Zix Corporation launches email encryption service for Google Apps customers
Dallas-based Zix Corporation has launched a new software service designed to alleviate security concerns for Google Apps customers. The email data protection company created GAME, which stands for...
View ArticleHere’s what you need to know about the sudden and mysterious death of TrueCrypt
The web security scene is thoroughly weirded out following the abrupt and inexplicable closure of the TrueCrypt project. TrueCrypt was an anonymously authored piece of disk encryption software that...
View ArticleCloudera acquires big data encryption specialist Gazzang
Hadoop software company Cloudera has acquired Gazzang, a startup specializing in encryption software for big data environments. It’s Cloudera’s first significant acquisition (it bought machine learning...
View ArticleAmazon S3 users can now bring their own encryption keys
Up until this week, users of Amazon’s S3 storage had to rely on Amazon Web Services to provide and manage their server-side encryption keys. Now those users can instead opt to supply their own keys and...
View ArticleBlackBerry continues to refocus on enterprise, launching an encrypted version...
BlackBerry rolled out on an encrypted version of BlackBerry Messenger (BBM) on Monday, looking to target enterprises and government with a more secure version of its popular messaging app. BlackBerry...
View ArticleUpdated: PayPal froze account of secure email startup ProtonMail due to...
About 6 weeks ago my colleague Barb Darrow covered a new secure email startup called ProtonMail, which was set up by a bunch of MIT, Harvard and CERN researchers who are annoyed with the NSA’s...
View ArticleEncryption race continues as Microsoft bulks up protection for email and file...
Microsoft is now encrypting messages flowing between its own Outlook.com mail service and third-party mail providers using Transport Layer Security, and has also enabled Perfect Forward Security in...
View ArticleSilent Circle squares up to Skype with semi-secure calls to normal phones
Encrypted communications outfit Silent Circle, which has telco distribution deals for its secure voice app and $30 million funding in the bank, has introduced the ability to call out to regular phone...
View ArticleUsing strong crypto, TunnelX offers a conversation tool that no one can snoop on
Between NSA surveillance and giant corporations that sniff our messages for ad money, it sometimes feels as if there’s no such thing as a private online conversation. An intriguing group of...
View ArticleEdward Snowden thinks cloud providers still have a chance to win users’ trust
One of the clearest implications of NSA leaker Edward Snowden’s revelations has been that cloud computing is a big problem: By creating a centralized data repository, the model makes it easier for law...
View ArticleQuick Tip: Enable iChat Encryption for Private Chats
Most of the time what I say on iChat is unimportant and would bore any eavesdropper, but on occasion I need to communicate some sensitive info, and I feel uncomfortable doing that over an unsecured...
View ArticleiOS Encrypted Backups Are Now Crackable
It's possible to encrypt an iOS backup using iTunes. However, a piece of software has just been released which allows the encryption to be cracked, therefore giving someone full access to the data...
View ArticleStopping threats like Operation Shady RAT
Security used to be fairly straightforward -- put boundaries around your infrastructure-holding business data. Today, with the rapid adoption of cloud and mobile computing and the overall...
View ArticleBYOD-friendly or BYOD-adverse? Critical criteria for picking a cloud vendor
In our increasingly BYOD world, employees expect to have open and mobile access to their work and apps. Meanwhile, IT still needs to keep sensitive business data secure. What's a stressed out CIO to...
View Article6 ways to keep your data safe in the cloud
These suggestions might seem like common sense, but the more we use cloud services, the more we put ourselves at risk of identity theft and other negative effects of cybercrime. Here are six ways to at...
View ArticleNokia: Yes, we decrypt your HTTPS data, but don’t worry about it
The company has confirmed that the Xpress Browser used on its Asha and Lumia handsets does route HTTPS traffic via its servers, temporarily decrypting it as it does so. However, Nokia maintains that it...
View ArticleThe new Mega: a privacy triumph or just more content theft?
Flamboyant entrepreneur Kim Dotcom is marketing his new file-sharing locker as "the privacy company." Is he for real or are the privacy claims just a cynical cover-up for a new piracy business? The new...
View ArticleWhere Kim Dotcom and Mega have the edge on Dropbox and Box.net
Alleged pirate Kim Dotcom's latest venture, Mega, tackles cloud storage. Whatever Dotcom's motives, Andy Manoske, of GGV Capital, says his startup is bringing a much-needed upgrade to security...
View ArticleRuckus Wireless designs an open Wi-Fi hotspot with a secure connection
With the next release of its WLAN software all Ruckus-built hotspots will be able to supply optional encrypted connections to any user who wanders into Wi-Fi coverage. Ruckus Wireless designs an open...
View ArticleCloud security market landscape, 2013–2017
Cyber threats are now a critical issue affecting the national security of nation countries worldwide. At the same time, the IT world is witnessing a wave of new innovation, and there are numerous...
View Article