Home Tags Public Key

Tag: Public Key

PetrWrap: the new Petya-based ransomware used in targeted attacks

This year we found a new family of ransomware used in targeted attacks against organizations.After penetrating an organization’s network the threat actors used the...

The evolution of (and solution to) ransomware

Contrary to popular belief, ransomware has been around for decades.The first malware program to lock up people’s files and ask for a ransom was...

WhatsApp: Encrypted Message Backdoor Reports Are 'Baseless'

The security researcher cited in the report acknowledged that the word 'backdoor' was probably not the best choice. WhatsApp this week denied that its app...

Google ventures into public key encryption

Google announced an early prototype of Key Transparency, its latest open source effort to ensure simpler, safer, and secure communications for everyone.The project’s goal...

Professionally designed ransomware Spora might be the next big thing

Security researchers have found a new ransomware program dubbed Spora that can perform strong offline file encryption and brings several innovations to the ransom...

Q&A: RSA crypto pioneer Adleman keeps pushing the limits

I recently had the pleasure of interviewing Dr. Leonard Adleman -- the “A” in the very popular public cryptographic algorithm RSA -- as part...

Better authentication: Go get 'em, FIDO

Only a handful of industry associations accomplish what they set out to do.In the security realm, I’ve always been a huge fan of the...

Prepare now for the quantum computing revolution in encryption

Whether quantum computing is 10 years away or is already here, it promises to make current encryption methods obsolete, so enterprises need to start...

NIST requests ideas for crypto that can survive quantum computers

Christmas miracle: Government preparing properly for problem expected to land in ~20 years The United States' National Institute of Standards and Technology has issued a...

The Best Encryption Software of 2017

The Electronic Frontier Foundation aims to protect Web traffic by encrypting the entire Internet using HTTPS.Chrome now puts a little warning marker in the...

Steganos Safe 18

Having your laptop stolen is traumatic; having the thief gain access to your sensitive documents could be catastrophic.To avert the possibility of catastrophe, use...

Google open-sources test suite to find crypto bugs

Working with cryptographic libraries is hard, and a single implementation mistake can result in serious security problems.To help developers check their code for implementation...