While the use of HTTPS encryption is on the rise, the same is unfortunately true of attackers using it to mask their operations, according to a new report.
Google recently announced that the Chrome browser will soon start flagging every site not using HTTPS encryption as "not secure."
Enterprises are developing and using enterprise applications on a large scale for various purposes, but a lack of encryption, coupled with serious security flaws in such applications, is also rendering enterprises vulnerable.
"Without simplicity we don't have adoption and without adoption we don't have security," says Linus Chang, Scram Software, adding, quantum computers predicted to break encryption by 2029; many cryptocurrencies won't be secure.
Tech moves fast, but cryptography - the field which holds it all up - runs at a decidedly slower pace, marking its breakthroughs in years, not quarters. With something so inherently important, why would it be so slow to evolve?
Businesses can avoid or reduce the impact an attack has on their company if they use the correct cloud strategy when controlling their security. Technical security must be accompanied by organisational & personnel measures.
Just days after the creators of the Cryptomix ransomware came out with a new variant, another was issued that again changed the extension on the encrypted files.
Cyber-criminals have given CryptoMix ransomware a few minor twists, including adding a new extension name to the encrypted files.
Employees have to choose between leaving data unprotected, disrupting their work to use the company encryption tool, or protecting data on their own; once an employee encrypts a file on their own, the company has no control.
A vulnerability in Symantec endpoint clients remains unpatched months after disclosure, according to security researchers.
Yesterday large parts of the world were without their LinkedIn accounts due to an SSL certificate expiry and those that were able to login were browsing without encryption, meaning all of their data was potentially at risk.
Given the proven problems of deployment and the ingenuity of attackers sidestepping security controls, it's unwise to describe anything as hack-proof - but that appeared to be the claim for a new quantum computer.
The FBI hasn't yet broken the phone belonging to a gunman who went on a shooting rampage in a Texas church, killing 26 and wounding 24.
Moving to the cloud? Don't neglect the security challenges. Ensure you have a security policy that works seamlessly across on-premise and cloud says Dave Nicholson
Deploying BitLocker is only a start to effective full disk encryption explains Mark Hickman adding that on-demand encryption/decryption must be made easy, even transparent for employees, or they to look for hacks.
Organisations must secure their encrypted tunnels or risk leaving themselves at the mercy of cyber-attackers says Nick Hunter who insists they can, and must, implement centralised intelligence and automated systems.
Nobody expects Rudd to have a PhD in cryptography but she does need to understand how backdooring encryption would disadvantage perfectly legitimate businesses and potentially cost them dearly.
While the world has been riding from the boom of new technology innovations in 2017, the mainframe has recently reaffirmed its rightful place at the top of the financial security technology field says Richard Whomes
A new CryptoMix ransomware variant called ERROR has been released that includes a new extension added to the encrypted files, ransom note and new encryption keys.
UK home secretary Amber Rudd faced a barrage of criticism after she warned social media and tech companies that the Government may introduce laws to clamp down on extremist content if companies do not take action themselves.
Combining the prioritisation of perimeter security and lack of knowledge in data security, according to Gemalto, is brewing an environment where businesses will soon lack the ability to fend off complex cyber-attacks.
A new report has revealed the tricks IS sympathisers use to avoid automated law enforcement surveillance software.
The European Parliament's Committee on Civil Liberties, Justice and Home Affairs wants to bring its stance on privacy into the 21st century.
In Case You Missed It: Why target WordPress?; EternalBlue further exploited; SC Awards Europe 2017 Winners; Buying GDPR compliance; Encryption targeted following terrorism attacks
UK Prime Minister Theresa May says that technology companies are providing a "safe space" for terrorists.
With a federal election scheduled for September, government officials in Germany are pressing for expanded hacking powers to be granted to law enforcement agencies, according to an article on ZDNet.
Facebook added another layer of protection for users of its WhatsApp encrypted mobile messaging service in late 2016
Helen Davenport discusses whether the government should interfere in issues such as WhatsApp and encrypted messages.
Patrick Knight explores how to manage your account and passwords effectively, the power of encryption and alternate privacy apps that can secure sensitive data and communication.
The president of The Internet Society has called on G20 leaders to protect encryption for the good of the world economy.