Read more about encryption
Bookmark and Share
  • Researcher tests Tor exit nodes, finds not all operators can be trusted

    26.06.2015

    While the Tor anonymity network conceals (relatively successfully) a user's location and Internet activity from anyone who might want to know about it, users should be aware of the fact that it does not offer end-to-end encryption, and any traffic that is not encrypted before it enters Tor can be seen and perused by those operating exit nodes.

  • Cisco finds, removes more default SSH keys on its software

    26.06.2015

    Cisco has pushed out security updates to address two vulnerabilities in its Web Security Virtual Appliance (WSAv), Email Security Virtual Appliance (ESAv), and Content Security Management Virtual Appliance (SMAv) software.

  • Many popular Android apps fail to encrypt login credentials

    22.06.2015

    Using encryption to protect mobile traffic and especially the exchange of credentials between the user and company servers should be a must in this day and age.

  • Let's Encrypt CA to issue its first cert

    17.06.2015

    Let's Encrypt, a non-profit certificate authority (CA) set up by the Electronic Frontier Foundation, Mozilla, Cisco, Akamai, IdenTrust, and researchers at the University of Michigan, is finally ready to issue its first certificate, scheduled for the week of July 27, 2015.

  • iOS 9 will use 6-digit passcodes for enhanced protection

    09.06.2015

    Among the improvements that Apple announced for iOS 9 on Monday, there are some security enhancements as well.




Spotlight

Microsoft Edge: New browser, new risks for Windows 10

Microsoft Edge, the new browser in Windows 10, represents a significant increase in the security over Internet Explorer. However, there are also new potential threat vectors that arenít present in older versions.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  
DON'T
MISS

Mon, Aug 3rd
    COPYRIGHT 1998-2015 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //