1 2 3 4 5 6 7 8 9 10 11 next
Archived IT - Encryption Articles
15 Sep 2017
open to premium members only
Quantum Computing Poses Risks to Cryptography and Bitcoin [66440]
eWeek, September 15th, 2017

"The coming era of quantum computing will require new technologies and approaches to keep cryptography secure.

One of the key reasons why computers were created in the first place was to help create and crack cryptography, according to Konstantinos Karagiannis, Chief Technology Officer for Security Consulting at BT Americas.

Today it is the race to crack modern cryptography that is driving quantum computing research and development, Karagiannis asserted in a session at the Open Source Summit in Los Angeles..."
(Get More Information . .)

14 Sep 2017
open to premium members only
Mobile Encryption: How to Protect Data on the Go [66439]
Business 2 Community, September 14th, 2017

"There's a persistent belief that only large and prominent organizations are targets for hackers, but unfortunately that's not the case. In fact, hackers often target small- and medium-sized businesses precisely because they generally have weaker security practices and often have relationships with larger enterprises. The 2013 data breach that exposed the credit card data of more than 40 million Target accounts began when hackers infiltrated the systems of a contractor Target used to monitor its HVAC systems..."
(Get More Information . .)

13 Sep 2017
open to premium members only
Why End-to-End Encryption is About More Than Just Privacy [66441]
Help Net Security, September 13th, 2017

"The question of whether regular people need end-to-end encryption will surely be debated for quite some time. But for Alan Duric, CEO and co-founder of Wire, the question can only have a positive answer.

As he told the audience at the FSec security symposium in Varazdin, Croatia, end-to-end encryption is about more than just privacy - it is also critical for protecting business data, and our very lives and limbs as the Internet of Things becomes the norm..."
(Get More Information . .)

06 Sep 2017
open to premium members only
Tor Project Boosts Support for Anonymous Mobile Browsing [66127]
ZDNet, September 6th, 2017

"As mobile use is on the up, so is the need for secure internet browsing...

Tor Project has announced measures to improve secure web browsing for mobile devices.

The Tor Project, a non-profit which develops and maintains the Tor network for anonymized browsing and as a way to skirt censorship-heavy government controls, keeps its eyes on the state of censorship worldwide..."
(Get More Information . .)

29 Aug 2017
open to premium members only
A Beginner's Guide To Encryption [65968]
Global Knowledge, August 29th, 2017

"It should come as no surprise that in this modern era of digital data we need encryption. But what exactly is it? How do you know what kind of encryption you need? If you were to ask someone what kind of encryption they use, they may respond with a specific encryption-based product, like full-disk encryption. Or they may mention an encryption-based protocol, like HTTPS (HyperText Transport Protocol over SSL). But encryption is much more complicated than that...."
(Get More Information . .)

27 Aug 2017
open to premium members only
Real People Do Want End-To-End Encryption [65969]
ITProPortal, August 27th, 2017

"Against a backdrop of growing digital threats, E2EE has become more important than ever, and its benefits should not be ignored...

Writing in the Daily Telegraph recently, British Home Secretary Amber Rudd stated that 'real people' do not need such 'high levels of security' as offered by end-to-end encryption (E2EE), going on to add that 'real people often prefer ease of use and a multitude of features to perfect, unbreakable security.' This statement couldn't be further from the truth..."
(Get More Information . .)

 
 1 2 3 4 5 6 7 8 9 10 11 next