Home Tags Public Key Infrastructure

Tag: Public Key Infrastructure

SHA-1 End Times Have Arrived

For the past couple of years, browser makers have raced to migrate from SHA-1 to SHA-2 as researchers have intensified warnings about collision attacks moving from...

The Best Encryption Software of 2017

The Electronic Frontier Foundation aims to protect Web traffic by encrypting the entire Internet using HTTPS.Chrome now puts a little warning marker in the...

Steganos Safe 18

Having your laptop stolen is traumatic; having the thief gain access to your sensitive documents could be catastrophic.To avert the possibility of catastrophe, use...

Too many contractors spoil the business

As a traveling computer security consultant for over 20 years, I’ve had the chance to visit a lot of different operations and see what...

Signal security revealed: A triple-Diffie-Hellman with a double ratchet

Secure messaging app invites you to dive in and figure out if it's done anything wrong Signal developer Open Whisper Systems has quietly posted some...

Moment of truth: Web browsers and the SHA-1 switch

The long-awaited SHA-1 deprecation deadline of Jan. 1, 2017, is almost here.At that point, we’ll all be expected to use SHA-2 instead.So the question...

10 AWS security blunders and how to avoid them

The cloud has made it dead simple to quickly spin up a new server without waiting for IT.But the ease of deploying new servers...

JSA10759 – 2016-10 Security Bulletin: OpenSSL security updates

The ​OpenSSL project has published a set of security advisories for vulnerabilities resolved in the OpenSSL library in December 2015, March, May, June, August...

New research shows Cloud and IoT adoption requires organisations to future-proof...

Thales and Ponemon Institute research confirms organisations’ biggest PKI challenge is inability of existing infrastructure to support new applicationsPlantation, FL – 11 October 2016...

Folder Lock

By now it should be clear that encryption isn't just for security geeks and IT administrators. You can take precautions to secure your own...

The Best Encryption Software of 2016

Businesses, websites, and government agencies that store your personal data have a duty to protect that data from hackers. Not that even the best...

Secure Boot snafu: Microsoft leaks backdoor key, firmware flung wide open

reader comments 52 Share this story Microsoft has inadvertently demonstrated the intrinsic security problem of including a universal backdoor in its software...