A set of vulnerabilities dubbed "EFAIL" affect encryption standards like PGP and S/MIME and could reveal the plaintext of encrypted emails sent in the past.
Amazon followed in Google's footsteps this week in banning domain fronting, a technique that allows app and site developers to evade censorship.
Researchers said Tuesday the app was vulnerable to a right-to-left override attack, something which let attackers trick unsuspecting users into installing malware.
Christoper Wray, who was confirmed as the new FBI Director in August, said last week the concept of "Going Dark," compounded by new encrypted communications services and technologies, is still posing a challenge for the bureau.
Researchers have found that RSA keys generated by cryptographic chips can be factored, exposing a vulnerability affecting the security of many systems and users.
If you haven’t been following the news this week, you missed a major story. Wikileaks has revealed that CIA actively engages in espionage. And it uses computers to do so. But for most end users and encryption advocates, this news is good.
The Internet’s security infrastructure is incredibly fragile, and every once in a while a small fragment of it comes loose and breaks all over the floor. Depending upon the importance of the piece, the mess can sometimes be swept up quickly before anyone notices. That is most decidedly not the case with the recent demonstration of a practical collision in SHA-1.
Data Privacy Day is here, bringing an annual reminder to take measures to protect our digital privacy. To promote user privacy we’ve rounded up 15 mobile apps that use encryption to secure users’ digital communications and activities – and at no cost to boot.
Advances in consumer technology have made digital surveillance easier than ever for governments and criminals alike. But fear not - as surveillance capabilities have expanded so have the range of encryption systems available to users.
We’ve seen a lot of reports on encrypted messaging applications in the news recently, but one question remains unanswered: are data leaks via these applications a real risk for enterprises today?