Browsed by
Month: March 2015

Yahoo puts email encryption plugin source code up for review

Yahoo puts email encryption plugin source code up for review

Yahoo released the source code for a plugin that will enable end-to-end encryption of email messages, a planned data-security improvement prompted by disclosures of U.S. National Security Agency snooping. The company is asking security experts to look at its code, published on GitHub, and report vulnerabilities, wrote Alex Stamos, Yahoo’s chief information security officer, in a blog post. The plugin should be ready by year end, wrote Stamos, who gave a presentation on Sunday at the South by Southwest conference…

Read More Read More

China backs off legal push that would force foreign tech companies to hand over encryption keys

China backs off legal push that would force foreign tech companies to hand over encryption keys

“They have decided to suspend the third reading of that particular law, which has sort of put that on hiatus for the moment,” White House Cybersecurity Coordinator Michael Daniel said earlier this week, asnoted by Reuters. “We did see that as something that was bad not just for U.S. business but for the global economy as a whole, and it was something we felt was very important to communicate very clearly to them.” If China has pressed forward, it could…

Read More Read More

How Encryption Software Works in Enterprises’Data Leakage-proof?

How Encryption Software Works in Enterprises’Data Leakage-proof?

For modern enterprises, the trend in information computerization’s development means the data is not only the assets, but is the reflection of enterprise’s core competitiveness. To make your enterprises remain invincible in the fierce business competition, you should protect the sensitive and key data of enterprise effectively. In reality, data leakage will lead to economic losses or even more troubles. With the development of Internet, the boundary between Intranet and Extranet is becoming blurred because the Intranet and outside world…

Read More Read More

Computer-stored encryption keys are not safe from side-channel attacks

Computer-stored encryption keys are not safe from side-channel attacks

Figure A: Tel Aviv University researchers built this self-contained PITA receiver. Not that long ago, grabbing information from air-gapped computers required sophisticated equipment. In my TechRepublic column Air-gapped computers are no longer secure, researchers at Georgia Institute of Technology explain how simple it is to capture keystrokes from a computer just using spurious electromagnetic side-channel emissions emanating from the computer under attack. Daniel Genkin, Lev Pachmanov, Itamar Pipman, and Eran Tromer, researchers at Tel Aviv University, agree the process is…

Read More Read More

CIA spent last 10 years cracking Apple’s encryption

CIA spent last 10 years cracking Apple’s encryption

The CIA has been trying to crack Apple’s encryption for nearly 10 years. According to a report by The Intercept, the CIA began trying to crack Apple’s encryption in 2006 using funds from the “black budget.”  The researchers who worked on breaking down Apple’s privacy wall were purportedly based at Sandia National Laboratories. Although the report did expose the CIA’s effort, it did not tell us much about whether or not the agency succeeded in meeting their objectives.  What it…

Read More Read More

How to Encrypt Data on Portable Hard Drives with Encryption Software?

How to Encrypt Data on Portable Hard Drives with Encryption Software?

In recent years, portable hard drives play a major role in the field of data storage, so people pay more and more attention to its security. Just think of that you stored all of your personal documents, private images, user info and other important data on a normal portable hard drive, which is unavoidably stolen or lost. Portable hard drives, as a common storage medium, have been widely used in various aspects. So how to safely use portable hard drives…

Read More Read More

Encryption is gone, communications minister Muthambi restates

Encryption is gone, communications minister Muthambi restates

Government-provided set-top boxes for digital terrestrial television will not contain conditional access based on encryption, and prospective pay-television operators wanting to use such a system will have to deploy their own boxes to subscribers. That’s according to a statement, issued at the weekend by communications minister Faith Muthambi, in which she makes it clear that conditional access will not feature in the final amended policy on broadcasting digital migration. The move appears to be a victory for MultiChoice and the…

Read More Read More

Microsoft Windows also vulnerable to ‘FREAK’ encryption flaw

Microsoft Windows also vulnerable to ‘FREAK’ encryption flaw

Computers running all supported releases of Microsoft Windows are vulnerable to “FREAK,” a decade-old encryption flaw that leaves device users vulnerable to having their electronic communications intercepted when visiting any of hundreds of thousands of websites, including Whitehouse.gov, NSA.gov and FBI.gov. The flaw was previously thought to be limited to Apple’s Safari and Google’s Android browsers. But Microsoft warned that the encryption protocols used in Windows — Secure Sockets Layer and its successor Transport Layer Security — were also vulnerable…

Read More Read More

Building backdoors into encryption isn’t only bad for China, Mr President

Building backdoors into encryption isn’t only bad for China, Mr President

Want to know why forcing tech companies to build backdoors into encryption is a terrible idea? Look no further than President Obama’s stark criticism of China’s plan to do exactly that on Tuesday. If only he would tell the FBI and NSA the same thing. In a stunningly short-sighted move, the FBI – and more recently the NSA – have been pushing for a new US law that would force tech companies like Apple and Google to hand over the…

Read More Read More

How to Encrypt Folder in “Encryption Year”?

How to Encrypt Folder in “Encryption Year”?

Recently, the president of United States Barack Obama called himself “a firm believer of strong encryption” when he visited Silicon Valley. Although some people criticized Obama for vague statement, the actual networking environment is really worrying, and the data security is more of concern, so data encryption appears to be more important. That is someone regards 2015 as an “Encryption Year”. When it comes to encryption year, we talk about how to better encrypt folders in the new year. Want…

Read More Read More