Best Folder Encryptor Has Updated to Version 16.97

The professional file and folder encryption software – Best Folder Encryptor has been updated to version 16.97. The new version fixed bug that the control board cannot be closed after a Flash- and Hiding-encrypted folder is opened because of misjudgment, made some improvements and optimization, and several minor bug fixes. For more details about Best […]

Continue reading

North Korean Hackers Blamed for Bitcoin Attacks

North Korean state hackers are increasingly looking to steal crypto-currency to fund the regime and circumvent tightening sanctions, according to FireEye. The security vendor’s ‎senior cyber threat intelligence analyst, Luke McNamara, revealed a spike in spear-phishing attacks targeting South Korean Bitcoin exchanges since May. The timing is important because April saw the US announce increased […]

Continue reading

Why You Need Private Browsing

If you thought browsing securely (and privately) was as easy as opening a new incognito window, think again. Private browsing is all the rage now that it’s necessary in order to access certain websites in some countries. Luckily, there are lots of ways to access the web that doesn’t require Safari, Firefox, or Chrome. There […]

Continue reading

French official begins anti-encryption campaign

This story was delivered to BI Intelligence Apps and Platforms Briefing subscribers. To learn more and subscribe, please click here. A French official plans to begin mobilizing a global effort — starting with Germany — against tech companies encrypting their messaging apps, according to Reuters. Messaging apps, such as Telegram and WhatsApp, that promote end-to-end […]

Continue reading

Google finally adds HSTS encryption to google.com

Google, known for its security practices, has finally brought HTTP Strict Transport Security (HSTS) to google.com to strengthen its data encryption. HSTS helps protect against eavesdroppers, man-in-the-middle attacks, and hijackers who attempt to spoof a trusted website. Chrome, Safari, and Internet Explorer all support HSTS. “HSTS prevents people from accidentally navigating to HTTP URLs by […]

Continue reading

Hacker finds breach in WhatsApp’s encryption system

A security expert has found a breach in WhatsApp’s supposed ‘end-to-end’ encryption system. On earlier 2016, the Facebook-owned company proudly announced that messages would feature end-to-end encryption, thus giving users the tranquility that their private conversations would remain untouched. Jonathan Zdziarski, a digital forensic specialist and digital security expert, published an article on Thursday with […]

Continue reading

US wiretap operations encountering encryption fell in 2015

The US government has been very vocal recently about how the increase in encryption on user devices is hampering their investigations. The reality is that according to a report from the Administrative Office of U.S. Courts, law enforcement with court-ordered wiretaps encountered fewer encrypted devices in 2015 than in 2014. In regards to encrypted devices, […]

Continue reading

Apple to expand encryption on Macs

Apple is amping up its commitment to encryption. The company is beginning the first major overhaul of the Mac filing system — the way it stores files on the hard drive — in more than 18 years. The move was quietly announced during a conference break out session after Apple’s blockbuster unveiling of its new […]

Continue reading

Amazon is going to remove encryption capabilities of its Kindle Fire, Rumours says Apple & FBI Case is reason – Lansing Technology Time

According to Amazon, Removing Kindle Fire,Fire OS 5’s onboard encryption is not a new development, and it’s not related to the iPhone fight Amazon said that the Fire OS 5 update removed local device encryption support for the Kindle Fire, Fire Phone, Amazon Fire HD, or Amazon Fire TV Stick was because the feature simply […]

Continue reading

UK’s lower house eases up on encryption

The United Kingdom’s House of Commons approved far-reaching authority for spy agencies to access cyber data Tuesday, but pulled back some restrictions on encryption opposed by Apple and Facebook. The so-called “snooper’s charter,” officially the Investigatory Power Act, codifies intelligence agencies’ use of metadata analysis and malware to hack computers that has been ongoing in […]

Continue reading

Customer Headaches Could Curtail Apple’s Encryption Push

At an event held during Apple’s fight with the FBI over whether it should help unlock a dead terrorist’s iPhone, CEO Tim Cook promised “We will not shrink” from the responsibility of protecting customer data —including from government overreach. Yet the obvious next step for the company could be hard to take without inconveniencing customers. […]

Continue reading

HelpSystems Fills Encryption Gap With Linoma Buy

Despite all the IBM i security vendors that HelpSystems has bought over the years–and there have been at least five of them–the company has lacked one key security capability valued by enterprises: encryption. With last week’s deal to acquire Linoma Software, the Minneapolis software vendor has finally obtained that encryption capability for IBM i. HelpSystems […]

Continue reading

Allo doesn’t offer default end-to-end encryption setting because it would disable Google Assistant

When Google unveiled Allo — their smart messaging app coming soon to Android and iOS — one of the more interesting features they revealed was end-to-end encryption. As we later learned, the technology powering Allo’s end-to-end encryption was built upon Signal Protocol, the same open-source protocol from Open Whisper Systems that WhatsApp currently uses. We’ve […]

Continue reading

OSGP custom RC4 encryption cracked yet again

The Open Smart Grid Protocol’s (OSGP) home-grown RC4 encryption has been cracked once again. The easy-to-break custom RC4 was cracked last year. A year ago, the OSGP Alliance advised that better security would be implemented, but the RC4 still remains according to German researchers Linus Feiten and Matthias Sauer. Feiten and Sauer claim to have […]

Continue reading

John McAfee claims to have hacked WhatsApp’s encrypted messages, but the real story could be different

Last month, WhatsApp enabled end-to-end encryption for its billion users to secure all the communications made between users — be it a group chat, voice calls, personal chats or the photos and videos that are being shared. While WhatsApp says it is difficult even for them to access the conversations, cybersecurity expert John McAfee and […]

Continue reading

Legal effects of encryption bills discussed at dark web event

An attorney who has worked for the U.S. Army and the Central Intelligence Agency discussed attempts to regulate encryption technologies at the Inside Dark Web conference in New York City on Thursday. “State legislative response may be un-Constitutional, because it would place a burden on interstate commerce,” said Blackstone Law Group partner Alexander Urbeis. “So […]

Continue reading

American ISIS Recruits Down, but Encryption Is Helping Terrorists’Online Efforts, Says FBI Director

The number of Americans traveling to the Middle East to fight alongside Islamic State has dropped, but the terrorist group’s efforts to radicalize people online is getting a major boost from encryption technology, FBI Director James Comey said Wednesday. Since August, just one American a month has traveled or attempted to travel to the Middle […]

Continue reading

Users’interest should drive encryption policy: IAMAI

Encryption is a fundamental and necessary tool to safeguard digital communication infrastructure but the interests of Internet users should be foremost in framing any policy, the Internet and Mobile Association of India (IAMAI) said here on Tuesday. “Trust, convenience and confidence of users are the keywords to designing an ideal encryption policy that will help […]

Continue reading

The encryption challenge

IT managers know the movies get it wrong. A teenager with a laptop cannot crack multiple layers of encryption — unless that laptop is connected to a supercomputer somewhere and the teenager can afford to wait a few billion years. Encryption works. It works so well that even the government gets stymied, as demonstrated by […]

Continue reading

FBI: Encryption increasing problem

The FBI is facing an increasing struggle to access readable information and evidence from digital devices because of default encryption, a senior FBI official told members of Congress at a hearing on digital encryption Tuesday. Amy Hess said officials encountered passwords in 30 percent of the phones the FBI seized during investigations in the last […]

Continue reading

How Apple makes encryption easy and invisible

Do you know how many times a day you unlock your iPhone? Every time you do, you’re participating in Apple’s user-friendly encryption scheme. Friday, the company hosted a security “deep dive” at which it shared some interesting numbers about its security measures and philosophy as well as user habits. To be honest, we’re less concerned […]

Continue reading

Feinstein encryption bill sets off alarm bells

A draft version of a long-awaited encryption bill from Sens. Dianne Feinstein, D-Calif., and Richard Burr, R-N.C., was leaked online last week, and the technology industry is already calling foul. The bill requires any company that receives a court order for information or data to “provide such information or data to such government in an […]

Continue reading

“Petya” ransomware encryption cracked

Utility generates unscrambling key. Users whose data has been held to ransom by the Petya malware now have an option to decrypt the information, thanks to a new tool that generates an unscrambling key. Petya appeared around March this year. Once executed with Windows administrator privileges, Petya rewrites the master boot record on the computer’s […]

Continue reading

Apple-FBI fight may be first salvo in encryption war

The Apple-FBI fight may just be the opening salvo in a broader war over encryption, as technology companies continue to lock up their users’ messages, photos and other data to shield them from thieves and spies — and, incidentally, criminal investigators. WhatsApp, the globally popular messaging system owned by Facebook, has already run into trouble […]

Continue reading

Debate over tech tools’encryption

Before the San Bernardino terror attack, Syed Rizawan Farook’s iPhone was just one fancy Apple device among hundreds of millions worldwide. But since the California government worker and his wife shot and killed 14 people on December 2, apparently inspired by extremist group IS, his iPhone 5c has become a key witness – and the […]

Continue reading

Google closing in on target of full encryption

Google is disclosing how much of the traffic to its search engine and other services is being protected from hackers as part of its push to encrypt all online activity. Encryption shields 77 percent of the requests sent from around the world to Google’s data centers, up from 52 percent at the end of 2013, […]

Continue reading

Obama: ‘Absolutist view’ on encryption not answer

President Barack Obama said Friday that the encryption versus national security debate, currently being played out in Apple’s legal fight against the federal government, won’t be settled by taking an “absolutist view.” Addressing an audience of tech enthusiasts meeting in the Texas capital, Obama said both values are important. He restated his commitment to strong […]

Continue reading

New FBI strategy wins back lost ground in encryption fight

By July 2015, FBI Director Jim Comey knew he was losing the battle against sophisticated technologies that allowed criminals to communicate without fear of government surveillance. In back-to-back congressional hearings that month, Comey struggled to make the case that terrorists and crooks were routinely using such encryption systems to evade the authorities. He conceded that […]

Continue reading

Amazon Dropping Fire Encryption Has Nothing to Do With Apple

Today, several reports pointed out that Amazon’s Fire OS 5 does not support device encryption, drawing a connection between the company’s encryption retreat and the current Apple-FBI iPhone unlocking fracas. But Amazon’s decision to remove Fire OS 5’s onboard encryption is not a new development, and it’s not related to the iPhone fight. The real […]

Continue reading

U.S.Defense Secretary Ashton Cater Doesn’t Believe in Encryption Backdoors

Secretary of Defense Ashton Carter came out against supporting encryption back-doors at a conference panel on Wednesday. At the RSA information security conference in San Francisco, Carter told a packed room that he supported strong encryption and thought back-door access to encrypted communication as unrealistic. During his talk on the Apple vs. FBI case, which […]

Continue reading

What Tim Cook doesn’t want to admit about iPhones and encryption

When Hillary Clinton called for a “Manhattan-like project” to find a way for the government to spy on criminals without undermining the security of everyone else’s communications, the technology world responded with mockery. “Also we can create magical ponies who burp ice cream while we’re at it,” snarked prominent Silicon Valley investor Marc Andreessen. Clinton’s […]

Continue reading

Google CEO Pichai Lends Apple Support on Encryption

Google Chief Executive Sundar Pichai lent support to Apple Inc.’s  pushback against a federal order to help law enforcement break into the locked iPhone of an alleged shooter in the San Bernardino, Calif., attacks. Mr. Pichai wrote on Twitter on Wednesday that “forcing companies to enable hacking could compromise users’ privacy.” A federal judge Tuesday […]

Continue reading

Encryption May Hurt Surveillance, but Internet Of Things Could Open New Doors

Tech companies and privacy advocates have been in a stalemate with government officials over how encrypted communication affects the ability of federal investigators to monitor terrorists and other criminals. A new study by Harvard’s Berkman Center for Internet and Society convened experts from all sides to put the issue in context. The report concluded that […]

Continue reading

McCaul: US playing ‘catchup’ to terrorists using encryption

The U.S. is playing “catchup” with terrorists and cyber vigilantes who coordinate via encrypted communications, according to the chairman of the House Homeland Security Committee. “Today’s digital battlefield has many more adversaries that just nation states,” Rep. Michael McCaul (R-Texas) said in a Tuesday column for Bloomberg. “Terrorist groups such as ISIS [the Islamic State in […]

Continue reading

Half-Measures on Encryption Since Snowden

When the NSA subcontractor Edward Snowden released classified documents in June 2013 baring the U.S. intelligence community’s global surveillance programs, it revealed the lax attention to privacy and data security at major Internet companies like Apple, Google, Yahoo, and Microsoft. Warrantless surveillance was possible because data was unencrypted as it flowed between internal company data […]

Continue reading

AT&T CEO won’t join Tim Cook in fight against encryption backdoors

US politicians have been urging tech companies to weaken the security of smartphones and other products by inserting encryption backdoors that let the government access personal data. Numerous tech companies—including Apple—have come out strongly against the idea, saying that encryption backdoors would expose the personal data of ordinary consumers, not just terrorists. But tech company […]

Continue reading

There is no ‘compromise’ in encryption debate between Silicon Valley and government leaders

During last night’s democratic debate we were once again inundated with calls from politicians who sought compromise from Silicon Valley in its on-going battle with terrorism. Encryption was the point of contention. The candidates echoed previous statements regarding the dangerous world we live in. The reason for danger, or so it goes, is the inability […]

Continue reading

Congress wades into encryption debate with bill to create expert panel

WASHINGTON — Growing concern about terrorists’ use of encrypted communication is spurring Congress to act, but the first major piece of legislation is taking a cautious approach as lawmakers grapple with how to spy on suspected criminals without weakening cybersecurity and privacy. House Homeland Security Committee Chairman Michael McCaul, R-Texas, and Sen. Mark Warner, D-Va., […]

Continue reading

Ubuntu Touch to Support Encryption of User Data

The Ubuntu Touch operating system is also going to provide support for encryption of user data, developers have revealed. It wasn’t a secret that Ubuntu Touch will get encryption, but it’s also not listed as an upcoming feature. It’s buried in a wiki entry with plans for Ubuntu Touch, but it’s nice to see that […]

Continue reading

Lawmakers push for commission on encryption

Congress should create a national commission to investigate the difficulties encryption has created for law enforcement, a bipartisan pair of lawmakers argued Monday in a Washington Post op-ed. “Congress must be proactive and should officially convene a body of experts representing all of the interests at stake so we can evaluate and improve America’s security […]

Continue reading

Paris attack planners used encrypted apps, investigators believe

French counterterrorism investigators believe that the men suspected in last month’s Paris attacks used widely available encryption tools to communicate with each other, officials familiar with the investigation said, raising questions about whether the men used U.S.-made tools to hide the plot from authorities. Investigators have previously said that messaging services WhatsApp and Telegram were […]

Continue reading

FBI Director: Silicon Valley’s encryption is a “business model problem”

Leaders in both major political parties have increasingly been calling on tech companies to give law enforcement encryption backdoors in the wake of recent terror attacks in Paris and California. Today, FBI director James Comey has suggested that Silicon Valley isn’t faced with a serious technical problem, but rather a “business model problem,” according to […]

Continue reading

McCaul wants new commission on encryption and law enforcement

The chairman of the House Homeland Security Committee said he plans to introduce legislation that would allow the creation of a “national commission on security and technology challenges in the Digital Age.” The legislation “would bring together the technology sector, privacy and civil liberties groups, academics, and the law enforcement community to find common ground,” […]

Continue reading

Apple, Google encryption is a blow to public safety

A November 2015 report of the Manhattan District Attorney’s Office in New York City sets forth succinctly a huge public safety problem of which most Americans are unaware: “Most people today live their lives on smartphones, and, in this regard at least, criminals are no different. While in the past criminals may have kept evidence […]

Continue reading

Why Government and Tech Can’t Agree about Encryption

Your g better and better at protecting your privacy. But Uncle Sam isn’t totally comfortable with that, because it’s also complicating the work of tracking criminals and potential national-security threats. For decades, tech companies have steadily expanded the use of encryption — a data-scrambling technology that shields information from prying eyes, whether it’s sent over […]

Continue reading

The secret American origins of Telegram, the encrypted messaging app favored by the Islamic State

An encrypted communications app called Telegram has been in the news a lot this week, amid fears that the Islamic State has adopted it as its preferred platform for messaging. On Nov. 18, Telegram reportedly banned 78 ISIS-related channels, “disturbed” to learn how popular the app had become among extremists. Those extremists had used the […]

Continue reading

Paris attacks reignite debate over encryption,surveillance and privacy

WASHINGTON — Friday’s terrorist attacks in Paris have revived the debate over whether U.S. tech companies should be required to build “backdoors” into encrypted phones, apps and Internet sites to let law enforcement conduct surveillance of suspected terrorists. There has been widespread speculation among law enforcement authorities and the media that the Islamic State terrorists […]

Continue reading

Paris attack stokes the flames in fight over US data encryption

Last week’s terrorist attack on Paris sounded a call to arms for hawkish U.S. officials seeking broad oversight of encrypted digital communications, some of whom used the opportunity to rekindle discussions with Silicon Valley technology companies. In an interview with MSNBC on Monday, Senator Diane Feinstein (D-Calif.) said Silicon Valley companies, particularly those marketing secure […]

Continue reading

Microsoft releases encryption tech for bioinformatics

Allows researchers to work on data securely. Microsoft has released tools that allow bioinformatics researchers to work on genome data sets securely to protect privacy. Genomic data is becoming available in increasing amounts as gene sequencing becomes easier, cheaper and faster, and is used for several new applicaitons such as predicting the occurrence and survival […]

Continue reading

Apple’s Encryption Fight Turns To The UK

After a major victory in the United States, Apple is facing an another threat to its encryption efforts on a different front: the United Kingdom. The Cupertino-based tech giant typically shies away from taking firm stances on specific legislation and works through lobbying groups representing technology companies’ interests. Apple’s CEO Tim Cook today told students […]

Continue reading

Snowden Never Told Us About Ransom Encryption

While Edward Snowden is the source behind the largest scandal on the internet, he sure didn’t warn us that hackers would put ransoms onto their spyware. A special ransomware virus was discovered which targets Linux-based systems specifically, and it’s telling us hackers are expanding to web browsers for their vicious attacks. This specific malware, labeled […]

Continue reading

Investigatory Powers Bill could allow Government to ban end-to-end encryption, technology powering iMessage and WhatsApp

The new Investigatory Powers Bill could ban WhatsApp and iMessage as they currently exist and lead to the weakening of security. Introducing the Bill this week, Home Secretary Theresa May said that it didn’t include a controversial proposal to ban the encryption that ensures that messages can’t be read as they are sent between devices. […]

Continue reading

New U.K. online surveillance proposal could have international reach

A new surveillance proposal in the United Kingdom is drawing criticism from privacy advocates and tech companies that say it gives the government far-reaching digital surveillance powers that will affect users outside the nation’s borders. The Draft Investigatory Powers Bill released by British Home Secretary Theresa May Wednesday would force tech companies to build intercept […]

Continue reading

This Snowden-Approved Encrypted-Communication App Is Coming to Android

Since it first appeared in Apple’s App Store last year, the free encrypted calling and texting app Signal has become the darling of the privacy community, recommended—and apparently used daily—by no less than Edward Snowden himself. Now its creator is bringing that same form of ultra-simple smartphone encryption to Android. On Monday the privacy-focused nonprofit […]

Continue reading

Tech Companies and Civil Liberties Groups Force Obama To Weigh In On Encryption Debate

President Obama will now be forced to publicly describe the extent of his commitment to protecting strong encryption, after nearly 50 major technology companies, human rights groups, and civil liberties collectives—including Twitter, the ACLU, and Reddit — succeeded in getting over 100,000 signatures on a White House petition on Tuesday. The government’s “We the People” […]

Continue reading

NSA, Apple Chiefs Decode Encryption Views

LAGUNA BEACH, Calif.—The heads of the National Security Agency and the world’s most valuable company appeared to try to make nice Monday night over their contrasting views on encryption—to a point. NSA Director Adm. Michael Rogers and Apple Inc. Chief Executive Tim Cook, appearing at The Wall Street Journal’s technology conference, WSJDLive, spoke in broad […]

Continue reading

The NSA may have been able to crack so much encryption thanks to a simple mistake

The NSA could have gained a significant amount of its access to the world’s encrypted communications thanks to the high-tech version of reusing passwords, according to a report from two US academics. Computer scientists J Alex Halderman and Nadia Heninger argue that a common mistake made with a regularly used encryption protocol leaves much encrypted […]

Continue reading

The next steps for the White House on encryption

THE OBAMA administration’s decision not to seek legislation requiring technology companies to give law enforcement access to encrypted communications on smartphones has a certain logic. In this age of hacking and cyberintrusion, encryption can keep most people safer. But the decision also carries risks. Encryption can give a tiny band of criminals and terrorists a […]

Continue reading

Aadhaar encryption protects privacy, will take eons to crack

The Aadhaar system’s data collection and storage is strongly protected by sophisticated encryption processes to ensure biometric data does not leak either through private contractors running enrollment centres or at the central data servers that store the details. The unique identity authority of India’s processes are intended to allay fears that biometric data collected by […]

Continue reading

Risk Analysis, Encryption Stressed in HITECH Act Final Rules

Two final rules for the HITECH electronic health record incentive program strongly emphasize the value of risk assessments and encryption as measures for safeguarding patient information. A new rule establishing requirements for proving a provider is a “meaningful user” for Stage 3 of the incentive program requires protecting patient data through the implementation of appropriate […]

Continue reading

National Encryption Policy: Not just privacy, but also feasibility and security are at risk

Encryption is an important aspect which governs not just the communications but also the storage. When data is in motion there are some methods/ protocols which facilitate end-to-end encryption: 1. VPN 2. Remote Server Connectivity viz. RDP, SSH 3. Internet based Voice/ Messaging Communications 4. email communication 5. Communications between Wearables and their Host devices […]

Continue reading

Draft encryption policy: Frequent changes in key positions & talent crunch in DeitY led to the debacle

As the blame game for the fiasco created by the draft National Encryption Policy plays out, experts are asking if frequent changes in key positions and a talent crunch in the Department of Electronics and Information Technology (DeitY) led to the debacle. After the government held a junior scientist responsible, officers in the department are […]

Continue reading

National Encryption Policy: Government Issues Clarification on WhatsApp, Social Media

The government issued an addendum to clarify that “mass use encryption products, which are currently being used in web applications, social media sites, and social media applications such as WhatsApp, Facebook, Twitter etc.” While that language is vague in itself, you can rest easy without needing to worry about having to store your WhatsApp messages […]

Continue reading

Best Disk Lock Has Been Updated to Version 2.60

Best Disk Lock, which can completely hide the disk partitions, has been updated to the version 2.60. In this new version, we have improved the stability of disk advanced-lock, added the judgement for the disks unsuitable for lock when locking disks, also fixed a BUG that an error occurred in software uninstallation. Change Log of […]

Continue reading

Experts pick big holes in India’s encryption policy

India’s proposed encryption policy has come under heavy fire with internet experts and online activists alleging that it provides blanket backdoors to law enforcement agencies to access user data, which could be abused by hackers and spies. The Department of Electronics and Information Technology ( DeitY) has asked for public comments on the ‘Draft National […]

Continue reading

Obama edges toward full support for encryption

President Obama recently called on the best minds in government, the tech sector and academia to help develop a policy consensus around “strong encryption” — powerful technologies that can thwart hackers and provide a profound new level of cybersecurity, but also put data beyond the reach of court-approved subpoenas. From Obama on down, government officials […]

Continue reading

Science on the Hill: For cybersecurity, in quantum encryption we trust

As everyone becomes more interconnected on the Internet, personal information like bank and investment accounts, credit card numbers, home addresses and even social security numbers becomes more vulnerable to cybertheft. The same goes for the corporate world. Identity theft struck 16.6 million Americans in 2012, the most recent year for which figures were available. According […]

Continue reading

MainOne addresses data centre security concerns

Keeping customer data secure is of utmost importance in any organization. Therefore, compliance with security standards is vital. In today’s world, a company cannot afford to experience breaches of customer information, transactional data or other important business information given the volume of business taking place online and the consequences of such breaches. When considering collocation […]

Continue reading

Argument over strong encryption reaches boiling point as Apple, Microsoft rebuff court orders for data access

A long-running debate concerning recent advances in consumer data encryption came to a head this summer when Apple rebuffed a Justice Department court order demanding access to iMessage transcripts, causing some in the law enforcement community to call for legal action against the company. Over the summer Apple was asked to furnish real-time iMessage communications […]

Continue reading

Best Folder Encryptor Has Updated to Version 16.83

The professinal file and folder encryption software – Best Folder Encryptor has been updated to version 16.83 recently. In last version 16.82, we have fixed a bug that the encrypted file/folder cannot be prevented from deletion, copy and removal in 64 bit operating system, also fixed a bug that there is no verification for password […]

Continue reading

When It Comes To Encryption, Our Policy Makers Could Learn A Thing Or Two From Thomas Jefferson

Thomas Jefferson was so interested in cryptography that he may have developed his own enciphering device after his mail was inspected by postmasters when the revolution was looming. Indeed, codes and ciphers are as American as the American Revolution itself. In fact, the revolution may not have happened if confidential correspondence, both military and otherwise, […]

Continue reading

NSA wants encryption that fends off quantum computing hacks

The National Security Agency isn’t just yearning for quantum computers that can break tough encryption — it wants encryption that can protect against quantum computers, too. Officials have begun planning a transition to “quantum resistant” encryption that can’t be cracked as quickly as conventional algorithms. As the NSA explains, even a seemingly exotic technique like […]

Continue reading

Whose keys are they anyway?

Google recently announced enhanced security support for its cloud customers by granting them the ability to hold the encryption keys to their data. These customer-supplied encryption keys for the Google Cloud Platform follow the example set by other cloud industry leaders such as Amazon Web Services and Box and position the tech giant as an […]

Continue reading

Reflective satellites may be the future of high-end encryption

Quantum key distribution is regularly touted as the encryption of the future. While the keys are exchanged on an insecure channel, the laws of physics provide a guarantee that two parties can exchange a secret key without knowing whether they’re being overheard. This unencrypted-but-secure form of key exchange circumvents one of the potential shortcomings of […]

Continue reading

Pushbullet adds end-to-end encryption to its Android, Chrome and Windows desktop app

Continuing its evolution in to a full-fledged messaging service, Pushbullet has added support for end-to-end encryption when using the app to mirror notifications, move text captured by the universal copy and paste clipboard and send SMS messages. The feature is available to anyone using the latest version of the company’s Android, Chrome or Windows desktop […]

Continue reading

Pushbullet adds end-to-end encryption as it continues shift into messaging

Pushbullet, once a simple tool for sending files between your various devices, has announced that it now supports end-to-end encryption for additional user privacy, as it continues its march towards becoming a fully-fledged messenger. Announced in a blog post, the new encryption is applied across notifications that are mirrored between devices, any text captured by […]

Continue reading

Blackberry PGP Encrypted Phones With Latest BB12 Encryption Technology Released

Blackberry Encrypted Phones have Blackberry PGP email encrypted devices that offer safe and secure solutions for wireless communications. Android and iPhones have proven to be unreliable when it comes to encryption and data protection. These popular devices have been relatively reduced to the status of toys when it comes to industrial or professional grade protection […]

Continue reading

Cryptolocker virus: Australians forced to pay as latest encryption virus is ‘unbreakable’, security expert says

Australians are paying thousands of dollars to overseas hackers to rid their computers of an unbreakable virus known as Cryptolocker. There has been a rise in the number of people falling victim to the latest version of an encryption virus which hijacks computer files and demands a ransom to restore them. The “ransomware” infects computers […]

Continue reading

NSA-grade encryption for mobile over untrusted networks

The only term being thrown around government more than “2016 elections” these days is “cybersecurity,” particularly following a rash of damaging and high-profile data breaches. With that focus on protecting information top of mind in agencies, USMobile officials hope to find a ready market for their commercial app, which lets government workers use their personal […]

Continue reading

Cloud encryption key management becomes table stakes

Encryption key management has become table stakes for cloud vendors, but bringing your own key isn’t always the right move. The ability to bring your own encryption keys is fast becoming ubiquitous in public cloud, but that doesn’t mean IT pros should retain control. Security concerns and data center oversight are two primary hang-ups for […]

Continue reading

SafeChats aims to give messaging an encryption edge

THE revelations from former US National Security Agency (NSA) contractor Edward Snowden that the US Government has been tapping communications have created greater awareness on the need for secure communications, which in turn has given rise to secure messaging apps such as Telegram, Wickr and Threema. Privacy should not be a concern for just individuals, […]

Continue reading

Researchers develop quantum-computing safe crypto

Practical implementation of secure key exchange for TLS. A team of researchers claim to have developed secure, quantum computing-proof encryption that can be practically implemented today. The paper, Post-quantum key exchange for the TLS protocol from the ring learning with errors problem [pdf] is written by Joppe Bos from NXP Semiconductors in Belgium, Craig Costello […]

Continue reading

DA Hillar Moore: Cellphone encryption hurting murder investigation of woman, her baby; family holds onto hope the case will be solved

Cellphone encryption practices could be keeping investigators from solving the murder of Brittney Mills and her son, East Baton Rouge Parish District Attorney Hillar Moore III said Saturday, but family members remain hopeful the truth will surface. “By no means have we forgotten them,” said Mills’ mother, Barbara Mills, on Sunday. “This will be in […]

Continue reading

Apple could be held liable for supporting terrorism with strong iOS encryption, experts theorize

In the second installment of a thought piece about end-to-end encryption and its effect on national security, Lawfare editor-in-chief Benjamin Wittes and co-author Zoe Bedell hypothesize a situation in which Apple is called upon to provide decrypted communications data as part of a legal law enforcement process. Since Apple does not, and on devices running […]

Continue reading

Twitter Security Pro: Encryption Isn’t Enough

Encryption can appear to be priceless when it’s absent, as it was in the recent Office of Personnel Management breach. It can appear to be costly when it’s present, as FBI director James Comey has argued. But not everything is as it appears. Michael Coates, trust and information security officer at Twitter and global board […]

Continue reading

It’s Time to End the “Debate” on Encryption Backdoors

Yesterday, on Lawfare, FBI Director James Comey laid out his concern that the growing adoption of strong encryption technologies will frustrate law enforcement’s ability to conduct investigations — what he calls the “Going Dark” problem. The gist of Comey’s position is this: He recognizes encryption is important to security and privacy, but believes we are […]

Continue reading

After Washington Post rolls out HTTPS, its editorial board bemoans encryption debate

There’s hope that by the time the Washington Post’s editorial board takes a third crack at the encryption whip, it might say something worthwhile. Late on Saturday, the The Washington Post’s editorial board published what initially read as a scathing anti-encryption and pro-government rhetoric opinion piece that scolded Apple and Google (albeit a somewhat incorrect […]

Continue reading

New Version of Teslacrypt changes encryption scheme

A new version of the nasty TeslaCrypt ransomware is making the rounds, and the creators have added several new features, including an improved encryption scheme and some details designed to mimic CryptoWall. TeslaCrypt is among the more recent variants of ransomware to emerge and the malware, which is a variant of CryptoLocker, is unique in […]

Continue reading

PC Shutdown Timer and Schedule – Magic Timed Shutdown Updated to Version 10.03

Magic Timed Shutdown is a professional software application that powers off your computer automatically at specific times. It has four main features – timed auto shutdown, advanced computer control, computer use time limitation and startup/shutdown log analysis. In this new verison, we fixed some bugs and enhanced the software stability. Change Log of Magic Timed […]

Continue reading

FBI chief wants ‘backdoor access’ to encrypted communications to fight Isis

The director of the Federal Bureau of Investigation has warned US senators that the threat from the Islamic State merits a “debate” about limiting commercial encryption – the linchpin of digital security – despite a growing chorus of technical experts who say that undermining encryption would prove an enormous boon for hackers, cybercriminals, foreign spies […]

Continue reading

FBI director James Comey calls for ‘robust debate’ to limit digital encryption to combat terror groups

FBI director James Comey has called for public debate on the use of encrypted communications, claiming Americans may not realise how radical groups and criminals are using the technology. Mr Comey’s comments in a blog post appeared to seek further public support for his view — first expressed last year — that improved encryption being […]

Continue reading

Folder Encryption Software – Ace Secret Folder Has Been Updated to Version 6.66

Ace Secret Folder, a professional folder encyption software, has been updated to version 6.66 recently. In this new version, we have made great improvements, such as fixed some major and minor bugs. Besides, we enhanced the password hint, the encryption efficiency and strength, and the user interface. Change Log of Ace Secret Folder 6.66: File Name: […]

Continue reading

Professional Folder Encryption Software – Easy Folder Guard Updated to Version 9.01 Recently

Easy Folder Guard is an excellent folder encryption software that protects your personal folders from prying eyes. You can choose to password-protect, disguise or hide your folders, or protect computer drives t suit you needs. Change Log of Easy Folder Guard 9.01: File Size: 2.62MB Version: 9.01 Released on: July 2, 2015 Category: Encryption Software Language: English License: […]

Continue reading

File Encryption Software Best Encryption Expert Has Been Updated to Version 12.05

The professional file and folder encryption software – Best Folder Encryptor, has been updated to the version 12.05. In this new version, we fixed some minor bugs. Change Log of Best Encryption Expert 12.03: File Name: Best Encrypiton Expert Version: 12.05 File Size: 3.96MB Category: File/Folder Encryption Software Language: English License: Trial version System Requirements: Win2000/XP/VISTA/Win […]

Continue reading

Encryption Software Best Folder Encryptor Updated to Version 16.81

The professinal file and folder encryption software – Best Folder Encryptor has been updated to version 16.81 recently. In this new version, we fixed some bugs and enhanced the efficiency and strength for flash encryption and hiding encryption. Change Log of Best Folder Encryptor: File Name: Best Folder Encryptor Version: 16.81 File Size: 3.42MB Category: […]

Continue reading

Software developers are not carrying out encryption properly

Despite a big push over the past few years to use encryption to combat security breaches, lack of expertise among developers and overly complex libraries have led to widespread implementation failures in business applications. The scale of the problem is significant. Cryptographic issues are the second most common type of flaws affecting applications across all […]

Continue reading

DoGoodSoft Recently Released the Latest Version of PC Monitor Expert 1.65

The well-known computer monitoring software PC Monitor Expert has been updated to the version 1.65, in which fixed a serious problem and some minor bugs. Change Log of PC Monitor Expert: File Name: PC Monitor Expert Version: 1.65 File Size: 3.79 Category: Computer Monitoring Software Language: English License: Trial version System Requirements: win xp/vista/win 7/win 8 Released […]

Continue reading

Best Encryption Expert Updated to Version 12.03

A powerful file and folder encryption utility–Best Encryption Expert, recently upgraded to the latest version 12.03. This is a major upgrade offering some  significant changes, with the goal  to make Best Encryption Expert easy and powerful for users to employ. Change Log of Best Encryption Expert 12.03: File Name: Best Encrypiton Expert Version: 12.03 File Size: 3.31MB Category: […]

Continue reading

DoGoodSoft Released the Latest Version of CHK File Recovery 1.06

CHK File Recovery, a professional chk file recovery software, has been updated by DoGoodSoft to the Version 1.06. Update Information of CHK File Recovery: File Name: CHK File Recovery Version: 1.06 File Size: 2.82 Category: CHK File Recovery Software Language: English License: Trial version System Requirements: Win2000/XP/VISTA/Win 7/Win 8 Release on: Jun 1, 2015 Download Address: http://dogoodsoft.com/chk-file-recovery/free-download.html What’s New […]

Continue reading

Privacy advocates and tech giants support encryption, which the FBI director finds “depressing”

There’s a privacy battle brewing between the FBI and other federal government groups on one side, and tech companies, cryptologists, privacy advocates (and some elected American lawmakers) on the other. Basically, the FBI (circa-2015 edition) opposes the use of encryption to keep data secure from hackers, on the grounds that the government couldn’t get at […]

Continue reading

Google Hangouts doesn’t use end-to-end encryption

If you’re using Google Hangouts as your main messaging service, you might want to know that Hangouts doesn’t use end-to-end encryption (E2EE), a must-have feature for messaging services in the post-Snowden world. This was recently confirmed during a Reddit Ask Us Anything (AUA) session by Google’s Richard Salgado, Director for Law Enforcement and Information Security, […]

Continue reading

Google admits Hangouts doesn’t use end-to-end encryption, opening the door for government wiretaps

If you’re really worried the government may be keeping tabs on your conversations, then you’d best avoid Hangouts. According to Motherboard, a Google representative confirmed that Hangouts conversations are only encrypted “in transit,” meaning after the message arrives at the intended recipient Google could access it if forced to do so by a government wiretap. The question […]

Continue reading

New technology to help users combat mobile malware attacks

As mobile phones increase in functionality, they are becoming increasingly ubiquitous in everyday life. At the same time, these devices also are becoming easy targets for malicious activities. One of the primary reasons for such malware explosion is user willingness to download applications from untrusted sources that may host apps with hidden malicious codes. Once installed […]

Continue reading

Key management is the biggest pain of encryption

Most IT professionals rate the pain of managing encryption keys as severe, according to a new global survey by the Ponemon Institute. On a scale of 1 to 10, respondents said that the risk and cost associated with managing keys or certificates was 7 or above, and cited unclear ownership of keys as the main reason. “There’s […]

Continue reading

DHS Chief Says Encryption Threatens National Security

Department of Homeland Security (DHS) secretary Jeh Johnson wants the government to work more closely with tech companies on security issues, but it also wants them to dial back their security encryption efforts. Johnson made his comments Tuesday in front of a packed house at the RSA conference in San Francisco, one of the world’s […]

Continue reading

Google is Keeping the NSA Out of Your Data, Eric Schmidt Brags

Google (GOOGL) Chairman Eric Schmidt boasted on Wednesday about how improving the encryption of Google’s products has successfully shut out warrantless surveillance by the NSA and other law enforcement. Schmidt talked about the encryption advances, and how former NSA contractor Edward Snowden’s leaks prompted them, at BoxDev, a yearly developers conference for Box. “When the Snowden […]

Continue reading

U.S. Secretary Of Homeland Security Warns About The Dangers Of Pervasive Encryption

In a speech at cybersecurity conference RSA, U.S. Secretary of Homeland Security Jeh Johnson outlined the government’s discomfort with increasing implementation of encryption by technology companies, and what impact the shift might have on national security. While tech firms like Apple are advancing encryption to an increasingly broad set of consumer activities, the government is […]

Continue reading

Google and Yahoo Encrypting Ad Network Connections

Google and Yahoo in separate announcements said they will individually encrypt ad network connections to reduce bot traffic and other types of ad fraud. The news coincides with the release of Malwarebytes Labs findings last week. Researchers found malvertising in Flash ads involving the DoubleClick ad network. The two companies have support. The Interactive Advertising […]

Continue reading

Encryption Uncoded: A Consumers’s Guide

Concerned by reports of hacking, data breaches and government spying, companies and consumers are looking for better ways to protect their data. Many are turning to encryption, a method of encoding messages that goes back millennia. Encryption is commonly used to secure online banking sessions and to protect credit-card data. But for the average computer […]

Continue reading

The NSA wants a multi-part encryption key for “front door” access to your data

The US National Security Agency (NSA) appears to be increasingly concerned about the growing adoption of encryption and its ability to thwart the agency’s surveillance efforts. Now, after months of debate with tech firms about government access to encrypted data on smartphones and other devices, the NSA has proposed a solution which it hopes will strike […]

Continue reading

Europol chief warns on computer encryption

A European police chief says the sophisticated online communications are the biggest problem for security agencies tackling terrorism. Hidden areas of the internet and encrypted communications make it harder to monitor terror suspects, warns Europol’s Rob Wainwright. “Tech firms should consider the impact sophisticated encryption software has on law enforcement”, he said. A spokesman for TechUK, […]

Continue reading

FBI Quietly Removes Recommendation To Encrypt Your Phone… As FBI Director Warns How Encryption Will Lead To Tears

Back in October, we highlighted the contradiction of FBI Director James Comey raging against encryption and demanding backdoors, while at the very same time the FBI’s own website was suggesting mobile encryption as a way to stay safe. Sometime after that post went online, all of the information on that page about staying safe magically disappeared, […]

Continue reading

Bee behaviour mapped by tiny trackers

A tiny new tracker designed to monitor bee behaviour is being tested by ecologists at Kew Gardens in London. It is made from off-the-shelf technology and is based on equipment used to track pallets in warehouses, said its creator Dr Mark O’Neill. Readers, used to pick up a signal from the kit, are connected to […]

Continue reading

Encryption not the way to tackle DStv: DOC

Government should make better use of regulatory tools and legislation to foster a more competitive environment in South Africa’s pay-television industry rather than requiring that conditional access technology be included in state-subsidised set-top boxes. That’s the view of Solly Mokoetle, the head of the digital migration project at the department of communications (DOC). “The issue […]

Continue reading

Encryption today: how safe is it really?

When checking your email over a secure connection, or making a purchase from an online retailer, have you ever wondered how your private information or credit card data is kept secure? Our information is kept away from prying eyes thanks to cryptographic algorithms, which scramble the message so no-one else can read it but its […]

Continue reading

New bugs uncovered in encryption software

New bugs in the widely used encryption software known as OpenSSL were disclosed on Thursday, though experts say do not pose a serious threat like the “Heartbleed” vulnerability in the same technology that surfaced a year ago. “Heartbleed” triggered panic throughout the computer industry when it was reported in April 2014. That bug forced dozens […]

Continue reading

Yahoo Rolls Out End-To-End Encryption For Email

Back in 2012 (pre-Snowden!), we wrote about why Google should encrypt everyone’s emails using end-to-end encryption (inspired by a post by Julian Sanchez saying the same thing. Since then, securing private communications has become increasingly important. That’s why we were happy to see Google announce that it was, in fact, working on a project to […]

Continue reading

Can software-based POS encryption improve PCI compliance?

In the wake of the recent Verizon report that shows that 80 percent are out of PCI DSS compliance between audits, some vendors are urging the PCI Council to consider approving software-based point-to-point encryption, in addition to the current hardware-based standard. PCI-approved, hardware-based P2PE allows merchants to drastically shrink the systems subject to compliance, reducing […]

Continue reading

Yahoo puts email encryption plugin source code up for review

Yahoo released the source code for a plugin that will enable end-to-end encryption of email messages, a planned data-security improvement prompted by disclosures of U.S. National Security Agency snooping. The company is asking security experts to look at its code, published on GitHub, and report vulnerabilities, wrote Alex Stamos, Yahoo’s chief information security officer, in […]

Continue reading

How Encryption Software Works in Enterprises’Data Leakage-proof?

For modern enterprises, the trend in information computerization’s development means the data is not only the assets, but is the reflection of enterprise’s core competitiveness. To make your enterprises remain invincible in the fierce business competition, you should protect the sensitive and key data of enterprise effectively. In reality, data leakage will lead to economic […]

Continue reading

Computer-stored encryption keys are not safe from side-channel attacks

Figure A: Tel Aviv University researchers built this self-contained PITA receiver. Not that long ago, grabbing information from air-gapped computers required sophisticated equipment. In my TechRepublic column Air-gapped computers are no longer secure, researchers at Georgia Institute of Technology explain how simple it is to capture keystrokes from a computer just using spurious electromagnetic side-channel […]

Continue reading

CIA spent last 10 years cracking Apple’s encryption

The CIA has been trying to crack Apple’s encryption for nearly 10 years. According to a report by The Intercept, the CIA began trying to crack Apple’s encryption in 2006 using funds from the “black budget.”  The researchers who worked on breaking down Apple’s privacy wall were purportedly based at Sandia National Laboratories. Although the […]

Continue reading

Encryption is gone, communications minister Muthambi restates

Government-provided set-top boxes for digital terrestrial television will not contain conditional access based on encryption, and prospective pay-television operators wanting to use such a system will have to deploy their own boxes to subscribers. That’s according to a statement, issued at the weekend by communications minister Faith Muthambi, in which she makes it clear that […]

Continue reading

Microsoft Windows also vulnerable to ‘FREAK’ encryption flaw

Computers running all supported releases of Microsoft Windows are vulnerable to “FREAK,” a decade-old encryption flaw that leaves device users vulnerable to having their electronic communications intercepted when visiting any of hundreds of thousands of websites, including Whitehouse.gov, NSA.gov and FBI.gov. The flaw was previously thought to be limited to Apple’s Safari and Google’s Android […]

Continue reading

How to Encrypt Folder in “Encryption Year”?

Recently, the president of United States Barack Obama called himself “a firm believer of strong encryption” when he visited Silicon Valley. Although some people criticized Obama for vague statement, the actual networking environment is really worrying, and the data security is more of concern, so data encryption appears to be more important. That is someone […]

Continue reading

Samsung is still lying about the encryption on its Smart TVs

When news broke that Samsung’s Smart TV’s listened to conversations and sent them to a third-party server company, the Korean manufacturer countered by claiming that all data transmissions to and from its televisions were encrypted. When testing demonstrated that the data in question wasn’t encrypted (despite being sent via Port 443, which is typically used […]

Continue reading

Chinese Version of PC Monitor Expert Updated to Version 1.62

PC Monitor Expert is a trusted computer monitoring product. It can capture every keystroke, Chat, Instant Message, visited website, screenshot, running program, application and etc of the monitored computer. It can also block the use of any program, app, chatting software, downloading software or game software as you want. Once found opening a prohibited program, […]

Continue reading

DoGoodSoft Releases Best Folder Encryptor 16.75 with Higher Security

DoGoodSoft, one of the leading security software developers in China, offers better-in-class software for both individual and enterprise users at home and abroad. Recently, it released the latest version of its encryption software Best Folder Encryptor. In this new version, DoGoodSoft fixed certain bugs by which users will feel more security to protect their important […]

Continue reading

DoGoodSoft Updated Magic Timed Shutdown to Version 9.96

Professional PC auto-shutdown software-Magic Timed Shutdown is updated to version 9.96. In this version optimize software performance and fix a Bug. Latest Version Information of Magic Timed Shutdown: Version: V9.96 File Size: 4324KB Category: Timed Shutdown Software Language: English License Type: Trial Version Operating System(s): Win XP/Vista/7 Last Updated On: March 8th, 2012 Download:http: www.dogoodsoft.com/magic-timed-shutdown/free-download.html […]

Continue reading

Guard vital and private data on mobile devices with DoGoodSoft USB Encryptor

The latest Global Study on Mobility Risks shows that the phenomena of enterprises’ introduction of mobile devices and employees’ carrying of mobile devices are overhead current enterprise security system and security policy. Websense also said that 51% of enterprise data leakage is caused by mobile devices. Besides, according to one research on IT persons offered […]

Continue reading

Luoyang Xiabing Software Technologies Ltd Recently Released Ace Secret Folder For Data Security

Ace Secret Folder is a kind of folder encryption software which makes your folder “secret” and invisible, providing strong shield to protect your important documents and privacy. It features four characters: completely invisible after installation, simple Hotkey invocation, folders disappearance after encryption and fast encryption and decryption. Features The program will become unseen and invisible […]

Continue reading

Meet New English Version of Ease Folder Guard

Dogoodsoft recently announces the release of the new version of Ease Folder Guard in English. Ease Folder Guard offers the professional and powerful features for protecting personal folders from prying eyes. Disk protection and other functions are included. Also, it is easy to operate. Ease Folder Guard protects folders in three different ways – password […]

Continue reading

Best Encryption Expert Will Be the Escort for Your Data Security

DoGoodSoft now recommends Best Encryption Expert – a perfect and easy-to-use application that combines file/folder encryption, folder protection, disk protection and other enhanced features. It had been acknowledged as the best choice for those who have the urgent need to protect data security. Best Encryption Expert encrypts files and folders in various ways. With advanced […]

Continue reading

Can Anti-virus Software be Powerful

Whether you sit back and relax with your PC installed anti-virus software? Whether you believe and depend on it completely? If yes, you’re badly wrong. On May 18, 2007, the case of Norton manslaughter shocked the whole world. After Norton upgraded the virus database, it isolated and removed the system files netapi32.dll and Isasrv.dll of […]

Continue reading