Advertisement
Top

Tag: Encryption


Cyber-crime, Malware

Ransomware attack hits Pitney Bowes, impacting company mail rooms around the world

October 16, 2019

Via: Hot for Security

Global shipping and mailing service Pitney Bowes has fallen foul of a ransomware attack that has encrypted data on its computer systems and disrupted customer access to its online services. In a statement published on its website, Pitney Bowes advised […]


Network security

Justice Department takes another run at encryption backdoors with ‘lawful access’

October 7, 2019

Via: CSO Online

Following in the footsteps of former FBI Director James Comey and other top law enforcement officials, Attorney General William Barr is taking a swing at the growing prevalence of encryption across the digital landscape, with a particular renewed focus on […]


Threats & Malware, Vulnerabilities

How long before quantum computers break encryption?

September 30, 2019

Via: Help Net Security

The verdict is in: quantum computing poses an existential threat to asymmetric cryptography algorithms like RSA and ECC that underpin practically all current Internet security. This comes straight from the National Academy of Science’s Committee on Technical Assessment of the […]


Malware, Virus & Malware

Attackers Demand Millions in Texas Ransomware Incident

August 22, 2019

Via: Security Week

The cybercriminals behind the recent ransomware incident that impacted over 20 local governments in Texas are apparently demanding $2.5 million in exchange for access to encrypted data. The incident took place on August 16, when 23 towns in Texas revealed […]


Network security

The Key to Enterprisewide Encryption

August 7, 2019

Via: Dark Reading

Enterprise security teams have long struggled with the complexity of encryption and key management. While integrated solutions are starting to make it easier to encode and decode critical data, the goal of enterprisewide encryption has greatly increased the time it […]


Malware

Sonicwall warns of a spike in the number of attacks involving encrypted malware and IoT malware

July 29, 2019

Via: Security Affairs

In 2018, global malware volume recorded by SonicWall hit a record-breaking 10.52 billion attacks. The situation is better in the first half of 2019, when SonicWall recorded 4.8 billion attacks, a 20% drop compared to the same time period last […]


Network security

The highly competitive global encryption management solutions market continues to grow

July 12, 2019

Via: Help Net Security

The increasing adoption of digitalization and globalization of enterprises have made IT resources prone to cyber attacks. This has increased the demand for encryption management solutions which will help prevent such cyber attacks. Enterprises are implementing BYOD policies and integrating […]


Cyber-crime, Hacker, Malware, Threats & Malware

City of Riviera Beach, Florida Pays Ransom to Regain Access to Encrypted Files

June 20, 2019

Via: Hot for Security

Ransomware attacks are intensely targeting local governments around the US, shutting down their systems. And most of the government appear to ignore the FBI’s warning against giving in to hacker demands. With a population of only 35,000 residents, Riviera Beach […]


Network security

Over 90% of data transactions on IoT devices are unencrypted

May 23, 2019

Via: CSO Online

A new report that looked at millions of connections from IoT devices present on enterprise networks found that over 40% of them do not encrypt their traffic. This means a large number of such devices are exposed to man-in-the-middle (MitM) […]


Network security

Attackers Are Messing with Encryption Traffic to Evade Detection

May 16, 2019

Via: Dark Reading

Online attackers are trying to obscure their encrypted traffic in an attempt to evade detection, using a technique known as “cipher stunting,” according to Internet infrastructure and security firm Akamai. Cipher stuffing modifies the fingerprint of communications encrypted with secure […]


Cloud security

Why Encryption Is the Cornerstone of Your Cloud Security

April 8, 2019

Via: Security Intelligence

While cloud computing is far from a magic bullet for all your data storage and security woes, organizations are enjoying meaningful benefits in the form of cost-efficiency, on-demand scalability, heavy upfront capital shifted to recurring operational expenses, augmented resources and […]


Phishing

Encrypted attacks growing steadily, cybercriminals are increasingly targeting non-standard ports

March 27, 2019

Via: Help Net Security

In 2018, SonicWall recorded the decline of cryptojacking, but more ransomware, highly targeted phishing, web application attacks and encrypted attacks. The company’s annual threat report, compiled based on threat intelligence obtained from 1+ million sensors around the world, marks a: […]


Cyber-crime, Malware, Threats & Malware, Virus & Malware

STOP ransomware encrypts files and steals victim’s data

March 11, 2019

Via: Security Affairs

The STOP ransomware made the headlines because it is installing password-stealing Trojans on the victims’ machines. Experts observed the ransomware also installing the dreaded Azorult password-stealing Trojan on victim’s machine to steal account credentials, cryptocurrency wallets, documents and more. AZORult […]


Email security, Malware, Phishing

Accidental data breaches are often compounded by a failure to encrypt

February 25, 2019

Via: Help Net Security

83 percent of security professionals believe that employees have accidentally exposed customer or business sensitive data at their organization. Accidental data breaches are often compounded by an organizational failure to encrypt data prior to it being shared – both internally […]


Network security

Encryption is key to protecting information as it travels outside the network

January 17, 2019

Via: Help Net Security

A new Vera report reveals stark numbers behind the mounting toll of data breaches triggered by cybercrime and accidents. One of the most recognized and mandated security controls, installed encryption tools protect just four percent of breached files. Meanwhile, compliance-focused […]


Network security

Encryption backdoors open a Pandora’s Box for cybersecurity

January 9, 2019

Via: Help Net Security

The amount of encrypted traffic online has grown exponentially. This growth has occurred in the wake of the Snowden revelations, as well as the continuous stream of stories about corporate data leaks and hacks. As a response to these challenges, […]


Network security

Growing demand to meet regulatory compliance drives overall network encryption market

January 8, 2019

Via: Help Net Security

The global network encryption market size is expected to grow from $2.9 billion in 2018 to $4.6 billion by 2023, at a Compound Annual Growth Rate (CAGR) of 9.8% during the forecast period. Major growth factors for the market include […]


Mobile security

Android 9 Brings Significant Security Advancements, Google Says

December 24, 2018

Via: Security Week

The latest Android iteration brings along a great deal of security improvements, including better encryption and authentication, Google says. With Android 9 (also called Android Pie), the Internet search giant focused on aspects such as platform hardening, anti-exploitation, hardware-backed security, […]


Mobile security

Google Beefs Up Android Key Security for Mobile Apps

December 14, 2018

Via: Threat Post

Changes to how data is encrypted can help developers ward off data leakage and exfiltration. Google is making a few tweaks to its tools for Android mobile developers to boost the security of their wares – an apropos announcement against […]


Network security, Privacy protection

Researchers crack disk encryption in popular Samsung and Crucial SSDs

November 7, 2018

Via: Hot for Security

Researchers at Netherlands-based Radboud University, which is active in almost all scientific fields, have discovered grave security flaws in several popular solid-state drives (SSD) that promise full disk encryption. In a nutshell, they can be cracked. Self-encrypting drives are regarded […]