillance powers that will affect users outside the nation’s borders. The Draft Investigatory Powers Bill released by British Home Secretary Theresa May Wednesday would force tech companies to build intercept capabilities into encrypted communications and require telecommunications companies to hold on to records of Web sites visited by citizens for 12 months so the government…

Read More Read More

Featured
This Snowden-Approved Encrypted-Communication App Is Coming to Android

This Snowden-Approved Encrypted-Communication App Is Coming to Android

Since it first appeared in Apple’s App Store last year, the free encrypted calling and texting app Signal has become the darling of the privacy community, recommended—and apparently used daily—by no less than Edward Snowden himself. Now its creator is bringing that same form of ultra-simple smartphone encryption to Android. On Monday the privacy-focused nonprofit software group Open Whisper Systems announced the release of Signal for Android, the first version of its combined calling and texting encryption app to hit…

Read More Read More

Featured
New UK laws ban unbreakable encryption for internet and social media companies

New UK laws ban unbreakable encryption for internet and social media companies

Companies such as Apple and Google will be banned from offering unbreakable encryption under new UK laws. Set to be unveiled on Wednesday (November 4), internet and social media companies will no longer be able to provide encryption so advanced that they cannot decipher it, according to The Daily Telegraph. It will see tech firms and service providers required to provide unencrypted communications to the police or spy agencies if requested through a warrant, and comes as David Cameron urged…

Read More Read More

Featured
Oracle hardwires encryption and SQL hastening algorithms into Sparc M7 silicon

Oracle hardwires encryption and SQL hastening algorithms into Sparc M7 silicon

Oracle execs used the final keynote of this week’s OpenWorld to praise their Sparc M7 processor’s ability to accelerate encryption and some SQL queries in hardware. On Wednesday, John Fowler, veep of systems at Oracle, said the M7 microprocessor and its builtin coprocessors that speed up crypto algorithms and database requests stood apart from the generic Intel x86 servers swelling today’s data center racks. “I don’t believe that the million-server data center powered by a hydroelectric dam is the scalable…

Read More Read More

Featured
Biometric data becomes the encryption key in Fujitsu system

Biometric data becomes the encryption key in Fujitsu system

Fujitsu says it has developed software that uses biometric data directly as the basis for encryption and decryption of data, simplifying and strengthening security systems that rely on biometrics such as fingerprints, retina scans and palm vein scans. Current security systems that rely on encryption require the management of encryption keys, which are stored on secure smartcards or directly on PCs. Biometric scans can be used as a way of authenticating the user and providing access to those encryption keys…

Read More Read More

Featured
Tech Companies and Civil Liberties Groups Force Obama To Weigh In On Encryption Debate

Tech Companies and Civil Liberties Groups Force Obama To Weigh In On Encryption Debate

President Obama will now be forced to publicly describe the extent of his commitment to protecting strong encryption, after nearly 50 major technology companies, human rights groups, and civil liberties collectives—including Twitter, the ACLU, and Reddit — succeeded in getting over 100,000 signatures on a White House petition on Tuesday. The government’s “We the People” platform, created in 2011, was designed as “a clear and easy way for the American people to petition their government.” Once a petition gains 100,000…

Read More Read More

Featured
Your self-encrypting hard drive isn’t nearly as secure as you thought

Your self-encrypting hard drive isn’t nearly as secure as you thought

If you want to keep your information away from hackers and snoops, whether it’s your Internet use, email, hard drive data or your backup, the best thing you can do is use encryption. Encryption scrambles your data and, in theory, the only way to unscramble it is to know the password. That’s why choosing a strong password no one can guess is important. This is also what makes a ransomware virus that encrypts your files so dangerous. Without paying for…

Read More Read More

Featured
Western Digital’s hard drive encryption is useless. Totally useless

Western Digital’s hard drive encryption is useless. Totally useless

The encryption systems used in Western Digital’s portable hard drives are pretty pointless, according to new research. WD’s My Passport boxes automatically encrypt data as it is written to disk and decrypt the data as it is read back to the computer. The devices use 256-bit AES encryption, and can be password-protected: giving the correct password enables the data to be successfully accessed. Now, a trio of infosec folks – Gunnar Alendal, Christian Kison and “modg” – have tried out…

Read More Read More

Featured
NSA, Apple Chiefs Decode Encryption Views

NSA, Apple Chiefs Decode Encryption Views

LAGUNA BEACH, Calif.—The heads of the National Security Agency and the world’s most valuable company appeared to try to make nice Monday night over their contrasting views on encryption—to a point. NSA Director Adm. Michael Rogers and Apple Inc. Chief Executive Tim Cook, appearing at The Wall Street Journal’s technology conference, WSJDLive, spoke in broad terms about encryption in back-to-back interviews. Asked about efforts by Apple and other tech firms to build products that protect user data and communications from…

Read More Read More

Featured
The NSA may have been able to crack so much encryption thanks to a simple mistake

The NSA may have been able to crack so much encryption thanks to a simple mistake

The NSA could have gained a significant amount of its access to the world’s encrypted communications thanks to the high-tech version of reusing passwords, according to a report from two US academics. Computer scientists J Alex Halderman and Nadia Heninger argue that a common mistake made with a regularly used encryption protocol leaves much encrypted traffic open to eavesdropping from a well-resourced and determined attacker such as the US national security agency. The information about the NSA leaked by Edward…

Read More Read More

Featured
The next steps for the White House on encryption

The next steps for the White House on encryption

THE OBAMA administration’s decision not to seek legislation requiring technology companies to give law enforcement access to encrypted communications on smartphones has a certain logic. In this age of hacking and cyberintrusion, encryption can keep most people safer. But the decision also carries risks. Encryption can give a tiny band of criminals and terrorists a safe haven. The United States must now make the most of the useful side of encryption, but without losing sight of the risks. FBI Director…

Read More Read More

Featured
Aadhaar encryption protects privacy, will take eons to crack

Aadhaar encryption protects privacy, will take eons to crack

The Aadhaar system’s data collection and storage is strongly protected by sophisticated encryption processes to ensure biometric data does not leak either through private contractors running enrollment centres or at the central data servers that store the details. The unique identity authority of India’s processes are intended to allay fears that biometric data collected by private contractors might be vulnerable to falling in unauthorized hands as the biometric detail is encrypted using the highest available public key cryptography encryption. Even…

Read More Read More

Featured
Encrypted Smartphones Challenge Investigators

Encrypted Smartphones Challenge Investigators

Law-enforcement officials are running up against a new hurdle in their investigations: the encrypted smartphone. Officials say they have been unable to unlock the phones of two homicide victims in recent months, hindering their ability to learn whom those victims contacted in their final hours. Even more common, say prosecutors from New York, Boston and elsewhere, are locked phones owned by suspects, who refuse to turn over passcodes. Manhattan District Attorney Cyrus Vance says his office had 101 iPhones that…

Read More Read More

Featured
US Government Will No Longer Push For User’s Encrypted Data

US Government Will No Longer Push For User’s Encrypted Data

Last year Google and Apple (and other companies) made some changes to the way encryption was handled. Instead of Google and Apple holding the keys to the encryption, they gave the keys to their customers. What this meant is that law enforcement agencies can no longer ask these companies to turn over user encrypted data. If they want the data, they will have to convince those users to give it up themselves, something which the FBI was not too happy…

Read More Read More

Featured
Obama administration has decided not to seek a legislative remedy now

Obama administration has decided not to seek a legislative remedy now

FBI Director James Comey told a congressional panel that the Obama administration won’t ask Congress for legislation requiring the tech sector to install backdoors into their products so the authorities can access encrypted data. Comey said the administration for now will continue lobbying private industry to create backdoors to allow the authorities to open up locked devices to investigate criminal cases and terrorism. “The administration has decided not to seek a legislative remedy now, but it makes sense to continue…

Read More Read More

Featured
Obama administration opts not to force firms to decrypt data — for now

Obama administration opts not to force firms to decrypt data — for now

After months of deliberation, the Obama administration has made a long-awaited decision on the thorny issue of how to deal with encrypted communications: It will not — for now — call for legislation requiring companies to decode messages for law enforcement. Rather, the administration will continue trying to persuade companies that have moved to encrypt their customers’ data to create a way for the government to still peer into people’s data when needed for criminal or terrorism investigations. “The administration…

Read More Read More

Featured
Risk Analysis, Encryption Stressed in HITECH Act Final Rules

Risk Analysis, Encryption Stressed in HITECH Act Final Rules

Two final rules for the HITECH electronic health record incentive program strongly emphasize the value of risk assessments and encryption as measures for safeguarding patient information. A new rule establishing requirements for proving a provider is a “meaningful user” for Stage 3 of the incentive program requires protecting patient data through the implementation of appropriate technical, administrative and physical safeguards and conducting a risk analysis that includes assessing encryption of ePHI created or maintained by a certified electronic health record….

Read More Read More

Featured
CHK File Recovery Has Been Updated to Version 1.09

CHK File Recovery Has Been Updated to Version 1.09

CHK File Recovery is an excellent recovery tool specialized in recovering CHK files in a quick and easy way, which has been updated to version 1.09 recently. In this new version, we fixed a bug which disabled to identify one file type, also we added one recoverable file type. Change Log of CHK File Recovery 1.09: File Name: CHK File Recovery Version: 1.09 File Size: 2.64MB Category: CHK File Recovery Software Language: English License type: Trial Version OS Support: Win2000/XP/VISTA/Win…

Read More Read More

Featured
National Encryption Policy: Not just privacy, but also feasibility and security are at risk

National Encryption Policy: Not just privacy, but also feasibility and security are at risk

Encryption is an important aspect which governs not just the communications but also the storage. When data is in motion there are some methods/ protocols which facilitate end-to-end encryption: 1. VPN 2. Remote Server Connectivity viz. RDP, SSH 3. Internet based Voice/ Messaging Communications 4. email communication 5. Communications between Wearables and their Host devices 6. Web-Services providing encryption services viz. Etherpad, Gist However, when it concerns data at rest ie. data stored on the disk, there are numerous scenarios…

Read More Read More

Featured
Data encryption policy blamed on lack of talent, key changes: Report

Data encryption policy blamed on lack of talent, key changes: Report

The whole draft encryption policy episode has left netizens with a bitter-sweet taste. And now, the blame game has begun. Soon after the government retracted the policy and said it was simply wrongly worded which led to the confusion, it has blamed a junior scientist for the fiasco. An official now told The Economic Times that ‘you think anything in the government moves without due procedure? All I can tell you is that all rules and regulations were followed.’ The…

Read More Read More

Featured
Draft encryption policy: Frequent changes in key positions & talent crunch in DeitY led to the debacle

Draft encryption policy: Frequent changes in key positions & talent crunch in DeitY led to the debacle

As the blame game for the fiasco created by the draft National Encryption Policy plays out, experts are asking if frequent changes in key positions and a talent crunch in the Department of Electronics and Information Technology (DeitY) led to the debacle. After the government held a junior scientist responsible, officers in the department are now pointing fingers at each other, while maintaining all along that due procedure was followed. “You think anything in the government moves without due procedure?…

Read More Read More

Featured
Encryption policy poorly worded by officer: Telecom Minister Ravi Shankar Prasad

Encryption policy poorly worded by officer: Telecom Minister Ravi Shankar Prasad

The government has blamed a junior official – a scientist — for the encryption policy fiasco, saying he was responsible for the poor and confusing wording of the document and failed to seek advice from his higher ups before making it public. Several officials in the communications and IT Ministry that ET spoke to admitted that the timing of the release of the draft policy – just before Prime Minister Narendra Modi’s US visit — couldn’t have been worse, prompting…

Read More Read More

Featured
National Encryption Policy: Government Issues Clarification on WhatsApp, Social Media

National Encryption Policy: Government Issues Clarification on WhatsApp, Social Media

The government issued an addendum to clarify that “mass use encryption products, which are currently being used in web applications, social media sites, and social media applications such as WhatsApp, Facebook, Twitter etc.” While that language is vague in itself, you can rest easy without needing to worry about having to store your WhatsApp messages for 90 days. The original text continues below. The DeitY has posted a draft National Encryption Policy on its website inviting comments from the public…

Read More Read More

Featured
Best Disk Lock Has Been Updated to Version 2.60

Best Disk Lock Has Been Updated to Version 2.60

Best Disk Lock, which can completely hide the disk partitions, has been updated to the version 2.60. In this new version, we have improved the stability of disk advanced-lock, added the judgement for the disks unsuitable for lock when locking disks, also fixed a BUG that an error occurred in software uninstallation. Change Log of Best Disk Lock 2.60: File Name: Best Disk Lock Version: 2.60 File Size: 3.38MB Category: System Security Software Language: English License type: Trial Version OS Support: Win2000/XP/VISTA/Win…

Read More Read More

Featured
Experts pick big holes in India’s encryption policy

Experts pick big holes in India’s encryption policy

India’s proposed encryption policy has come under heavy fire with internet experts and online activists alleging that it provides blanket backdoors to law enforcement agencies to access user data, which could be abused by hackers and spies. The Department of Electronics and Information Technology ( DeitY) has asked for public comments on the ‘Draft National Encryption Policy’ on its website until October 16. The stated mission of the policy on encryption -or, the practice of scrambling data to make it…

Read More Read More

Featured
Obama edges toward full support for encryption

Obama edges toward full support for encryption

President Obama recently called on the best minds in government, the tech sector and academia to help develop a policy consensus around “strong encryption” — powerful technologies that can thwart hackers and provide a profound new level of cybersecurity, but also put data beyond the reach of court-approved subpoenas. From Obama on down, government officials stressed that they are not asking the technology sector to build “back doors” that would allow law enforcement and intelligence agencies to obtain communications in…

Read More Read More

Featured
Science on the Hill: For cybersecurity, in quantum encryption we trust

Science on the Hill: For cybersecurity, in quantum encryption we trust

As everyone becomes more interconnected on the Internet, personal information like bank and investment accounts, credit card numbers, home addresses and even social security numbers becomes more vulnerable to cybertheft. The same goes for the corporate world. Identity theft struck 16.6 million Americans in 2012, the most recent year for which figures were available. According to the U.S. Department of Justice, financial losses hit $24.7 billion — at least $10 billion more than other property crimes. PBS Newshour reported that…

Read More Read More

Featured
MainOne addresses data centre security concerns

MainOne addresses data centre security concerns

Keeping customer data secure is of utmost importance in any organization. Therefore, compliance with security standards is vital. In today’s world, a company cannot afford to experience breaches of customer information, transactional data or other important business information given the volume of business taking place online and the consequences of such breaches. When considering collocation at a commercial data centre, compliance to global security standards, such as the Payment Card Industry Data Security Standard (PCI DSS) and Information Security Standards,…

Read More Read More

Featured
FBI director: Ability to unlock encryption is not a ‘fatal’ security flaw

FBI director: Ability to unlock encryption is not a ‘fatal’ security flaw

In the tug-of-war between the government and U.S. companies over whether firms should hold a key to unlock encrypted communications, a frequent argument of technologists and privacy experts is that maintaining such a key poses a security threat. But on Thursday, FBI Director James B. Comey pointed out that a number of major Internet companies do just that “so they can read our e-mails and send us ads.” And, he said: “I’ve never heard anybody say those companies are fundamentally…

Read More Read More

Featured
Encryption and privacy are priorities for tech firms

Encryption and privacy are priorities for tech firms

The Justice Department and Microsoft go head-to-head in the U.S. Second Circuit Court of Appeals in Manhattan on Wednesday. The battleground? Data privacy. At issue is the question of whether U.S. law enforcement can use a search warrant — in this case, in a drug investigation — to force the U.S.-based technology company to turn over emails it has stored in a data center in Ireland. Lower courts have sided with the government and held Microsoft in contempt for refusing…

Read More Read More

Featured
CHK File Recovery Has Been Updated to Version 1.082

CHK File Recovery Has Been Updated to Version 1.082

CHK File Recovery is an excellent recovery tool specialized in recovering CHK files in a quick and easy way, which has been updated to version 1.082 recently. In this new version, we fixed a bug which disabled to identify one file type, also we added one recoverable file type. Change Log of CHK File Recovery 1.082: File Name: CHK File Recovery Version: 1.082 File Size: 2.63MB Category: CHK File Recovery Software Language: English License type: Trial Version OS Support: Win2000/XP/VISTA/Win…

Read More Read More

Featured
Argument over strong encryption reaches boiling point as Apple, Microsoft rebuff court orders for data access

Argument over strong encryption reaches boiling point as Apple, Microsoft rebuff court orders for data access

A long-running debate concerning recent advances in consumer data encryption came to a head this summer when Apple rebuffed a Justice Department court order demanding access to iMessage transcripts, causing some in the law enforcement community to call for legal action against the company. Over the summer Apple was asked to furnish real-time iMessage communications sent between two suspects in an investigation involving guns and drugs, reports The New York Times. The company said it was unable to provide such…

Read More Read More

Featured
Best Folder Encryptor Has Updated to Version 16.83

Best Folder Encryptor Has Updated to Version 16.83

The professinal file and folder encryption software – Best Folder Encryptor has been updated to version 16.83 recently. In last version 16.82, we have fixed a bug that the encrypted file/folder cannot be prevented from deletion, copy and removal in 64 bit operating system, also fixed a bug that there is no verification for password entering when folder bulk encryption and other three bugs. Besides, we added the judgement for the disks unsuitable for protection when protecting disks. In this new…

Read More Read More

Featured
Vice News fixer ‘charged over encryption software’

Vice News fixer ‘charged over encryption software’

Three staff members from Vice News were charged with “engaging in terrorist activity” because one of the men was using an encryption system on his personal computer which is often used by the Islamic State of Iraq and the Levant (ISIL), a senior press official in the Turkish government has told Al Jazeera. Two UK journalists, Jake Hanrahan and Philip Pendlebury, along with their Turkey-based Iraqi fixer and a driver, were arrested on Thursday in Diyarbakir while filming clashes between…

Read More Read More

Featured
When It Comes To Encryption, Our Policy Makers Could Learn A Thing Or Two From Thomas Jefferson

When It Comes To Encryption, Our Policy Makers Could Learn A Thing Or Two From Thomas Jefferson

Thomas Jefferson was so interested in cryptography that he may have developed his own enciphering device after his mail was inspected by postmasters when the revolution was looming. Indeed, codes and ciphers are as American as the American Revolution itself. In fact, the revolution may not have happened if confidential correspondence, both military and otherwise, had been compromised by the British. In December 1801, Jefferson received an encrypted letter from a mathematics professor (the two both served at the American…

Read More Read More

Featured
NSA wants encryption that fends off quantum computing hacks

NSA wants encryption that fends off quantum computing hacks

The National Security Agency isn’t just yearning for quantum computers that can break tough encryption — it wants encryption that can protect against quantum computers, too. Officials have begun planning a transition to “quantum resistant” encryption that can’t be cracked as quickly as conventional algorithms. As the NSA explains, even a seemingly exotic technique like elliptic curve cryptography “is not the long term solution” people thought it was. Quantum computing is advancing quickly enough that the NSA and other organizations…

Read More Read More

Featured
Whose keys are they anyway?

Whose keys are they anyway?

Google recently announced enhanced security support for its cloud customers by granting them the ability to hold the encryption keys to their data. These customer-supplied encryption keys for the Google Cloud Platform follow the example set by other cloud industry leaders such as Amazon Web Services and Box and position the tech giant as an advocate for user data privacy. The many federal IT managers who rely on Google Cloud and AWS are now able to develop a more sound…

Read More Read More

Featured
NCUA institutes encryption protocols for data provided to examiners

NCUA institutes encryption protocols for data provided to examiners

NCUA has instituted data encryption protocols as suggested by its Office of Inspector General this June following review of an examiner’s loss of a thumb drive containing credit union members’ data. The protocols were communicated Aug. 21 in a letter from NCUA Examination and Insurance Director Larry Fazio to the chief executives of federally insured credit unions. The letter says the agency’s examiners now will accept data files from credit unions only if the files are encrypted first by the…

Read More Read More

Featured
Reflective satellites may be the future of high-end encryption

Reflective satellites may be the future of high-end encryption

Quantum key distribution is regularly touted as the encryption of the future. While the keys are exchanged on an insecure channel, the laws of physics provide a guarantee that two parties can exchange a secret key without knowing whether they’re being overheard. This unencrypted-but-secure form of key exchange circumvents one of the potential shortcomings of some forms of public key systems. However, quantum key distribution (QKD) has one big downside: the two parties need to have a direct link to…

Read More Read More

Featured
Phone and laptop encryption guide: Protect your stuff and yourself

Phone and laptop encryption guide: Protect your stuff and yourself

The worst thing about having a phone or laptop stolen isn’t necessarily the loss of the physical object itself, though there’s no question that that part sucks. It’s the amount of damage control you have to do afterward. Calling your phone company to get SIMs deactivated, changing all of your account passwords, and maybe even canceling credit cards are all good ideas, and they’re just the tip of the iceberg. Using strong PINs or passwords and various Find My Phone…

Read More Read More

Featured
Jeb Bush: encryption makes it too hard to catch “evildoers”

Jeb Bush: encryption makes it too hard to catch “evildoers”

Bush, the former governor of Florida, said Tuesday that encryption “makes it harder for the American government to do its job.” That job would be, according to Bush, “making sure that evildoers aren’t in our midst,” echoing a phrase frequently used by his brother President George W. Bush to describe the threat of radical Islamic terrorism. If you create encryption, it makes it harder for the American government to do its job – while protecting civil liberties – to make…

Read More Read More

Featured
Five free Android encryption tools for the paranoid user

Five free Android encryption tools for the paranoid user

Do your hats tend to fall into the tinfoil range? Are you afraid there is always somebody watching you? If so, rest assured that the Android ecosystem offers plenty of apps to soothe your paranoia. But which apps are the must-haves? Here are five apps you should immediately install and put to work. They’ll bring you peace in the knowledge that your mobile data is far more secure than those around you. 1: Orbot Proxy with Tor Orbot Proxy with…

Read More Read More

Featured
Pushbullet adds end-to-end encryption to its Android, Chrome and Windows desktop app

Pushbullet adds end-to-end encryption to its Android, Chrome and Windows desktop app

Continuing its evolution in to a full-fledged messaging service, Pushbullet has added support for end-to-end encryption when using the app to mirror notifications, move text captured by the universal copy and paste clipboard and send SMS messages. The feature is available to anyone using the latest version of the company’s Android, Chrome or Windows desktop app; Pushbullet promises that its iOS and Mac apps will support the feature in the near future. Enabling end-to-end encryption is done by going to…

Read More Read More

Featured
Pushbullet adds end-to-end encryption as it continues shift into messaging

Pushbullet adds end-to-end encryption as it continues shift into messaging

Pushbullet, once a simple tool for sending files between your various devices, has announced that it now supports end-to-end encryption for additional user privacy, as it continues its march towards becoming a fully-fledged messenger. Announced in a blog post, the new encryption is applied across notifications that are mirrored between devices, any text captured by the universal copy-and-paste option and any SMS messages that are sent using the platform. Once enabled (achieved by entering a password on each device), it…

Read More Read More

Featured
Blackberry PGP Encrypted Phones With Latest BB12 Encryption Technology Released

Blackberry PGP Encrypted Phones With Latest BB12 Encryption Technology Released

Blackberry Encrypted Phones have Blackberry PGP email encrypted devices that offer safe and secure solutions for wireless communications. Android and iPhones have proven to be unreliable when it comes to encryption and data protection. These popular devices have been relatively reduced to the status of toys when it comes to industrial or professional grade protection against espionage at any level. No one knows where the compromise begins and ends with these platforms whose very hardware was born with the idea…

Read More Read More

Featured
Cryptolocker virus: Australians forced to pay as latest encryption virus is ‘unbreakable’, security expert says

Cryptolocker virus: Australians forced to pay as latest encryption virus is ‘unbreakable’, security expert says

Australians are paying thousands of dollars to overseas hackers to rid their computers of an unbreakable virus known as Cryptolocker. There has been a rise in the number of people falling victim to the latest version of an encryption virus which hijacks computer files and demands a ransom to restore them. The “ransomware” infects computers through programs and credible-looking emails, taking computer files and photographs hostage. Cryptolocker comes in a number of versions, the latest capitalising on the release of…

Read More Read More

Featured
NSA-grade encryption for mobile over untrusted networks

NSA-grade encryption for mobile over untrusted networks

The only term being thrown around government more than “2016 elections” these days is “cybersecurity,” particularly following a rash of damaging and high-profile data breaches. With that focus on protecting information top of mind in agencies, USMobile officials hope to find a ready market for their commercial app, which lets government workers use their personal smartphones for top-secret communications. Called Scrambl3, the app creates a secure virtual-private network that connects bring-your-own devices to an agency server to send messages using…

Read More Read More

Featured
Cloud encryption key management becomes table stakes

Cloud encryption key management becomes table stakes

Encryption key management has become table stakes for cloud vendors, but bringing your own key isn’t always the right move. The ability to bring your own encryption keys is fast becoming ubiquitous in public cloud, but that doesn’t mean IT pros should retain control. Security concerns and data center oversight are two primary hang-ups for IT shops averse to adopting public cloud. Amazon became the first major infrastructure as a service (IaaS) vendor to offer bring your own key encryption…

Read More Read More

Featured
SafeChats aims to give messaging an encryption edge

SafeChats aims to give messaging an encryption edge

THE revelations from former US National Security Agency (NSA) contractor Edward Snowden that the US Government has been tapping communications have created greater awareness on the need for secure communications, which in turn has given rise to secure messaging apps such as Telegram, Wickr and Threema. Privacy should not be a concern for just individuals, but businesses also need to be aware of how tapped communications can affect them, according to Maxim Glazov (pic above), chief executive officer of Singapore-based…

Read More Read More

Featured
Researchers develop quantum-computing safe crypto

Researchers develop quantum-computing safe crypto

Practical implementation of secure key exchange for TLS. A team of researchers claim to have developed secure, quantum computing-proof encryption that can be practically implemented today. The paper, Post-quantum key exchange for the TLS protocol from the ring learning with errors problem [pdf] is written by Joppe Bos from NXP Semiconductors in Belgium, Craig Costello and Michael Naehrig at Microsoft Research, and mathematician Douglas Stebila from Queensland University of Technology. Quantum computers have long been thought to be able to…

Read More Read More

Featured
DA Hillar Moore: Cellphone encryption hurting murder investigation of woman, her baby; family holds onto hope the case will be solved

DA Hillar Moore: Cellphone encryption hurting murder investigation of woman, her baby; family holds onto hope the case will be solved

Cellphone encryption practices could be keeping investigators from solving the murder of Brittney Mills and her son, East Baton Rouge Parish District Attorney Hillar Moore III said Saturday, but family members remain hopeful the truth will surface. “By no means have we forgotten them,” said Mills’ mother, Barbara Mills, on Sunday. “This will be in the forefront until it is solved.” Brittney Mills, 29, who was eight months pregnant, was shot and killed April 24 at her Ship Drive apartment….

Read More Read More

Featured
Apple could be held liable for supporting terrorism with strong iOS encryption, experts theorize

Apple could be held liable for supporting terrorism with strong iOS encryption, experts theorize

In the second installment of a thought piece about end-to-end encryption and its effect on national security, Lawfare editor-in-chief Benjamin Wittes and co-author Zoe Bedell hypothesize a situation in which Apple is called upon to provide decrypted communications data as part of a legal law enforcement process. Since Apple does not, and on devices running iOS 8 cannot, readily hand over decrypted user data, a terrorist might leverage the company’s messaging products to hide their agenda from government security agencies….

Read More Read More

Featured
VeriFyle reveals Cellucrypt, a new multi-layer encryption key management technology

VeriFyle reveals Cellucrypt, a new multi-layer encryption key management technology

VeriFyle, the company headed by Hotmail inventor and co-founder Jack Smith, has a new encryption key management technology which it believes will “re-invent how the world thinks about secure sharing and messaging”. The major difference is that any object that is shared to the cloud using the system is encrypted for individual users rather than in bulk. Cellucrypt offers such a high level of security that VeriFyle believes that it “makes illicit bulk-access to customer data virtually impossible.” It’s a…

Read More Read More

Featured
Silent scanners: Emergency communications encrypted across Nova Scotia

Silent scanners: Emergency communications encrypted across Nova Scotia

SYDNEY — Citizens who like listening in on police, fire department and ambulance calls are out of luck, now that most emergency services communications in Cape Breton are conducted on fully encrypted radios. The scanners have gone silent, for the most part, with the introduction of the second generation of Trunk Mobile Radio (TMR2) communications. Being unable to monitor police traffic can be dangerous for citizens, said one longtime listener who didn’t want to be named. “You don’t know what’s going…

Read More Read More

Featured
Twitter Security Pro: Encryption Isn’t Enough

Twitter Security Pro: Encryption Isn’t Enough

Encryption can appear to be priceless when it’s absent, as it was in the recent Office of Personnel Management breach. It can appear to be costly when it’s present, as FBI director James Comey has argued. But not everything is as it appears. Michael Coates, trust and information security officer at Twitter and global board member of the Open Web Application Security Project (OWASP), suggests encryption gets more credit than it deserves. “Encryption is thrown around as the solution to…

Read More Read More

Featured
It’s Time to End the “Debate” on Encryption Backdoors

It’s Time to End the “Debate” on Encryption Backdoors

Yesterday, on Lawfare, FBI Director James Comey laid out his concern that the growing adoption of strong encryption technologies will frustrate law enforcement’s ability to conduct investigations — what he calls the “Going Dark” problem. The gist of Comey’s position is this: He recognizes encryption is important to security and privacy, but believes we are fast approaching an age of “universal encryption” that is in tension with the government’s investigative needs. Although he assures us he is not a “maniac,”…

Read More Read More

Featured
Encryption, Privacy, National Security And Ashley Madison

Encryption, Privacy, National Security And Ashley Madison

So, as about a million Australians quietly shit themselves as the Ashley Madison data breach starts to bleed data, we have the UK government talking about banning encryption. Although they have backtracked to some some degree UK Prime Minister David Cameron told his parliament the country needed to crack down on encryption in order to make it harder for terrorists to communicate. While the Ashley Madison hack is barely surprising — mega-breaches are a fact of life in today’s world…

Read More Read More

Featured
US officials target social media, encryption after Chattanooga shooting

US officials target social media, encryption after Chattanooga shooting

Was the Chattanooga shooter inspired by IS propaganda? There’s no evidence to back the claim, but some officials are already calling for access to encrypted messages and social media monitoring. Spencer Kimball reports. It’s not an unusual story in America: A man in his 20s with an unstable family life, mental health issues and access to firearms goes on a shooting spree, shattering the peace of middle class life. This time, the shooter’s name was Muhammad Youssef Abdulazeez, a Kuwaiti-born…

Read More Read More

Featured
Passphrase.io Uses Bitcoin-level Encryption To Create A Safe Online Notepad Service

Passphrase.io Uses Bitcoin-level Encryption To Create A Safe Online Notepad Service

Passphrase.io – A Social Experiment With Lots of Potential Storing sensitive data in a secure and safe environment is not an easy task to accomplish for most people. Even though there are multiple guides on the internet of how to store data, and even encrypt if needed, doing so is still a hassle for most people. After all, our society values convenience above anything else, even if it goes at the cost of security. On top of that, even if…

Read More Read More

Featured
After Washington Post rolls out HTTPS, its editorial board bemoans encryption debate

After Washington Post rolls out HTTPS, its editorial board bemoans encryption debate

There’s hope that by the time the Washington Post’s editorial board takes a third crack at the encryption whip, it might say something worthwhile. Late on Saturday, the The Washington Post’s editorial board published what initially read as a scathing anti-encryption and pro-government rhetoric opinion piece that scolded Apple and Google (albeit a somewhat incorrect assertion) for providing “end-to-end encryption” (again,an incorrect assertion) on their devices, locking out federal authorities investigating serious crimes and terrorism. Read to the end, and…

Read More Read More

Featured
Ace Secret Disk Updated to the Latest Version 8.05

Ace Secret Disk Updated to the Latest Version 8.05

Ace Secret Disk allows you to create a secret disk on your computer, on which you can store your private files (such as photos, videos and financial information documents) just like you would do on a normal disk. In this way the danger of data leakage can be completely eradicated. In the new version, we have added the feature for users to view the property of the secret disk, also we fixed some minor bugs and optimized the software performance. Change Log…

Read More Read More

Featured
TeslaCrypt 2.0 comes with stronger encryption and a CryptoWall disguise

TeslaCrypt 2.0 comes with stronger encryption and a CryptoWall disguise

TeslaCrypt, primarily known for encrypting gaming files, has beefed up its techniques and most recently, greatly improved its encryption in its newest 2.0 version. Kasperky Lab wrote in a blog post that TeslaCrypt 2.0 not only makes it impossible to decrypt files, but also uses an HTML page copied directly from a separate ransomware: CryptoWall. And to take it a step further, TeslaCrypt no longer uses its own name; it instead opts to disguise itself as CryptoWall. More specifically, once…

Read More Read More

Featured
New Version of Teslacrypt changes encryption scheme

New Version of Teslacrypt changes encryption scheme

A new version of the nasty TeslaCrypt ransomware is making the rounds, and the creators have added several new features, including an improved encryption scheme and some details designed to mimic CryptoWall. TeslaCrypt is among the more recent variants of ransomware to emerge and the malware, which is a variant of CryptoLocker, is unique in that it targets files from gaming platforms as well as other common file types. Version 2.0.0 of TeslaCrypt discovered recently by researchers at Kaspersky Lab,…

Read More Read More

Featured
CHK File Recovery Has Been Updated to Version 1.08

CHK File Recovery Has Been Updated to Version 1.08

CHK File Recovery is an excellent recovery tool specialized in recovering CHK files in a quick and easy way, which has been updated to version 1.08 recently. In this new version, we added 5 recoverable  file types, and fixed the bug that the chk file cannot be recovered after manually identified. Change Log of CHK File Recovery 1.08: File Name: CHK File Recovery Version: 1.08 File Size: 2.82MB Category: CHK File Recovery Software Language: English License type: Trial Version OS…

Read More Read More

Featured
Encryption: if this is the best his opponents can do, maybe Jim Comey has a point

Encryption: if this is the best his opponents can do, maybe Jim Comey has a point

“We share EPA’s commitment to ending pollution,” said a group of utility executives. “But before the government makes us stop burning coal, it needs to put forward detailed plans for a power plant that is better for the environment and just as cheap as today’s plants. We don’t think it can be done, but we’re happy to consider the government’s design – if it can come up with one.” “We take no issue here with law enforcement’s desire to execute…

Read More Read More

Featured
PC Shutdown Timer and Schedule – Magic Timed Shutdown Updated to Version 10.03

PC Shutdown Timer and Schedule – Magic Timed Shutdown Updated to Version 10.03

Magic Timed Shutdown is a professional software application that powers off your computer automatically at specific times. It has four main features – timed auto shutdown, advanced computer control, computer use time limitation and startup/shutdown log analysis. In this new verison, we fixed some bugs and enhanced the software stability. Change Log of Magic Timed Shutdown 10.03: File Name: Magic Timed Shutdown Version: 10.03 File Size: 5.45MB Category: Timed Shutdown Software Language: English OS Support: Win2000/XP/VISTA/Win 7/Win 8 Released on:…

Read More Read More

Featured
In The Debate Over Strong Encryption, Security And Liberty Must Win

In The Debate Over Strong Encryption, Security And Liberty Must Win

When Sen. Chuck Grassley (R-Iowa) gaveled a Senate Judiciary Committee hearing into session on Wednesday, he called it the “start” of a conversation about privacy, security and encryption. Frankly, it was just the latest forum for a much older discussion. While it may have been the beginning of a long day on Capitol Hill for FBI Director James Comey, the national conversation about law enforcement and strong encryption has been ongoing since the 1990s and the so-called “Crypto Wars.” While the…

Read More Read More

Featured
FBI chief wants ‘backdoor access’ to encrypted communications to fight Isis

FBI chief wants ‘backdoor access’ to encrypted communications to fight Isis

The director of the Federal Bureau of Investigation has warned US senators that the threat from the Islamic State merits a “debate” about limiting commercial encryption – the linchpin of digital security – despite a growing chorus of technical experts who say that undermining encryption would prove an enormous boon for hackers, cybercriminals, foreign spies and terrorists. In a twin pair of appearances before the Senate’s judiciary and intelligence committees on Wednesday, James Comey testified that Isis’s use of end-to-end…

Read More Read More

Featured
OpenSSL to Patch Critical Mystery Bug on Thursday

OpenSSL to Patch Critical Mystery Bug on Thursday

The OpenSSL project team has sent a rather cryptic alert that it will be patching a high severity bug this Thursday, July 9. The announcement is terse: “The OpenSSL project team would like to announce the forthcoming release of OpenSSL versions 1.0.2d and 1.0.1p. These releases will be made available on 9th July. They will fix a single security defect classified as “high” severity.  This defect does not affect the 1.0.0 or 0.9.8 releases.” Unfortunately, the mystery bug is likely…

Read More Read More

Featured
FBI director James Comey calls for ‘robust debate’ to limit digital encryption to combat terror groups

FBI director James Comey calls for ‘robust debate’ to limit digital encryption to combat terror groups

FBI director James Comey has called for public debate on the use of encrypted communications, claiming Americans may not realise how radical groups and criminals are using the technology. Mr Comey’s comments in a blog post appeared to seek further public support for his view — first expressed last year — that improved encryption being developed for digital devices could hinder the efforts of US law enforcement and intelligence operations. While the FBI chief’s comments sparked criticism in the tech…

Read More Read More

Featured
Folder Encryption Software – Ace Secret Folder Has Been Updated to Version 6.66

Folder Encryption Software – Ace Secret Folder Has Been Updated to Version 6.66

Ace Secret Folder, a professional folder encyption software, has been updated to version 6.66 recently. In this new version, we have made great improvements, such as fixed some major and minor bugs. Besides, we enhanced the password hint, the encryption efficiency and strength, and the user interface. Change Log of Ace Secret Folder 6.66: File Name: Ace Secret Folder Version: 6.66 File Size: 2.96MB Language: English License: Trial Version OS Support: Win2000/XP/VISTA/Win 7/Win 8 Released on: Jun.26, 2015 Download Address: http://www.dogoodsoft.com/ace-secret-folder/free-download.html What’s…

Read More Read More

Featured
Professional Folder Encryption Software – Easy Folder Guard Updated to Version 9.01 Recently

Professional Folder Encryption Software – Easy Folder Guard Updated to Version 9.01 Recently

Easy Folder Guard is an excellent folder encryption software that protects your personal folders from prying eyes. You can choose to password-protect, disguise or hide your folders, or protect computer drives t suit you needs. Change Log of Easy Folder Guard 9.01: File Size: 2.62MB Version: 9.01 Released on: July 2, 2015 Category: Encryption Software Language: English License: Trial version Download Address: http://www.dogoodsoft.com/easy-folder-guard/free-download.html What’s New in This Version: – Fixed bug error showing password hint; – Fixed bug unable to auto-close the skin…

Read More Read More

Featured
File Encryption Software Best Encryption Expert Has Been Updated to Version 12.05

File Encryption Software Best Encryption Expert Has Been Updated to Version 12.05

The professional file and folder encryption software – Best Folder Encryptor, has been updated to the version 12.05. In this new version, we fixed some minor bugs. Change Log of Best Encryption Expert 12.03: File Name: Best Encrypiton Expert Version: 12.05 File Size: 3.96MB Category: File/Folder Encryption Software Language: English License: Trial version System Requirements: Win2000/XP/VISTA/Win 7/8 Released on: Jun.15, 2015 Download Address: http://www.dogoodsoft.com/best-encryption-expert/free-download.html What’s New in This Version: – Fixed two minor bugs. Why Choose Best Encryption Expert: Best Encryption Expert…

Read More Read More

Featured
DoGoodSoft Recently Updated Best Disk Lock to Version 2.59

DoGoodSoft Recently Updated Best Disk Lock to Version 2.59

Best Disk Lock is a powerful utility that can completely hide hard disk partitions and CD-ROM drives on your PC, and disable USB storage devices or set them as read-only. In this new version, we have fixed three bugs and made minor enhancements for Best Disk Lock. Change Log of Best Disk Lock: File Size: 3.55MB Version: 2.59 Released on: Jun.23, 2015 Category: System Security Software Language: English License: Trial version Download Address: http://www.dogoodsoft.com/best-disk-lock/free-download.html What’s New in This Version: * Enhanced software interface for…

Read More Read More

Featured
Encryption Software Best Folder Encryptor Updated to Version 16.81

Encryption Software Best Folder Encryptor Updated to Version 16.81

The professinal file and folder encryption software – Best Folder Encryptor has been updated to version 16.81 recently. In this new version, we fixed some bugs and enhanced the efficiency and strength for flash encryption and hiding encryption. Change Log of Best Folder Encryptor: File Name: Best Folder Encryptor Version: 16.81 File Size: 3.42MB Category: Folder Encryption, File Encryption Language: English License: Trial version System Requirements: Win xp/vista/Win 7/Win 8 Released on: Jun.27, 2015 Download Address: http://www.dogoodsoft.com/best-folder-encryptor/free-download.html What’s New in This Version: –…

Read More Read More

Featured
How to recover a saved Wi-Fi password on Android within minutes?

How to recover a saved Wi-Fi password on Android within minutes?

Every now and then you end up with a blanked face when a friend visits your place and tries to connect to your Wi-Fi, while you cannot seem to recall the password, since most default passwords are a combination of letter and numbers. While you feel rather helpless, you need to know that there are certain ways thanks to which you can retrieve the password within minutes, accessible via PC and rooted Android devices. First up, let’s take a look…

Read More Read More

Featured
Software developers are not carrying out encryption properly

Software developers are not carrying out encryption properly

Despite a big push over the past few years to use encryption to combat security breaches, lack of expertise among developers and overly complex libraries have led to widespread implementation failures in business applications. The scale of the problem is significant. Cryptographic issues are the second most common type of flaws affecting applications across all industries, according to a report this week by application security firm Veracode. The report is based on static, dynamic and manual vulnerability analysis of over…

Read More Read More

Featured
DoGoodSoft Recently Released the Latest Version of PC Monitor Expert 1.65

DoGoodSoft Recently Released the Latest Version of PC Monitor Expert 1.65

The well-known computer monitoring software PC Monitor Expert has been updated to the version 1.65, in which fixed a serious problem and some minor bugs. Change Log of PC Monitor Expert: File Name: PC Monitor Expert Version: 1.65 File Size: 3.79 Category: Computer Monitoring Software Language: English License: Trial version System Requirements: win xp/vista/win 7/win 8 Released on: May 18, 2015 Download Address: http://dogoodsoft.com/pc-monitor-expert/free-download.html What’ New in This Version: – Fixed a bug that the action checking Records Storage Folder can be tracked…

Read More Read More

Featured
DoGoodSoft USB Encryptor Recently Updated to Version 7.25

DoGoodSoft USB Encryptor Recently Updated to Version 7.25

USB Encryptor is a professional encryption software for USB sticks, protable hard drives and shared folders, which has been upgraded to the latest version 7.25. The new version fixed some bugs and enhanced the efficiency and strength of Flash Encryption. Change Log of USB Encryptor: File Name: USB Encryptor Version: 7.25 File Size: 1008KB Category: USB Disk/Portable Hard Drive/Shared Folder Encryption Software Language: English License: Trial version System Requirements: win xp/vista/win 7/win 8 Released on: May 05, 2015 Download Address: http://dogoodsoft.com/usb-encryptor/free-download.html …

Read More Read More

Featured
Best Encryption Expert Updated to Version 12.03

Best Encryption Expert Updated to Version 12.03

A powerful file and folder encryption utility–Best Encryption Expert, recently upgraded to the latest version 12.03. This is a major upgrade offering some  significant changes, with the goal  to make Best Encryption Expert easy and powerful for users to employ. Change Log of Best Encryption Expert 12.03: File Name: Best Encrypiton Expert Version: 12.03 File Size: 3.31MB Category: File/Folder Encryption Software Language: English License: Trial version System Requirements: Win2000/XP/VISTA/Win 7/8 Released on: May 24, 2015 Download Address: http://dogoodsoft.com/best-encryption-expert/free-download.html What’s New in This Version: – Fixed…

Read More Read More

Featured
DoGoodSoft Released the Latest Version of CHK File Recovery 1.06

DoGoodSoft Released the Latest Version of CHK File Recovery 1.06

CHK File Recovery, a professional chk file recovery software, has been updated by DoGoodSoft to the Version 1.06. Update Information of CHK File Recovery: File Name: CHK File Recovery Version: 1.06 File Size: 2.82 Category: CHK File Recovery Software Language: English License: Trial version System Requirements: Win2000/XP/VISTA/Win 7/Win 8 Release on: Jun 1, 2015 Download Address: http://dogoodsoft.com/chk-file-recovery/free-download.html What’s New in This Version: 1. Added 6 recoverable file types; 2. The software window could be maximized; 3. Improved software interface; 4. Fixed an interface display…

Read More Read More

Featured
Error Code 5: Access Denied When Decrypt an Encrypted Folder?

Error Code 5: Access Denied When Decrypt an Encrypted Folder?

During the use of our encryption software, if you cannot decrypt the encrypted folders with error message Error Code 5: Access Denied, which was mostly caused by logic error in disk, what you can do is just to fix the disk. How to fix disk to settle down the problem: 1. Your encrypted folder, for example, is in H: drive, click Computer/My Computer, right-click on H: drive, select Properties from the pop-up menu. Choose Tools, and click Check now… 2….

Read More Read More

Featured
Caution needed with anti-encryption tools that dodge data retention surveillance

Caution needed with anti-encryption tools that dodge data retention surveillance

Hot on the heels of Canberra’s successful push for mandatory retention of telco records about who we call, and how much we web surf, and when we email, we sense a new debate about technologies that scramble the actual contents of our communications, so an investigator may be able to work out who we called or mailed, but never what was said or written. Recent media articles have noted that the New South Wales Crime Commission has been hindered by phone systems that encrypt conversations that…

Read More Read More

Featured
Privacy advocates and tech giants support encryption, which the FBI director finds “depressing”

Privacy advocates and tech giants support encryption, which the FBI director finds “depressing”

There’s a privacy battle brewing between the FBI and other federal government groups on one side, and tech companies, cryptologists, privacy advocates (and some elected American lawmakers) on the other. Basically, the FBI (circa-2015 edition) opposes the use of encryption to keep data secure from hackers, on the grounds that the government couldn’t get at it either. So this week, a wide variety of organizations ranging from civil-liberty groups and privacy advocates to tech companies and trade associations to security…

Read More Read More

Featured
Google Hangouts doesn’t use end-to-end encryption

Google Hangouts doesn’t use end-to-end encryption

If you’re using Google Hangouts as your main messaging service, you might want to know that Hangouts doesn’t use end-to-end encryption (E2EE), a must-have feature for messaging services in the post-Snowden world. This was recently confirmed during a Reddit Ask Us Anything (AUA) session by Google’s Richard Salgado, Director for Law Enforcement and Information Security, and David Lieber, Senior Privacy Policy Counsel. As far as messaging services go, end-to-end encryption is a method of encrypting data so that only the…

Read More Read More

Featured
Google admits Hangouts doesn’t use end-to-end encryption, opening the door for government wiretaps

Google admits Hangouts doesn’t use end-to-end encryption, opening the door for government wiretaps

If you’re really worried the government may be keeping tabs on your conversations, then you’d best avoid Hangouts. According to Motherboard, a Google representative confirmed that Hangouts conversations are only encrypted “in transit,” meaning after the message arrives at the intended recipient Google could access it if forced to do so by a government wiretap. The question arose from a Reddit AMA with two senior members of Google’s public policy and legal team. An ACLU representative pinned them down about encryption, but wasn’t…

Read More Read More

Featured
Flawed encryption leaves millions of smart grid devices at risk of cyberattacks

Flawed encryption leaves millions of smart grid devices at risk of cyberattacks

Millions of smart meters, thermostats, and other internet-connected devices are at risk of cyberattacks because they come with easily crackable encryption, a study has warned. A paper by Philipp Jovanovic and Samuel Neves published in late April analyzed the cryptography used in the Open Smart Grid Protocol (OSGP), a group of specifications published by a European telecoms standards body. The protocol is used in more than four million devices, and said to be one of the most widely used protocols…

Read More Read More

Featured
Chinese Version of PC Monitor Expert Updated to Version 1.63

Chinese Version of PC Monitor Expert Updated to Version 1.63

PC Monitor Expert is designed to record all the computer activities, which works as a good helper for parents and computer administrators. For some bugs in the version 1.62 that brought the inconvenience to software users, we have upgraded PC Monitor Expert to version 1.63. Update information of PC Monitor Expert: File Name: PC Monitor Expert Version:   V1.63 File Size:   3.72MB Category:   Computer monitoring software Language:  Chinese License:  Trial version Running on: Win XP/ Vista/7/8 Released on: Apr. 23, 2015…

Read More Read More

Featured
New technology to help users combat mobile malware attacks

New technology to help users combat mobile malware attacks

As mobile phones increase in functionality, they are becoming increasingly ubiquitous in everyday life. At the same time, these devices also are becoming easy targets for malicious activities. One of the primary reasons for such malware explosion is user willingness to download applications from untrusted sources that may host apps with hidden malicious codes. Once installed on a smartphone, such malware can exploit it in various ways. For example, it can access the smartphone’s resources to learn sensitive information about the…

Read More Read More

Featured
Key management is the biggest pain of encryption

Key management is the biggest pain of encryption

Most IT professionals rate the pain of managing encryption keys as severe, according to a new global survey by the Ponemon Institute. On a scale of 1 to 10, respondents said that the risk and cost associated with managing keys or certificates was 7 or above, and cited unclear ownership of keys as the main reason. “There’s a growing awareness of the security benefits of encryption really accrue from the keys,” said Richard Moulds, vice president of product strategy at Thales e-Security,…

Read More Read More

Featured
DHS Chief Says Encryption Threatens National Security

DHS Chief Says Encryption Threatens National Security

Department of Homeland Security (DHS) secretary Jeh Johnson wants the government to work more closely with tech companies on security issues, but it also wants them to dial back their security encryption efforts. Johnson made his comments Tuesday in front of a packed house at the RSA conference in San Francisco, one of the world’s largest annual cybersecurity gatherings. Johnson defended the Obama administration’s ongoing stance, maintaining that tougher encryption by tech firms imposed in the wake of the National…

Read More Read More

Featured
Google is Keeping the NSA Out of Your Data, Eric Schmidt Brags

Google is Keeping the NSA Out of Your Data, Eric Schmidt Brags

Google (GOOGL) Chairman Eric Schmidt boasted on Wednesday about how improving the encryption of Google’s products has successfully shut out warrantless surveillance by the NSA and other law enforcement. Schmidt talked about the encryption advances, and how former NSA contractor Edward Snowden’s leaks prompted them, at BoxDev, a yearly developers conference for Box. “When the Snowden revelations came out, we were very, very upset,” Schmidt told Aaron Levie, CEO of Box. “They never said anything to us. So we embarked upon a…

Read More Read More

Featured
U.S. Secretary Of Homeland Security Warns About The Dangers Of Pervasive Encryption

U.S. Secretary Of Homeland Security Warns About The Dangers Of Pervasive Encryption

In a speech at cybersecurity conference RSA, U.S. Secretary of Homeland Security Jeh Johnson outlined the government’s discomfort with increasing implementation of encryption by technology companies, and what impact the shift might have on national security. While tech firms like Apple are advancing encryption to an increasingly broad set of consumer activities, the government is concerned that it could increasingly be locked out from the communications, and the intentions, of threats to national security. The issue of encryption, who should…

Read More Read More

Featured
Google and Yahoo Encrypting Ad Network Connections

Google and Yahoo Encrypting Ad Network Connections

Google and Yahoo in separate announcements said they will individually encrypt ad network connections to reduce bot traffic and other types of ad fraud. The news coincides with the release of Malwarebytes Labs findings last week. Researchers found malvertising in Flash ads involving the DoubleClick ad network. The two companies have support. The Interactive Advertising Bureau (IAB) continues to push the adoption of HTTPS ads and support encryption. In March, the IAB put out a call for the industry to adopt…

Read More Read More

Featured
Encryption Uncoded: A Consumers’s Guide

Encryption Uncoded: A Consumers’s Guide

Concerned by reports of hacking, data breaches and government spying, companies and consumers are looking for better ways to protect their data. Many are turning to encryption, a method of encoding messages that goes back millennia. Encryption is commonly used to secure online banking sessions and to protect credit-card data. But for the average computer user, it remains a mystery. Here’s a brief guide to help readers unlock its secrets. How does encryption work? If you saw the recent movie…

Read More Read More

Featured
Online Extortionists Are Using Encryption as a Ransom Weapon

Online Extortionists Are Using Encryption as a Ransom Weapon

Most of the time we discuss encryption as a way to protect ourselves online , but an increasingly popular form of digital attack uses it as an extortion tool. Criminals are stealing personal files, encrypting them, and hold them hostage until their targets pay for the decryption key. A report from security firm Symantec details a sharp rise “crypto-ransomware,” its term for this devious form of online crime, noting that these incidents were 45 times more common in 2014 than…

Read More Read More

Featured
The NSA wants a multi-part encryption key for “front door” access to your data

The NSA wants a multi-part encryption key for “front door” access to your data

The US National Security Agency (NSA) appears to be increasingly concerned about the growing adoption of encryption and its ability to thwart the agency’s surveillance efforts. Now, after months of debate with tech firms about government access to encrypted data on smartphones and other devices, the NSA has proposed a solution which it hopes will strike a balance between its desire to know everything about everyone and the average law-abiding citizen’s right to privacy. According to The Washington Post, that solution –…

Read More Read More

Featured
Another Reason For Ubiquitous Web Encryption: To Neuter China’s “Great Cannon”

Another Reason For Ubiquitous Web Encryption: To Neuter China’s “Great Cannon”

China’s web censorship machine, the Great Firewall, has a more offensive brother, researchers have declared today. Called the Great Cannon by Citizen Lab, a research body based at the University of Toronto, it can intercept traffic and manipulate it to do evil things. In recent distributed denial of service (DDoS) attacks on code repository Github, the Great Cannon was used to redirect traffic intended for Baidu , the equivalent of Google in China, to hit two pages on the target…

Read More Read More

Featured
Europol chief warns on computer encryption

Europol chief warns on computer encryption

A European police chief says the sophisticated online communications are the biggest problem for security agencies tackling terrorism. Hidden areas of the internet and encrypted communications make it harder to monitor terror suspects, warns Europol’s Rob Wainwright. “Tech firms should consider the impact sophisticated encryption software has on law enforcement”, he said. A spokesman for TechUK, the UK’s technology trade association, said: “With the right resources and cooperation between the security agencies and technology companies, alongside a clear legal framework for…

Read More Read More

Featured
FBI Quietly Removes Recommendation To Encrypt Your Phone… As FBI Director Warns How Encryption Will Lead To Tears

FBI Quietly Removes Recommendation To Encrypt Your Phone… As FBI Director Warns How Encryption Will Lead To Tears

Back in October, we highlighted the contradiction of FBI Director James Comey raging against encryption and demanding backdoors, while at the very same time the FBI’s own website was suggesting mobile encryption as a way to stay safe. Sometime after that post went online, all of the information on that page about staying safe magically disappeared, though thankfully I screenshotted it at the time: If you really want, you can still see that information over at the Internet Archive or in…

Read More Read More

Featured
Multiple Digital Certificate Attacks Affect 100% of UK Businesses

Multiple Digital Certificate Attacks Affect 100% of UK Businesses

All—as in 100%—of UK organizations have responded to multiple attacks on keys and certificates in the past two years. The Ponemon Institute found that attacks are becoming more widespread as the number of keys and certificates deployed on infrastructure such as web servers, network appliances and cloud services has grown by 40% to almost 24,000 per enterprise over the past two years. Russian cyber-criminals, for instance, recently stole digital certificates from one of the top five global banks, enabling them…

Read More Read More

Featured
Bee behaviour mapped by tiny trackers

Bee behaviour mapped by tiny trackers

A tiny new tracker designed to monitor bee behaviour is being tested by ecologists at Kew Gardens in London. It is made from off-the-shelf technology and is based on equipment used to track pallets in warehouses, said its creator Dr Mark O’Neill. Readers, used to pick up a signal from the kit, are connected to Raspberry Pi computers, which log the readings. The device has a reach of up to 2.5m (8.2ft). Previously used models were restricted to 1cm (0.4in)….

Read More Read More

Featured
Encryption not the way to tackle DStv: DOC

Encryption not the way to tackle DStv: DOC

Government should make better use of regulatory tools and legislation to foster a more competitive environment in South Africa’s pay-television industry rather than requiring that conditional access technology be included in state-subsidised set-top boxes. That’s the view of Solly Mokoetle, the head of the digital migration project at the department of communications (DOC). “The issue of control access is that of pay-TV operators,” says Mokoetle. Government’s role in the digital migration process, he says, is to ensure that it happens…

Read More Read More

Featured
Encryption today: how safe is it really?

Encryption today: how safe is it really?

When checking your email over a secure connection, or making a purchase from an online retailer, have you ever wondered how your private information or credit card data is kept secure? Our information is kept away from prying eyes thanks to cryptographic algorithms, which scramble the message so no-one else can read it but its intended recipient. But what are these algorithms, how did they come to be widely used, and how secure really are they? Coded messages The first…

Read More Read More

Featured
New bugs uncovered in encryption software

New bugs uncovered in encryption software

New bugs in the widely used encryption software known as OpenSSL were disclosed on Thursday, though experts say do not pose a serious threat like the “Heartbleed” vulnerability in the same technology that surfaced a year ago. “Heartbleed” triggered panic throughout the computer industry when it was reported in April 2014. That bug forced dozens of computers, software and networking equipment makers to issue patches for hundreds of products, and their customers had to scour data centers to identify vulnerable…

Read More Read More

Featured
Yahoo Rolls Out End-To-End Encryption For Email

Yahoo Rolls Out End-To-End Encryption For Email

Back in 2012 (pre-Snowden!), we wrote about why Google should encrypt everyone’s emails using end-to-end encryption (inspired by a post by Julian Sanchez saying the same thing. Since then, securing private communications has become increasingly important. That’s why we were happy to see Google announce that it was, in fact, working on a project to enable end-to-end encryption on Gmail, though it was still in the early stages. In December of last year, Google moved that project to Github, showing…

Read More Read More

Featured
Can software-based POS encryption improve PCI compliance?

Can software-based POS encryption improve PCI compliance?

In the wake of the recent Verizon report that shows that 80 percent are out of PCI DSS compliance between audits, some vendors are urging the PCI Council to consider approving software-based point-to-point encryption, in addition to the current hardware-based standard. PCI-approved, hardware-based P2PE allows merchants to drastically shrink the systems subject to compliance, reducing both risks and costs, and will make it easier to stay compliant. Self-destructing hardware is a “security bonus,” but in general, hardware-based P2PE technology is…

Read More Read More

Featured
Tired of forgetting your password? Yahoo says you don’t need one any more

Tired of forgetting your password? Yahoo says you don’t need one any more

Passwords: easily forgotten, but also easily guessed. It’s a bitter irony that minutes can be spent racking brains trying to remember whether a required security question answer is a pet’s name, first school or place of birth – meanwhile a cyber-criminal is merrily typing in a person’s favourite colour and relieving bank accounts of hard-earned wages. Well, now Yahoo might have made the process easier – at least when it comes to accessing email. The Californian tech giant is rolling…

Read More Read More

Featured
Yahoo puts email encryption plugin source code up for review

Yahoo puts email encryption plugin source code up for review

Yahoo released the source code for a plugin that will enable end-to-end encryption of email messages, a planned data-security improvement prompted by disclosures of U.S. National Security Agency snooping. The company is asking security experts to look at its code, published on GitHub, and report vulnerabilities, wrote Alex Stamos, Yahoo’s chief information security officer, in a blog post. The plugin should be ready by year end, wrote Stamos, who gave a presentation on Sunday at the South by Southwest conference…

Read More Read More

Featured
China backs off legal push that would force foreign tech companies to hand over encryption keys

China backs off legal push that would force foreign tech companies to hand over encryption keys

“They have decided to suspend the third reading of that particular law, which has sort of put that on hiatus for the moment,” White House Cybersecurity Coordinator Michael Daniel said earlier this week, asnoted by Reuters. “We did see that as something that was bad not just for U.S. business but for the global economy as a whole, and it was something we felt was very important to communicate very clearly to them.” If China has pressed forward, it could…

Read More Read More

Featured
How Encryption Software Works in Enterprises’Data Leakage-proof?

How Encryption Software Works in Enterprises’Data Leakage-proof?

For modern enterprises, the trend in information computerization’s development means the data is not only the assets, but is the reflection of enterprise’s core competitiveness. To make your enterprises remain invincible in the fierce business competition, you should protect the sensitive and key data of enterprise effectively. In reality, data leakage will lead to economic losses or even more troubles. With the development of Internet, the boundary between Intranet and Extranet is becoming blurred because the Intranet and outside world…

Read More Read More

Featured
Computer-stored encryption keys are not safe from side-channel attacks

Computer-stored encryption keys are not safe from side-channel attacks

Figure A: Tel Aviv University researchers built this self-contained PITA receiver. Not that long ago, grabbing information from air-gapped computers required sophisticated equipment. In my TechRepublic column Air-gapped computers are no longer secure, researchers at Georgia Institute of Technology explain how simple it is to capture keystrokes from a computer just using spurious electromagnetic side-channel emissions emanating from the computer under attack. Daniel Genkin, Lev Pachmanov, Itamar Pipman, and Eran Tromer, researchers at Tel Aviv University, agree the process is…

Read More Read More

Featured
CIA spent last 10 years cracking Apple’s encryption

CIA spent last 10 years cracking Apple’s encryption

The CIA has been trying to crack Apple’s encryption for nearly 10 years. According to a report by The Intercept, the CIA began trying to crack Apple’s encryption in 2006 using funds from the “black budget.”  The researchers who worked on breaking down Apple’s privacy wall were purportedly based at Sandia National Laboratories. Although the report did expose the CIA’s effort, it did not tell us much about whether or not the agency succeeded in meeting their objectives.  What it…

Read More Read More

Featured
How to Encrypt Data on Portable Hard Drives with Encryption Software?

How to Encrypt Data on Portable Hard Drives with Encryption Software?

In recent years, portable hard drives play a major role in the field of data storage, so people pay more and more attention to its security. Just think of that you stored all of your personal documents, private images, user info and other important data on a normal portable hard drive, which is unavoidably stolen or lost. Portable hard drives, as a common storage medium, have been widely used in various aspects. So how to safely use portable hard drives…

Read More Read More

Featured
Encryption is gone, communications minister Muthambi restates

Encryption is gone, communications minister Muthambi restates

Government-provided set-top boxes for digital terrestrial television will not contain conditional access based on encryption, and prospective pay-television operators wanting to use such a system will have to deploy their own boxes to subscribers. That’s according to a statement, issued at the weekend by communications minister Faith Muthambi, in which she makes it clear that conditional access will not feature in the final amended policy on broadcasting digital migration. The move appears to be a victory for MultiChoice and the…

Read More Read More

Featured
Microsoft Windows also vulnerable to ‘FREAK’ encryption flaw

Microsoft Windows also vulnerable to ‘FREAK’ encryption flaw

Computers running all supported releases of Microsoft Windows are vulnerable to “FREAK,” a decade-old encryption flaw that leaves device users vulnerable to having their electronic communications intercepted when visiting any of hundreds of thousands of websites, including Whitehouse.gov, NSA.gov and FBI.gov. The flaw was previously thought to be limited to Apple’s Safari and Google’s Android browsers. But Microsoft warned that the encryption protocols used in Windows — Secure Sockets Layer and its successor Transport Layer Security — were also vulnerable…

Read More Read More

Featured
Building backdoors into encryption isn’t only bad for China, Mr President

Building backdoors into encryption isn’t only bad for China, Mr President

Want to know why forcing tech companies to build backdoors into encryption is a terrible idea? Look no further than President Obama’s stark criticism of China’s plan to do exactly that on Tuesday. If only he would tell the FBI and NSA the same thing. In a stunningly short-sighted move, the FBI – and more recently the NSA – have been pushing for a new US law that would force tech companies like Apple and Google to hand over the…

Read More Read More

Featured
How to Encrypt Folder in “Encryption Year”?

How to Encrypt Folder in “Encryption Year”?

Recently, the president of United States Barack Obama called himself “a firm believer of strong encryption” when he visited Silicon Valley. Although some people criticized Obama for vague statement, the actual networking environment is really worrying, and the data security is more of concern, so data encryption appears to be more important. That is someone regards 2015 as an “Encryption Year”. When it comes to encryption year, we talk about how to better encrypt folders in the new year. Want…

Read More Read More

Featured
Samsung is still lying about the encryption on its Smart TVs

Samsung is still lying about the encryption on its Smart TVs

When news broke that Samsung’s Smart TV’s listened to conversations and sent them to a third-party server company, the Korean manufacturer countered by claiming that all data transmissions to and from its televisions were encrypted. When testing demonstrated that the data in question wasn’t encrypted (despite being sent via Port 443, which is typically used for HTTPS traffic), Samsung modified its stance, claiming that new TVs were encrypted properly but older sets were not. This, too, has now been proven…

Read More Read More

Featured
QR codes with advanced imaging and photon encryption protect computer chips

QR codes with advanced imaging and photon encryption protect computer chips

QR, or Quick Response, codes — those commonly black and white boxes that people scan with a smartphone to learn more about something — have been used to convey information about everything from cereals to cars and new homes. But, University of Connecticut (UConn) researchers think the codes have a greater potential: protecting national security. Using advanced 3-D optical imaging and extremely low light photon counting encryption, Board of Trustees Distinguished Professor Bahram Javidi and his research team have taken…

Read More Read More

Featured
Chinese Version of PC Monitor Expert Updated to Version 1.62

Chinese Version of PC Monitor Expert Updated to Version 1.62

PC Monitor Expert is a trusted computer monitoring product. It can capture every keystroke, Chat, Instant Message, visited website, screenshot, running program, application and etc of the monitored computer. It can also block the use of any program, app, chatting software, downloading software or game software as you want. Once found opening a prohibited program, the program will be closed forcibly and this act will be recorded. Meanwhile, PC Monitor Expert can send monitoring record to your e-mail which makes…

Read More Read More

Featured
DoGoodSoft Releases Best Folder Encryptor 16.75 with Higher Security

DoGoodSoft Releases Best Folder Encryptor 16.75 with Higher Security

DoGoodSoft, one of the leading security software developers in China, offers better-in-class software for both individual and enterprise users at home and abroad. Recently, it released the latest version of its encryption software Best Folder Encryptor. In this new version, DoGoodSoft fixed certain bugs by which users will feel more security to protect their important files and folders in the computer. Besides, the company also improved user experience. Best Folder Encryptor is a professional file and folder encryption software, which…

Read More Read More

Featured
Ace Secret Disk – Protect Data Security by Creating Secret Disk on Computer

Ace Secret Disk – Protect Data Security by Creating Secret Disk on Computer

When it comes to the issue of information security, most people should be afraid but cannot come up with any solution to get rid of it. Here a well-known utility called Ace Secret Disk may settle down the headache. It is designed to be a secure tool for users to protect their data or information from leakage. Ace Secret Disk is a kind of safe and stable encryption software that allows users to create one or more additional virtual disks…

Read More Read More

Featured
Fabulous CHK File Recovering Software – CHK File Recovery from DoGoodSoft

Fabulous CHK File Recovering Software – CHK File Recovery from DoGoodSoft

DoGoodSoft, one of the famous security software developers whose software is with high awareness, high quality and high loyalty, recommends an advanced file recovering tool CHK File Recovery to users. CHK File Recovery features recovering more than 100 common file types in a quick and easy way, the file type including mp3, mp4, jpg, bmp, gif, png, avi, mov, mpg, wma, wmv, doc, docx, xls, xlsx, ppt, pptx, zip, rar, exe, dll, sql, mdb, psd and so on. By default,…

Read More Read More

Featured
DoGoodSoft Updated Magic Timed Shutdown to Version 9.96

DoGoodSoft Updated Magic Timed Shutdown to Version 9.96

Professional PC auto-shutdown software-Magic Timed Shutdown is updated to version 9.96. In this version optimize software performance and fix a Bug. Latest Version Information of Magic Timed Shutdown: Version: V9.96 File Size: 4324KB Category: Timed Shutdown Software Language: English License Type: Trial Version Operating System(s): Win XP/Vista/7 Last Updated On: March 8th, 2012 Download:http: www.dogoodsoft.com/magic-timed-shutdown/free-download.html What’s New in This Version: + Optimized software performance; –  Fixed a Bug. Introduction of Magic Timed Shutdown: Magic Timed Shutdown is a professional PC…

Read More Read More

Featured
Guard vital and private data on mobile devices with DoGoodSoft USB Encryptor

Guard vital and private data on mobile devices with DoGoodSoft USB Encryptor

The latest Global Study on Mobility Risks shows that the phenomena of enterprises’ introduction of mobile devices and employees’ carrying of mobile devices are overhead current enterprise security system and security policy. Websense also said that 51% of enterprise data leakage is caused by mobile devices. Besides, according to one research on IT persons offered by Ponemon Institute indicates that 63% of data revelation results from mobile devices; only 28% comes from desktop computer. To better protect the data on…

Read More Read More

Featured
The preferred choice to protecting individual privacy-Best Encryption Expert

The preferred choice to protecting individual privacy-Best Encryption Expert

With Information Age’s arrival, what can we do for protecting our privacy? Except the legal restraint, we should also make an active contribution to protecting our privacy. So, it is necessary to install one kind of encryption software. Now, we will show you how to encrypt our private folders in computer, just taking Best Encryption Expert for an example. 1. Download Best Encryption Expert Download:http://www.dogoodsoft.com/best-folder-encryptor/free-download.html 2. Encrypting private files In the computer, select the file/folder you want to encrypt, and…

Read More Read More

Featured
Luoyang Xiabing Software Technologies Ltd Recently Released Ace Secret Folder For Data Security

Luoyang Xiabing Software Technologies Ltd Recently Released Ace Secret Folder For Data Security

Ace Secret Folder is a kind of folder encryption software which makes your folder “secret” and invisible, providing strong shield to protect your important documents and privacy. It features four characters: completely invisible after installation, simple Hotkey invocation, folders disappearance after encryption and fast encryption and decryption. Features The program will become unseen and invisible without any trace after installation, and no one can perceive its existence. It is beyond all doubt that Ace Secret Folder is suitable to be…

Read More Read More

Featured
Meet New English Version of Ease Folder Guard

Meet New English Version of Ease Folder Guard

Dogoodsoft recently announces the release of the new version of Ease Folder Guard in English. Ease Folder Guard offers the professional and powerful features for protecting personal folders from prying eyes. Disk protection and other functions are included. Also, it is easy to operate. Ease Folder Guard protects folders in three different ways – password protect folders, hide folders and disguise folders. Password protection means to add a password before using a folder. After that, the password is a must…

Read More Read More

Featured
Best Encryption Expert Will Be the Escort for Your Data Security

Best Encryption Expert Will Be the Escort for Your Data Security

DoGoodSoft now recommends Best Encryption Expert – a perfect and easy-to-use application that combines file/folder encryption, folder protection, disk protection and other enhanced features. It had been acknowledged as the best choice for those who have the urgent need to protect data security. Best Encryption Expert encrypts files and folders in various ways. With advanced encryption algorithms and superfast encryption speed, the encrypted files and folders will be super strong in strength and be faultless. Folder protection includes folder password…

Read More Read More

Featured
DoGoodSoft Magic Timed Shutdown is a Good Helper for Parents and Managers

DoGoodSoft Magic Timed Shutdown is a Good Helper for Parents and Managers

DoGoodSoft recommends its monitoring and control product, Magic Timed Shutdown, an advanced and powerful tool permitting you to schedule certain tasks for your computer. It is known for four major features—Timed Shutdown, PC Management, Timed Limit and Log Analysis, which make Magic Timed Shutdown be a very good helper for users, especially for parents and managers. Magic Timed Shutdown is launched  for more users’ convenience About Magic Timed Shutdown Magic Timed Shutdown is an excellent monitoring and control tool for concerned parents…

Read More Read More

Featured
USB Encryptor Shields Data on Portable Devices

USB Encryptor Shields Data on Portable Devices

It is small and light instead of clumsy. Data stored on flash drives is impervious to mechanical shock, magnetic fields, scratches and dust, plus they plug and unplug from the computer easily. These properties make flash drives suitable for transporting data from place to place and keeping the data readily at hand. USB flash drives began to really catch on with computer users, who have come to rely on such portable device in almost everywhere. They have become an invaluable…

Read More Read More

Featured
Can Anti-virus Software be Powerful

Can Anti-virus Software be Powerful

Whether you sit back and relax with your PC installed anti-virus software? Whether you believe and depend on it completely? If yes, you’re badly wrong. On May 18, 2007, the case of Norton manslaughter shocked the whole world. After Norton upgraded the virus database, it isolated and removed the system files netapi32.dll and Isasrv.dll of Windows XP, and the system would be paralyzed after reboot, which caused the system crashes. Dramatically, Kaspersky also accompanied Nordon at the same time. It…

Read More Read More

Featured
Encryption Software Fight Against Malware

Encryption Software Fight Against Malware

With the speedy development of technologies, as this trend going, data security becomes more and more significant. While enjoying a million merits and convenience technology brings, there is still one thing to consider, the networking and information security are growing to be a big concern. Allow me ask you one question: When mentioned data security, what comes to your mind at first thought? Yes, hacker, malware, Trojan, virus, messy code your answers may vary to continue the list. Although security…

Read More Read More

Bitcoin Exchange Has Been Forced to Close After Second Cyber-Attack

Bitcoin Exchange Has Been Forced to Close After Second Cyber-Attack

A South Korean Bitcoin exchange has been forced to close after suffering another major cyber-attack. Youbit claimed it was “very sorry” but has filed for bankruptcy after it suffered the cyber-attack, less than eight months after the first. In a statement in Korean on its homepage the firm said it had lost 17% of its assets in the raid, with all deposits and withdrawals now halted. However, customers will get back the majority of their investments — with the firm…

Read More Read More

How to open Best Folder Encryptor if you forgot the admin password?

How to open Best Folder Encryptor if you forgot the admin password?

“I used the encryption software Best Folder Encryptor to encrypt my files. To be safer, I have set an admin password for the software. But now I forgot the password. Is there a way to retrieve the admin password?” It’s very common for users to set an admin password for the encryption software Best Folder Encryptor, which is safer for the encryption files. But, what if you forgot the password? If you can’t remember or retrieve the password, the encryption…

Read More Read More