Articles about Encryption

Zoom claims to offer end-to-end encryption -- even though that's not strictly true

Zoom logo

Security is a serious concern for anyone using the internet, but it most certainly is for businesses. In seeking a video conferencing tool to see them through the home-working coronavirus has forced many people into, Zoom has proved to be an incredibly popular choice, and its proclamation of offering end-to-end encryption very probably swayed a few decisions.

An investigation carried out by the Intercept found that, despite Zoom's claims, the service does not really support end-to-end encryption for video and audio content. In reality, all it offers is TLS, but Zoom has chosen to refer to this as being end-to-end encryption.

Continue reading

Kanguru Defender Bio-Elite30 fingerprint-encrypted USB flash drive -- great for storage, perfect for Tails Linux [Review]

kanguru1

When I first saw the Kanguru Defender Bio-Elite30 flash drive, I was immediately intrigued. Having the ability to decrypt an encrypted flash drive with the touch of a finger was immensely convenient. And yes, convenience matters, as making encryption easy increases the likelihood that the user will actually use it. If encrypting files becomes too cumbersome, the user may not bother, leading to poor security practices.

Also cool was Kanguru's promise that it was operating system agnostic, meaning it would work with any OS, such as Windows, macOS, and desktop Linux distributions. I'd later find out that was only partially true, but more on that in a moment. It is even well-built -- the housing is a solid piece of aluminum that not only looks beautiful, but should lend to increased durability.

Continue reading

The $600 quantum computer that could spell the end for conventional encryption

Active Cypher QUBY

Concerns that quantum computing could place current encryption techniques at risk have been around for some time.

But now cybersecurity startup Active Cypher has built a password-hacking quantum computer to demonstrate that the dangers are very real.

Continue reading

Kanguru Defender Bio-Elite30 is a fingerprint hardware encrypted USB flash drive for Windows, Mac, and Linux

Kanguru-Fingerprint-Encrypted-USB

Hardware encrypted USB flash drives are fairly common, but usually, they leverage keypads for unlocking. Biometrics -- such as a fingerprint reader -- are far more convenient, however. Today, Kanguru launches a new hardware encrypted flash drive that uses your finger to decrypt it.

Called "Defender Bio-Elite30," the company claims the drive will work on any operating system, meaning those on Windows, Mac, or Linux can take advantage of the biometric unlocking. The drive will even work with devices such as Smart televisions. The Defender Bio-Elite30 is bus-powered too, so you won't have to be concerned about an internal battery failing. Believe it or not, despite the cool technology, it is rather affordable.

Continue reading

Google and Fortanix deliver external key management for public cloud

cloud key

Migrating sensitive data to the cloud inevitably raises concerns surrounding compliance and security. Most turn to encryption as a solution, but that in itself raises issues over key management.

While many cloud service providers have allowed customers to bring their own keys (BYOK), Google Cloud Platform is linking up with the Fortanix Self-Defending Key Management Service (SDKMS) to become the first public cloud provider to enable customers to bring their own key management system (BYOKMS).

Continue reading

ESET launches Full Disk Encryption for businesses

Data encryption

Although businesses go to great lengths to protect their networks, physical loss of devices and the consequent risk to corporate data remains a major concern.

Cyber security company ESET is addressing this with the launch of Full Disk Encryption, allowing IT administrators to remotely deploy, activate, and encrypt connected devices using a one-click action, thus preventing attackers from profiting from lost or stolen computers.

Continue reading

Insecure file transfers leave organizations at risk

File transfers

According to a new survey, 78 percent of respondents are still using unencrypted protocols to transfer some of their files, and only 44 percent are using two-factor authentication when connecting to their file transfer server.

The study for VanDyke Software, conducted by Amplitude Research, interviewed 450 professionals involved in data protection and file transfers and finds that 48 percent of companies are transferring files at least multiple times per day and sometimes 'continuously'.

Continue reading

Two thirds of consumers don't think government encryption backdoors will protect them from terrorists

Encryption backdoor

A new survey by machine identity protection company Venafi shows consumers don't trust major cyber security policies pushed by their governments.

Government officials in nearly every country believe the security risks inherent in government-mandated encryption backdoors are less important than giving law enforcement broad access to encrypted personal data. However, US and European consumers overwhelmingly disagree. When asked if laws allowing governments to access encrypted personal and private data would make them safer from terrorists 64 percent don’t agree.

Continue reading

Cloud-based security module helps protect systems and ensure compliance

cloud encryption

Protecting sensitive data and meeting compliance rules is an issue for all companies. A new cloud-based module offers on-demand encryption to allow businesses to meet their security needs.

The hardware security module (HSM) from nCipher Security is called nShield and, delivered as a service, can be used in cloud-first strategies, selective cloud migration, or to add HSM capacity to handle workload spikes.

Continue reading

British Airways e-ticketing leaves passengers' sensitive data at risk

BA plane

Less than a year on from a breach which exposed the details of hundreds of thousands of customers, British Airways systems are still leaving passengers' personal information at risk.

New research from mobile security provider Wandera has discovered an e-ticketing system vulnerability that leaves passengers' personally identifiable information (PII) exposed.

Continue reading

Personal data encryption: The ultimate trolley problem

Data encryption

There’s a bomb hidden somewhere in a city. Law enforcement is in possession of a suspect’s mobile phone but can’t gain access because the device is encrypted, and the suspect is deceased. The authorities then demand that the device manufacturer create a backdoor so that they can bypass the encryption and learn how to stop the bomb. The clock is ticking. Literally thousands of lives are at stake. If the company complies, they will be exposing many times more users to potential security breaches in the future once the backdoor they provide is inevitably leaked to the world. If they don’t, a lot of people may die that needn’t if the company had simply given in.

Save lives now? Or keep the world safe from future tyranny? That’s how I look at the ultimate trolley problem. On the one hand, I hate the idea that -- through some inaction on my part -- I might be complicit to an event that causes mass casualties. On the other hand, I’d also hate to be the person who, by giving in this one time, leaves some poor slob to be persecuted by a state actor who gained access to his or her private communications and deemed them to be "criminal."

Continue reading

New tool allows files to be encrypted and shared wherever they’re stored

Encryption

One of the best ways of preventing sensitive files from falling into the wrong hands is to encrypt them, but the process of encrypting and decrypting can be a chore, especially if you want to share the information.

VPN service NordVPN is set to launch its own NordLocker security tool, designed to safeguard files whether they are stored locally or in the public cloud, and make them easy to share.

Continue reading

Emsisoft Decrypter for Planetary gets your ransomware-riddled files back for free

Hacker

Emsisoft has released a free decrypter tool for anyone who has been struck by the Planetary Ransomware, eliminating the need to pay a fee to the attackers.

Before using the tool you are advised to ensure that you have removed the malware from your computer -- something you can do with the free version of Emsisoft Anti-Malware. You also need to ensure that you don't delete the ransom note ("!!!READ_IT!!!.txt") or the decrypter won't work.

Continue reading

FinalCrypt 4.0.3 adds uncrackable encryption to your most sensitive files

finalcrypt-200x175

The battle to encrypt data securely rages on, with developments in quantum computing mirrored by hackers’ ever more creative attempts to break encryption. Ironically, one form of encryption resistant to all forms of hacking -- One Time Pad (OTP) -- dates from the 19th century.

Symmetric OTP works by generating encryption from a key file -- the larger the better -- which renders all attempts to decrypt the data useless without access to said key file. And FinalCrypt, available for Windows, Mac and Linux -- indeed any Java-capable computer can run the tool, brings the technology to any computer user.

Continue reading

Encryption backdoors raise the likelihood of attack

Backdoor button

Countries with government-mandated encryption backdoors are more susceptible to nation-state attacks according to 73 percent of security professionals.

A survey from machine identity protection company Venafi also finds 69 percent believe countries with encryption backdoors suffer economic disadvantages in the global marketplace as a result.

Continue reading

BetaNews, your source for breaking tech news, reviews, and in-depth reporting since 1998.

© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.