Read more about encryption
Bookmark and Share
  • TrueCrypt developer says forking the software is impossible

    20.06.2014

    Even though a number of people have expressed interest in continuing the development of TrueCrypt, the future of these projects is questionable as one of the TrueCrypt developers feels that "forking" the software would not be a good idea.

  • Java program to reverse Android ransomware damage

    17.06.2014

    University of Sussex student Simon Bell has reverse-engineered the Android Simplocker (Simplelocker) ransomware, and has created a Java program that can be converted into an Android app to decrypt the files encrypted by the malware.

  • Use your own encryption keys for Amazon S3 storage

    13.06.2014

    Amazon Web Services has some good news for users of S3, its popular online file storage web service: they can now use their own encryption keys to protect their data at rest.

  • Life after TrueCrypt

    12.06.2014

    While speculation continues around the fate of popular disk encryption software TrueCrypt, Sophos conducted a survey of over 100 IT professionals regarding their use of encryption.

  • Google End-to-End: The encryption silver bullet?

    11.06.2014

    The world seems to be turning its attention to the notion of data encryption, and Google is the latest to jump on the bandwagon.




Spotlight

Infographic: 25 years of the firewall

Posted on 24 July 2014.  |  The firewall turned 25, and McAfee is celebrating with an infographic that creatively depicts its lifetime. If you take a moment to scan the infographic, you’ll notice the firewall's introduction and evolution coincide with certain security events.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Fri, Jul 25th
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //