Email security company Zix Corporation just released a new email encryption service called GAME, which stands for Google Apps Message Encryption. The service works by encrypting emails sent to recipients outside of the Google cloud network.…
Read MoreResearch
Aiming for secure big data, ADVA puts line-side encryption into its 100G networking gear
The networking vendor is claiming an industry first with the encrypted version of its 100G Metro technology, which aims to handle large, fast-flowing amounts of data with as much security as it can muster.…
Read MoreTime Warner Cable bets big on easy and secure Wi-Fi, rolling out Hotspot 2.0 networkwide
TWC has launched the first large-scale implementation of Hotspot 2.0, which will make public Wi-Fi networks behave like cellular networks. You log into the network once and you'll be instantly connected wherever you go.…
Read MoreGoogle may boost search results of sites that use encryption
Many websites' fate is tied to where to they appear in Google rankings. That's why it's significant that Google may one day give a boost to those that use encryption.…
Read MoreReport: NSA knew about Heartbleed bug and took advantage of it, but the NSA denies the charge
A new development in the Heartbleed bug story: Bloomberg reports that America's spy service knew about it and has been using it for two years.…
Read MoreSnowden calls encryption “defense against the dark arts”
Average people are not going to use Tor and other tools used by the tech community, says Edward Snowden. That's why widespread encryption is our best hopes to counter mass government surveillance.…
Read More“Merkel phone” security firm teams up with Vodafone on new Secure Call app
The app, which promises to protect voice communications, is part of a slew of new security products being pitched to privacy-conscious businesses in Europe.…
Read MoreFreedomPop starts selling an encrypted mobile phone
Capitalizing on the growing angst over privacy in today’s surveillance state, virtual operator FreedomPop has started selling a smartphone that routes all…
Read MoreSilent Circle gets its first telco distributor, as KPN prepares to offer encrypted communications
The strategic partnership is important for Silent Circle, as it promises to make the encrypted Skype rival much more usable by widening its pool of users.…
Read MoreAs security woes bedevil IT, guess who’ll shoulder more of the load?
Relentless attempts to access critical corporate or personal data won't let up. What could change is who companies will rely on as their last line of defense: You and me.…
Read MoreBritish pushed for weak encryption at birth of digital mobile telephony — report
Norway’s Aftenposten has published an interesting account of the decisions taken by those who were formulating GSM – the world’s most widely…
Read MoreIf RSA was hoping NSA furor would fade away, it was mistaken
A half dozen security experts pull out of annual RSA gabfest slated to take place in San Francisco next month. Would-be speakers are protesting RSA's reported cooperation with NSA.…
Read MoreNSA’s quantum ambitions revealed in Snowden documents
The NSA is trying to build a quantum computer in order to break today’s digital encryption and create new types of encryption,…
Read MoreProcessors can (in theory at least) give up encryption keys through the noises they make
Strong encryption may still work, despite the best efforts of the NSA, but a new research paper suggests that clever audio analysis…
Read MoreGoogle catches French finance ministry pretending to be Google
The incident, which was probably a case of the French finance ministry going overboard in its efforts to monitor employee activities, provides a timely reminder of how certificates are the weak point in online security.…
Read MoreSay hello to Safeplug, Pogoplug’s $49 Tor-in-a-box for anonymous surfing
The box takes a minute to set up and promises anonymity for all surfing done through the connected router. It may not prove quite that simple to use in reality, but it's certainly an intriguing and cost-effective privacy tool.…
Read MoreiPhones out in German parliament as parties opt for encrypted communications
Politicians from Germany’s two biggest parties are currently negotiating what their grand coalition will look like, and they’ve reportedly decided on at…
Read MoreNot Smart: LG TVs reportedly spy on attached hard drives and send data back unencrypted
LG’s Smart TVs may be reporting a tad too much information back to the company’s servers, according to a detailed and convincing…
Read MoreSnowden’s legacy: The open web could soon be encrypted by default
You may be familiar with the "https" prefix that tells you your connection is secure. Well, get ready to see a lot more of it -- standards-makers have decided that HTTP version 2 will only work with such web addresses.…
Read MoreNo, Edward Snowden is not stupid – he says he no longer has a copy of the NSA files
Edward Snowden has given a rare interview to The New York Times, saying he never retained a copy of his leaked NSA…
Read MoreNSA targets Tor: leaks show how US weakens the privacy tools it pays to build
The United States paid to build the Tor network, which provides a secure way to communicate for everyone, including the military and dissidents. Why, then, is it also trying to compromise it?…
Read MoreDataguise, a big data security startup, raises $13M
Startup Dataguise has closed a $13 million series B investment round “led by Toba Capital with additional capital coming from the investment…
Read MoreSilent Circle will “move on” from NSA-associated encryption standards, but is that necessary?
The secure communications firm will bring in default replacements for widely-used encryption standards that came out of the U.S. National Institute of Standards and Technology (NIST). However, at least one security expert thinks this may be "a trifle of an overreaction."…
Read More