Quantcast
Channel: Encryption – Gigaom
Browsing all 129 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Stopping threats like Operation Shady RAT

Earlier this week, McAfee published information about a new cyber security threat it dubbed Operation Shady RAT. Operation Shady RAT, and others like it that have emerged over the past months,...

View Article


Image may be NSFW.
Clik here to view.

Quality of the cloud: best practices for ISVs

Demand for cloud computing continues to increase exponentially as consumers, businesses and government agencies seek to defer the expense of acquiring, operating and maintaining infrastructure and...

View Article


Image may be NSFW.
Clik here to view.

BYOD-friendly or BYOD-adverse? Critical criteria for picking a cloud vendor

IBM‘s aggressive stance against the use of unsanctioned applications grabbed headlines a few months ago, but the trend toward “Bring Your Own Device” (BYOD) has put pressure on IT in all businesses,...

View Article

Image may be NSFW.
Clik here to view.

6 ways to keep your data safe in the cloud

Most of us have a lot of data in the cloud, housed in storage services such as Dropbox, e-mail applications such as Gmail or everyday web services such as Facebook. Most of us probably don’t keep it as...

View Article

Image may be NSFW.
Clik here to view.

The rise of M2M security challenges

There will be over 700 million cellular-enabled machine-to-machine (M2M) device adoption and system deployments in the U.S. by 2017. As the volume of M2M devices and associated data increases, so too...

View Article


Image may be NSFW.
Clik here to view.

Nokia: Yes, we decrypt your HTTPS data, but don’t worry about it

Nokia has confirmed reports that its Xpress Browser decrypts data that flows through HTTPS connections – that includes the connections set up for banking sessions, encrypted email and more. However, it...

View Article

Image may be NSFW.
Clik here to view.

The new Mega: a privacy triumph or just more content theft?

Kim Dotcom, the flamboyant file-sharing champion who was arrested a year ago on copyright charges, is back with a new service called Mega that offers an easy way to store content in the cloud. Hailing...

View Article

Image may be NSFW.
Clik here to view.

Where Kim Dotcom and Mega have the edge on Dropbox and Box.net

As a world (in)famous technologist with the literal last name “Dotcom,” Kim Dotcom is a man whose swag is matched only by the damages sought against him by the U.S. government. His filesharing site...

View Article


Image may be NSFW.
Clik here to view.

Ruckus Wireless designs an open Wi-Fi hotspot with a secure connection

Wi-Fi is everywhere and more often than not it’s free for the taking. Pretty much everyone but airlines and fancy hotels are opening their networks to all comers. The only problem is that open networks...

View Article


Image may be NSFW.
Clik here to view.

Cloud security market landscape, 2013–2017

Cyber threats are now a critical issue affecting the national security of nation countries worldwide. At the same time, the IT world is witnessing a wave of new innovation, and there are numerous...

View Article

Image may be NSFW.
Clik here to view.

Kim Dotcom is starting a VC fund for privacy-focused startups

Some entrepreneurs are betting that the PRISM scandal will stoke user interest in privacy-focused services. The Pirate Bay’s founder Peter Sunde closed its crowdfunding campaign three days after...

View Article

Image may be NSFW.
Clik here to view.

Researchers find way to encrypt software with “mathematical jigsaw puzzles”

When it comes to protecting software, you’re only as good as your file encryption. A UCLA computer professor and his research team have figured out a way to encrypt software in a way that allows users...

View Article

Image may be NSFW.
Clik here to view.

First Lavabit, now Silent Circle: Another U.S. secure email service closes to...

Silent Circle, the provider of a range of secure communications services, has pre-emptively closed its Silent Mail email service in order to stop U.S. authorities from spying on its customers. That...

View Article


Image may be NSFW.
Clik here to view.

This can’t be good for Dropbox for Business

In what could be a speed bump in  Dropbox’s drive to attract paying business customers, two researchers said they were able to reverse-engineer the encryption of the Dropbox client. On the plus side...

View Article

Image may be NSFW.
Clik here to view.

The NSA has cracked the secure internet: 3 things to know about the latest...

In the latest development in the ongoing scandal over U.S. surveillance practices, new reports show that the National Security Agency can break into a wide range of encrypted internet communications...

View Article


Image may be NSFW.
Clik here to view.

A question of trust: Why the NSA revelations have the security industry in...

The security industry’s collective head is spinning, thanks to the NSA. A week after it emerged that the U.S. intelligence agency has “some capabilities” against basic internet security mechanisms, no...

View Article

Image may be NSFW.
Clik here to view.

Silent Circle will “move on” from NSA-associated encryption standards, but is...

The secure communications provider Silent Circle is pretty upset about the apparent betrayal of the cryptographic community by the NSA, so it’s moving away from encryption standards that the...

View Article


Image may be NSFW.
Clik here to view.

Dataguise, a big data security startup, raises $13M

Startup Dataguise has closed a $13 million series B investment round “led by Toba Capital with additional capital coming from the investment arm of a leading electronic conglomerate,” according to a...

View Article

Image may be NSFW.
Clik here to view.

How to find the right data-protection solution in the cloud era

Outages and data loss reinforce the critical importance of thorough disaster recovery and business continuity.Today’s cloud-based solutions, however, are limited — something data protection vendors...

View Article

Image may be NSFW.
Clik here to view.

NSA targets Tor: leaks show how US weakens the privacy tools it pays to build

A top secret slide show by the National Security Agency shows how the US government has been trying to compromise the Tor network, a tool that allows people to communicate anonymously on the internet....

View Article
Browsing all 129 articles
Browse latest View live