Read more about encryption
Bookmark and Share
  • The Tor Project announces bug bounty program

    04.01.2016

    Representatives of the Tor Project, the non-profit organization that maintains the software needed for using the Tor anonymity network and operates the Onion network, have announced the imminent creation of a bug bounty program aimed at finding and fixing security flaws in the software.

  • ISC's infocon turns yellow to reflect critical impact of Juniper backdoors

    22.12.2015

    SANS Institute's Internet Storm Center has raised its infocon status - the status of the condition of the Internet infrastructure - from green to yellow, following the public revelation of two backdoors in Juniper's NetScreen firewall devices, and the publication of the password that allows easy exploitation of one of them.

  • New date for migrating off vulnerable SSL and early TLS encryption

    21.12.2015

    Following significant feedback from the global PCI community and security experts, the Payment Card Industry Security Standards Council (PCI SSC) announced a change to the date that organizations who process payments must migrate to TLS 1.1 encryption or higher.

  • Microsoft will stop trusting certificates from 20 Certificate Authorities

    18.12.2015

    Starting on January 2016, Microsoft's Trusted Root Certificate Program will no longer include twenty currently trusted CAs and will remove their root certificates removed from the Trusted Root CA Store.

  • Human error reduces security offered by encryption apps

    18.12.2015

    Crypto phones - whether they are hardware devices or mobile apps - are a great way to assure that your VoIP communications remain private, but the security and privacy they offer is dependent on whether the users don't make mistakes while using them.




Spotlight

Critical bug found in Cisco ASA products, attackers are scanning for affected devices

Several Cisco ASA products - appliances, firewalls, switches, routers, and security modules - have been found sporting a flaw that can ultimately lead to remote code execution by attackers.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  
DON'T
MISS

Fri, Feb 12th
    COPYRIGHT 1998-2016 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //