The $600 quantum computer that could spell the end for conventional encryption


Concerns that quantum computing could place current encryption techniques at risk have been around for some time.
But now cybersecurity startup Active Cypher has built a password-hacking quantum computer to demonstrate that the dangers are very real.
Kanguru Defender Bio-Elite30 is a fingerprint hardware encrypted USB flash drive for Windows, Mac, and Linux


Hardware encrypted USB flash drives are fairly common, but usually, they leverage keypads for unlocking. Biometrics -- such as a fingerprint reader -- are far more convenient, however. Today, Kanguru launches a new hardware encrypted flash drive that uses your finger to decrypt it.
Called "Defender Bio-Elite30," the company claims the drive will work on any operating system, meaning those on Windows, Mac, or Linux can take advantage of the biometric unlocking. The drive will even work with devices such as Smart televisions. The Defender Bio-Elite30 is bus-powered too, so you won't have to be concerned about an internal battery failing. Believe it or not, despite the cool technology, it is rather affordable.
Google and Fortanix deliver external key management for public cloud


Migrating sensitive data to the cloud inevitably raises concerns surrounding compliance and security. Most turn to encryption as a solution, but that in itself raises issues over key management.
While many cloud service providers have allowed customers to bring their own keys (BYOK), Google Cloud Platform is linking up with the Fortanix Self-Defending Key Management Service (SDKMS) to become the first public cloud provider to enable customers to bring their own key management system (BYOKMS).
ESET launches Full Disk Encryption for businesses


Although businesses go to great lengths to protect their networks, physical loss of devices and the consequent risk to corporate data remains a major concern.
Cyber security company ESET is addressing this with the launch of Full Disk Encryption, allowing IT administrators to remotely deploy, activate, and encrypt connected devices using a one-click action, thus preventing attackers from profiting from lost or stolen computers.
Insecure file transfers leave organizations at risk


According to a new survey, 78 percent of respondents are still using unencrypted protocols to transfer some of their files, and only 44 percent are using two-factor authentication when connecting to their file transfer server.
The study for VanDyke Software, conducted by Amplitude Research, interviewed 450 professionals involved in data protection and file transfers and finds that 48 percent of companies are transferring files at least multiple times per day and sometimes 'continuously'.
Two thirds of consumers don't think government encryption backdoors will protect them from terrorists


A new survey by machine identity protection company Venafi shows consumers don't trust major cyber security policies pushed by their governments.
Government officials in nearly every country believe the security risks inherent in government-mandated encryption backdoors are less important than giving law enforcement broad access to encrypted personal data. However, US and European consumers overwhelmingly disagree. When asked if laws allowing governments to access encrypted personal and private data would make them safer from terrorists 64 percent don’t agree.
Cloud-based security module helps protect systems and ensure compliance


Protecting sensitive data and meeting compliance rules is an issue for all companies. A new cloud-based module offers on-demand encryption to allow businesses to meet their security needs.
The hardware security module (HSM) from nCipher Security is called nShield and, delivered as a service, can be used in cloud-first strategies, selective cloud migration, or to add HSM capacity to handle workload spikes.
British Airways e-ticketing leaves passengers' sensitive data at risk


Less than a year on from a breach which exposed the details of hundreds of thousands of customers, British Airways systems are still leaving passengers' personal information at risk.
New research from mobile security provider Wandera has discovered an e-ticketing system vulnerability that leaves passengers' personally identifiable information (PII) exposed.
Personal data encryption: The ultimate trolley problem


There’s a bomb hidden somewhere in a city. Law enforcement is in possession of a suspect’s mobile phone but can’t gain access because the device is encrypted, and the suspect is deceased. The authorities then demand that the device manufacturer create a backdoor so that they can bypass the encryption and learn how to stop the bomb. The clock is ticking. Literally thousands of lives are at stake. If the company complies, they will be exposing many times more users to potential security breaches in the future once the backdoor they provide is inevitably leaked to the world. If they don’t, a lot of people may die that needn’t if the company had simply given in.
Save lives now? Or keep the world safe from future tyranny? That’s how I look at the ultimate trolley problem. On the one hand, I hate the idea that -- through some inaction on my part -- I might be complicit to an event that causes mass casualties. On the other hand, I’d also hate to be the person who, by giving in this one time, leaves some poor slob to be persecuted by a state actor who gained access to his or her private communications and deemed them to be "criminal."
New tool allows files to be encrypted and shared wherever they’re stored


One of the best ways of preventing sensitive files from falling into the wrong hands is to encrypt them, but the process of encrypting and decrypting can be a chore, especially if you want to share the information.
VPN service NordVPN is set to launch its own NordLocker security tool, designed to safeguard files whether they are stored locally or in the public cloud, and make them easy to share.
Emsisoft Decrypter for Planetary gets your ransomware-riddled files back for free


Emsisoft has released a free decrypter tool for anyone who has been struck by the Planetary Ransomware, eliminating the need to pay a fee to the attackers.
Before using the tool you are advised to ensure that you have removed the malware from your computer -- something you can do with the free version of Emsisoft Anti-Malware. You also need to ensure that you don't delete the ransom note ("!!!READ_IT!!!.txt") or the decrypter won't work.
FinalCrypt 4.0.3 adds uncrackable encryption to your most sensitive files


The battle to encrypt data securely rages on, with developments in quantum computing mirrored by hackers’ ever more creative attempts to break encryption. Ironically, one form of encryption resistant to all forms of hacking -- One Time Pad (OTP) -- dates from the 19th century.
Symmetric OTP works by generating encryption from a key file -- the larger the better -- which renders all attempts to decrypt the data useless without access to said key file. And FinalCrypt, available for Windows, Mac and Linux -- indeed any Java-capable computer can run the tool, brings the technology to any computer user.
Encryption backdoors raise the likelihood of attack


Countries with government-mandated encryption backdoors are more susceptible to nation-state attacks according to 73 percent of security professionals.
A survey from machine identity protection company Venafi also finds 69 percent believe countries with encryption backdoors suffer economic disadvantages in the global marketplace as a result.
Airline e-ticketing systems put passenger data at risk


Airlines could be putting the personal data of their passengers at risk by using unencrypted links, according to a new report.
Researchers at security and data management company Wandera have uncovered a vulnerability affecting a number of e-ticketing systems that could allow third parties to view, and in some cases even change, a user's flight booking details, or print their boarding passes.
Kingston unveils IronKey D300S hardware-encrypted 'serialized' USB flash drive


About two years ago, Kingston launched the IronKey D300 USB Flash Drive. This drive was extremely impressive, as it featured FIPS 140-2 Level 3 256-bit AES-XTS hardware encryption.
Today, Kingston takes the drive to another level. The D300S, as it is called, is essentially the same exact drive, but now, it has a serial number and barcode on the body. This will make it easier for a company to manage the drives, saving both money and time. It is also getting a new software keyboard for safer decryption, hopefully protecting from hidden keyloggers.
Recent Headlines
Most Commented Stories
© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.