Quantcast
Channel: Encryption – Gigaom
Browsing all 129 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Zix Corporation launches email encryption service for Google Apps customers

Dallas-based Zix Corporation has launched a new software service designed to alleviate security concerns for Google Apps customers. The email data protection company created GAME, which stands for...

View Article


Image may be NSFW.
Clik here to view.

Here’s what you need to know about the sudden and mysterious death of TrueCrypt

The web security scene is thoroughly weirded out following the abrupt and inexplicable closure of the TrueCrypt project. TrueCrypt was an anonymously authored piece of disk encryption software that...

View Article


Image may be NSFW.
Clik here to view.

Cloudera acquires big data encryption specialist Gazzang

Hadoop software company Cloudera has acquired Gazzang, a startup specializing in encryption software for big data environments. It’s Cloudera’s first significant acquisition (it bought machine learning...

View Article

Image may be NSFW.
Clik here to view.

Amazon S3 users can now bring their own encryption keys

Up until this week, users of Amazon’s S3 storage had to rely on Amazon Web Services to provide and manage their server-side encryption keys. Now those users can instead opt to supply their own keys and...

View Article

Image may be NSFW.
Clik here to view.

BlackBerry continues to refocus on enterprise, launching an encrypted version...

BlackBerry rolled out on an encrypted version of BlackBerry Messenger (BBM) on Monday, looking to target enterprises and government with a more secure version of its popular messaging app. BlackBerry...

View Article


Image may be NSFW.
Clik here to view.

Updated: PayPal froze account of secure email startup ProtonMail due to...

About 6 weeks ago my colleague Barb Darrow covered a new secure email startup called ProtonMail, which was set up by a bunch of MIT, Harvard and CERN researchers who are annoyed with the NSA’s...

View Article

Image may be NSFW.
Clik here to view.

Encryption race continues as Microsoft bulks up protection for email and file...

Microsoft is now encrypting messages flowing between its own Outlook.com mail service and third-party mail providers using Transport Layer Security, and has also enabled Perfect Forward Security in...

View Article

Image may be NSFW.
Clik here to view.

Silent Circle squares up to Skype with semi-secure calls to normal phones

Encrypted communications outfit Silent Circle, which has telco distribution deals for its secure voice app and $30 million funding in the bank, has introduced the ability to call out to regular phone...

View Article


Image may be NSFW.
Clik here to view.

Using strong crypto, TunnelX offers a conversation tool that no one can snoop on

Between NSA surveillance and giant corporations that sniff our messages for ad money, it sometimes feels as if there’s no such thing as a private online conversation. An intriguing group of...

View Article


Image may be NSFW.
Clik here to view.

Edward Snowden thinks cloud providers still have a chance to win users’ trust

One of the clearest implications of NSA leaker Edward Snowden’s revelations has been that cloud computing is a big problem: By creating a centralized data repository, the model makes it easier for law...

View Article

Image may be NSFW.
Clik here to view.

Quick Tip: Enable iChat Encryption for Private Chats

Most of the time what I say on iChat is unimportant and would bore any eavesdropper, but on occasion I need to communicate some sensitive info, and I feel uncomfortable doing that over an unsecured...

View Article

Image may be NSFW.
Clik here to view.

iOS Encrypted Backups Are Now Crackable

It's possible to encrypt an iOS backup using iTunes. However, a piece of software has just been released which allows the encryption to be cracked, therefore giving someone full access to the data...

View Article

Image may be NSFW.
Clik here to view.

Stopping threats like Operation Shady RAT

Security used to be fairly straightforward -- put boundaries around your infrastructure-holding business data. Today, with the rapid adoption of cloud and mobile computing and the overall...

View Article


Image may be NSFW.
Clik here to view.

BYOD-friendly or BYOD-adverse? Critical criteria for picking a cloud vendor

In our increasingly BYOD world, employees expect to have open and mobile access to their work and apps. Meanwhile, IT still needs to keep sensitive business data secure. What's a stressed out CIO to...

View Article

Image may be NSFW.
Clik here to view.

6 ways to keep your data safe in the cloud

These suggestions might seem like common sense, but the more we use cloud services, the more we put ourselves at risk of identity theft and other negative effects of cybercrime. Here are six ways to at...

View Article


Image may be NSFW.
Clik here to view.

Nokia: Yes, we decrypt your HTTPS data, but don’t worry about it

The company has confirmed that the Xpress Browser used on its Asha and Lumia handsets does route HTTPS traffic via its servers, temporarily decrypting it as it does so. However, Nokia maintains that it...

View Article

Image may be NSFW.
Clik here to view.

The new Mega: a privacy triumph or just more content theft?

Flamboyant entrepreneur Kim Dotcom is marketing his new file-sharing locker as "the privacy company." Is he for real or are the privacy claims just a cynical cover-up for a new piracy business? The new...

View Article


Image may be NSFW.
Clik here to view.

Where Kim Dotcom and Mega have the edge on Dropbox and Box.net

Alleged pirate Kim Dotcom's latest venture, Mega, tackles cloud storage. Whatever Dotcom's motives, Andy Manoske, of GGV Capital, says his startup is bringing a much-needed upgrade to security...

View Article

Image may be NSFW.
Clik here to view.

Ruckus Wireless designs an open Wi-Fi hotspot with a secure connection

With the next release of its WLAN software all Ruckus-built hotspots will be able to supply optional encrypted connections to any user who wanders into Wi-Fi coverage. Ruckus Wireless designs an open...

View Article

Image may be NSFW.
Clik here to view.

Cloud security market landscape, 2013–2017

Cyber threats are now a critical issue affecting the national security of nation countries worldwide. At the same time, the IT world is witnessing a wave of new innovation, and there are numerous...

View Article
Browsing all 129 articles
Browse latest View live